Searching for "social media policies"

AI and privacy

The Secretive Company That Might End Privacy as We Know It: It’s taken 3 billion images from the internet to build a an AI driven database that allows US law enforcement agencies identify any stranger. from r/Futurology

Until now, technology that readily identifies everyone based on his or her face has been taboo because of its radical erosion of privacy. Tech companies capable of releasing such a tool have refrained from doing so; in 2011, Google’s chairman at the time said it was the one technology the company had held back because it could be used “in a very bad way.” Some large cities, including San Francisco, have barred police from using facial

But without public scrutiny, more than 600 law enforcement agencies have started using Clearview in the past year, according to the company, which declined to provide a list. recognition technology.

Facial recognition technology has always been controversial. It makes people nervous about Big Brother. It has a tendency to deliver false matches for certain groups, like people of color. And some facial recognition products used by the police — including Clearview’s — haven’t been vetted by independent experts.

Clearview deployed current and former Republican officials to approach police forces, offering free trials and annual licenses for as little as $2,000. Mr. Schwartz tapped his political connections to help make government officials aware of the tool, according to Mr. Ton-That.

“We have no data to suggest this tool is accurate,” said Clare Garvie, a researcher at Georgetown University’s Center on Privacy and Technology, who has studied the government’s use of facial recognition. “The larger the database, the larger the risk of misidentification because of the doppelgänger effect. They’re talking about a massive database of random people they’ve found on the internet.”

Law enforcement is using a facial recognition app with huge privacy issues Clearview AI’s software can find matches in billions of internet images. from r/technology

Part of the problem stems from a lack of oversight. There has been no real public input into adoption of Clearview’s software, and the company’s ability to safeguard data hasn’t been tested in practice. Clearview itself remained highly secretive until late 2019.

The software also appears to explicitly violate policies at Facebook and elsewhere against collecting users’ images en masse.

while there’s underlying code that could theoretically be used for augmented reality glasses that could identify people on the street, Ton-That said there were no plans for such a design.

Banning Facial Recognition Isn’t Enough from r/technology

In May of last year, San Francisco banned facial recognition; the neighboring city of Oakland soon followed, as did Somerville and Brookline in Massachusetts (a statewide ban may follow). In December, San Diego suspended a facial recognition program in advance of a new statewide law, which declared it illegal, coming into effect. Forty major music festivals pledged not to use the technology, and activists are calling for a nationwide ban. Many Democratic presidential candidates support at least a partial ban on the technology.

facial recognition bans are the wrong way to fight against modern surveillance. Focusing on one particular identification method misconstrues the nature of the surveillance society we’re in the process of building. Ubiquitous mass surveillance is increasingly the norm. In countries like China, a surveillance infrastructure is being built by the government for social control. In countries like the United States, it’s being built by corporations in order to influence our buying behavior, and is incidentally used by the government.

People can be identified at a distance by their heart beat or by their gait, using a laser-based system. Cameras are so good that they can read fingerprints and iris patterns from meters away. And even without any of these technologies, we can always be identified because our smartphones broadcast unique numbers called MAC addresses.

China, for example, uses multiple identification technologies to support its surveillance state.

There is a huge — and almost entirely unregulated — data broker industry in the United States that trades on our information.

This is why many companies buy license plate data from states. It’s also why companies like Google are buying health records, and part of the reason Google bought the company Fitbit, along with all of its data.

The data broker industry is almost entirely unregulated; there’s only one law — passed in Vermont in 2018 — that requires data brokers to register and explain in broad terms what kind of data they collect.

The Secretive Company That Might End Privacy as We Know It from r/technews

Until now, technology that readily identifies everyone based on his or her face has been taboo because of its radical erosion of privacy. Tech companies capable of releasing such a tool have refrained from doing so; in 2011, Google’s chairman at the time said it was the one technology the company had held back because it could be used “in a very bad way.” Some large cities, including San Francisco, have barred police from using facial recognition technology.

+++++++++++++
on social credit system in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+credit

surveillance in schools

https://www.edsurge.com/news/2019-10-22-high-tech-surveillance-comes-at-high-cost-to-students-is-it-worth-it

The phrase “school-to-prison pipeline” has long been used to describe how schools respond to disciplinary problems with excessively stringent policies that create prison-like environments and funnel children who don’t fall in line into the criminal justice system. Now, schools are investing in surveillance systems that will likely exacerbate existing disparities.

number of tech companies are capitalizing on the growing market for student surveillance measures as various districts and school leaders commit themselves to preventing acts of violence. Rekor Systems, for instance, recently announced the launch of OnGuard, a program that claims to “advance student safety” by implementing countless surveillance and “threat assessment” mechanisms in and around schools.

While none of these methods have been proven to be effective in deterring violence, similar systems have resulted in diverting resources away from enrichment opportunities, policing school communities to a point where students feel afraid to express themselves, and placing especially dangerous targets on students of color who are already disproportionately mislabeled and punished.ProPublica

++++++++++++++++
more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

Library Technology Conference 2019

#LTC2019

Intro to XR in Libraries from Plamen Miltenoff

keynote: equitable access to information

keynote spaker

https://sched.co/JAqk
the type of data: wikipedia. the dangers of learning from wikipedia. how individuals can organize mitigate some of these dangers. wikidata, algorithms.
IBM Watson is using wikipedia by algorythms making sense, AI system
youtube videos debunked of conspiracy theories by using wikipedia.

semantic relatedness, Word2Vec
how does algorithms work: large body of unstructured text. picks specific words

lots of AI learns about the world from wikipedia. the neutral point of view policy. WIkipedia asks editors present as proportionally as possible. Wikipedia biases: 1. gender bias (only 20-30 % are women).

conceptnet. debias along different demographic dimensions.

citations analysis gives also an idea about biases. localness of sources cited in spatial articles. structural biases.

geolocation on Twitter by County. predicting the people living in urban areas. FB wants to push more local news.

danger (biases) #3. wikipedia search results vs wkipedia knowledge panel.

collective action against tech: Reddit, boycott for FB and Instagram.

Mechanical Turk https://www.mturk.com/  algorithmic / human intersection

data labor: what the primary resources this companies have. posts, images, reviews etc.

boycott, data strike (data not being available for algorithms in the future). GDPR in EU – all historical data is like the CA Consumer Privacy Act. One can do data strike without data boycott. general vs homogeneous (group with shared identity) boycott.

the wikipedia SPAM policy is obstructing new editors and that hit communities such as women.

++++++++++++++++++

Twitter and Other Social Media: Supporting New Types of Research Materials

https://sched.co/JAWp

Nancy Herther Cody Hennesy

http://z.umn.edu/

twitter librarieshow to access at different levels. methods and methodological concerns. ethical concerns, legal concerns,

tweetdeck for advanced Twitter searches. quoting, likes is relevant, but not enough, sometimes screenshot

engagement option

social listening platforms: crimson hexagon, parsely, sysomos – not yet academic platforms, tools to setup queries and visualization, but difficult to algorythm, the data samples etc. open sources tools (Urbana, Social Media microscope: SMILE (social media intelligence and learning environment) to collect data from twitter, reddit and within the platform they can query Twitter. create trend analysis, sentiment analysis, Voxgov (subscription service: analyzing political social media)

graduate level and faculty research: accessing SM large scale data web scraping & APIs Twitter APIs. Jason script, Python etc. Gnip Firehose API ($) ; Web SCraper Chrome plugin (easy tool, Pyhon and R created); Twint (Twitter scraper)

Facepager (open source) if not Python or R coder. structure and download the data sets.

TAGS archiving google sheets, uses twitter API. anything older 7 days not avaialble, so harvest every week.

social feed manager (GWUniversity) – Justin Litman with Stanford. Install on server but allows much more.

legal concerns: copyright (public info, but not beyond copyrighted). fair use argument is strong, but cannot publish the data. can analyize under fair use. contracts supercede copyright (terms of service/use) licensed data through library.

methods: sampling concerns tufekci, 2014 questions for sm. SM data is a good set for SM, but other fields? not according to her. hashtag studies: self selection bias. twitter as a model organism: over-represnted data in academic studies.

methodological concerns: scope of access – lack of historical data. mechanics of platform and contenxt: retweets are not necessarily endorsements.

ethical concerns. public info – IRB no informed consent. the right to be forgotten. anonymized data is often still traceable.

table discussion: digital humanities, journalism interested, but too narrow. tools are still difficult to find an operate. context of the visuals. how to spread around variety of majors and classes. controversial events more likely to be deleted.

takedowns, lies and corrosion: what is a librarian to do: trolls, takedown,

++++++++++++++vr in library

Crague Cook, Jay Ray

the pilot process. 2017. 3D printing, approaching and assessing success or failure.  https://collegepilot.wiscweb.wisc.edu/

development kit circulation. familiarity with the Oculus Rift resulted in lesser reservation. Downturn also.

An experience station. clean up free apps.

question: spherical video, video 360.

safety issues: policies? instructional perspective: curating,WI people: user testing. touch controllers more intuitive then xbox controller. Retail Oculus Rift

app Scatchfab. 3modelviewer. obj or sdl file. Medium, Tiltbrush.

College of Liberal Arts at the U has their VR, 3D print set up.
Penn State (Paul, librarian, kiniseology, anatomy programs), Information Science and Technology. immersive experiences lab for video 360.

CALIPHA part of it is xrlibraries. libraries equal education. content provider LifeLiqe STEM library of AR and VR objects. https://www.lifeliqe.com/

+++++++++++++++++

Access for All:

https://sched.co/JAXn

accessibilityLeah Root

bloat code (e.g. cleaning up MS Word code)

ILLiad Doctype and Language declaration helps people with disabilities.

https://24ways.org/

 

+++++++++++++++++++

A Seat at the Table: Embedding the Library in Curriculum Development

https://sched.co/JAY5

embedded librarianembed library resources.

libraians, IT staff, IDs. help faculty with course design, primarily online, master courses. Concordia is GROWING, mostly because of online students.

solve issues (putting down fires, such as “gradebook” on BB). Librarians : research and resources experts. Librarians helping with LMS. Broadening definition of Library as support hub.

School Safety and Student Wellbeing

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: February 12, 2019
Leveraging Technology for the Improvement of School Safety and Student Wellbeing
A book edited by Dr. Stephanie Huffman, Dr. Stacey Loyless, Dr. Shelly Allbritton, and Dr. Charlotte Green (University of Central Arkansas)

Introduction
Technology permeates all aspects of today’s school systems. An Internet search on technology in schools can generate millions of website results. The vast majority of these websites (well over 8,000,000 results for one simple search) focuses on advice, activities, and uses of technology in the classroom. Clearly teaching and learning with technology dominates the literature and conversations on how technology should or could be used in classroom settings. A search on school safety and technology can produce more than 3,000,000 results with many addressing technological tools such as video cameras, entry control devices, weapon detectors, and other such hardware. However, in recent times, cyberbullying appears to dominate the Internet conversations in references to school safety. With an increase in school violence in the past two decades, school safety is a fundamental concern in our nation’s schools. Policy makers, educators, parents, and students are seeking answers in how best to protect the physical, emotional, and social well-being of all children.

 

Objective of the Book
The proposed edited book covers the primary topic of P-12 school safety and the use of technology and technology used for fostering an environment in which all students can be academically successful and thrive as global citizens.  School safety is defined as the physical, social, and emotional well-being of children. The book will comprise empirical, conceptual and case based (practical application) research that craft an overall understanding of the issues in creating a “safe” learning environment and the role technology can and should play; where a student’s well-being is valued and protected from external and internal entities, equitable access is treasured as a means for facilitating the growth of the whole student, and policy, practices, and procedures are implemented to build a foundation to transform the culture and climate of the school into an inclusive nurturing environment.

 

Target Audience
The target audience is leadership and education scholars, leadership practitioners, and technology coordinators.  This book will be used as a collective body of work for the improvement of K-12 schools and as a tool for improving leadership and teacher preparation programs. School safety is a major concern for educators.  Technology has played a role in creating unsafe environments for children; however it also is an avenue for addressing the challenges of school safety

Recommended topics include, but are not limited to, the following:

Section I – Digital Leadership

  • Technology as a Climate and Cultural Transformation Tool
    • School Leadership in the Digital Age: Building a Shared Vision for all Aspects of Learning and Teaching
  • Ensuring Equity within a “One to One” Technology Framework
    • Infrastructure within Communities
    • Accessible WiFi for Low SES Students
    • Developing Culturally Responsive Pedagogy
  • Professional Development for School Leaders

Section II – Well Being

  • Social Media and School Safety: Inputs and Outputs
    • Tip lines: Crime, Bullying, Threats
    • Communication and Transparency
    • Platform for Social Justice
  • Teaching Strategies to Promote Healthy Student Interactions in Cyberspace (Digital Citizenship?)
    • Building Capacity and Efficacy, Platform to lower incidence of Cyber-Bullying, Boosting Instructional Engagement
  • Literacy and Preparedness for the Influence and Consequence of Digital Media Marketing Campaigns directed toward Children, Adolescents, and Teens.
  • Pioneering Innovative Technology Program in Curriculum: Fostering “Belonging” beyond Athletics & Arts.

Section III- Infrastructure Safety

  • Campus/Facility Safety and Security
    • Rural Schools vs. Urban Schools
    • Digital A/V Systems
    • Background Check – Visitor Registration (i.e. Raptor)
  • Network Security Systems and Protocols
    • User Filtering and Monitoring
    • Firewalls
  • Policy
    • Appropriate use policies
    • Digital Citizenship
    • Web development policy
    • Privacy
    • Intellectual Property & Copyright

Section IV – Academic Success

  • Professional Development for Classroom Teachers
    • Pedagogical Integration of Technology
    • Instructional Coaching for Student Engagement
    • Increase Rigor with Technology
    • Competence in the Blended/Hybrid/Flipped Classroom
  • Technology to enhance learning for all
    • Assistive Technology
    • Accessibility issues
    • Internet access for Low SES Students in the Blended/Hybrid/Flipped Classroom
  • Personal Learning Design
    • Differentiation for Student Efficacy
    • Strategies for Increasing Depth of Knowledge
    • Design Qualities for Enhanced Engagement

Submission Procedure
Researchers and practitioners are invited to submit on or before February 12, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the purpose, methodology, and a brief summary findings of his or her proposed chapter. Authors will be notified by March 12, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 12, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. See Edited Chapter Template. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Leveraging Technology for the Improvement of School Safety and Student Wellbeing. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery®TM online submission manager. USE THE FOLLOWING LINK TO SUBMIT YOUR PROPOSAL.  https://www.igi-global.com/publish/call-for-papers/call-details/3709

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit http://www.igi-global.com. This publication is anticipated to be released in 2020.

Important Dates
February 12, 2019: Proposal Submission Deadline
March 12, 2019: Notification of Acceptance
June 12, 2019: Full Chapter Submission
August 10, 2019: Review Results Returned
August 10, 2019: Final Acceptance Notification
September 7, 2019: Final Chapter Submission

Inquiries can be forwarded to
Dr. Stephanie Huffman
University of Central Arkansas
steph@uca.edu or 501-450-5430

ELI 2018 Key Issues Teaching Learning

Key Issues in Teaching and Learning

https://www.educause.edu/eli/initiatives/key-issues-in-teaching-and-learning

A roster of results since 2011 is here.

ELI 2018 key issues

1. Academic Transformation

2. Accessibility and UDL

3. Faculty Development

4. Privacy and Security

5. Digital and Information Literacies

https://cdn.nmc.org/media/2017-nmc-strategic-brief-digital-literacy-in-higher-education-II.pdf
Three Models of Digital Literacy: Universal, Creative, Literacy Across Disciplines

United States digital literacy frameworks tend to focus on educational policy details and personal empowerment, the latter encouraging learners to become more effective students, better creators, smarter information consumers, and more influential members of their community.

National policies are vitally important in European digital literacy work, unsurprising for a continent well populated with nation-states and struggling to redefine itself, while still trying to grow economies in the wake of the 2008 financial crisis and subsequent financial pressures

African digital literacy is more business-oriented.

Middle Eastern nations offer yet another variation, with a strong focus on media literacy. As with other regions, this can be a response to countries with strong state influence or control over local media. It can also represent a drive to produce more locally-sourced content, as opposed to consuming material from abroad, which may elicit criticism of neocolonialism or religious challenges.

p. 14 Digital literacy for Humanities: What does it mean to be digitally literate in history, literature, or philosophy? Creativity in these disciplines often involves textuality, given the large role writing plays in them, as, for example, in the Folger Shakespeare Library’s instructor’s guide. In the digital realm, this can include web-based writing through social media, along with the creation of multimedia projects through posters, presentations, and video. Information literacy remains a key part of digital literacy in the humanities. The digital humanities movement has not seen much connection with digital literacy, unfortunately, but their alignment seems likely, given the turn toward using digital technologies to explore humanities questions. That development could then foster a spread of other technologies and approaches to the rest of the humanities, including mapping, data visualization, text mining, web-based digital archives, and “distant reading” (working with very large bodies of texts). The digital humanities’ emphasis on making projects may also increase

Digital Literacy for Business: Digital literacy in this world is focused on manipulation of data, from spreadsheets to more advanced modeling software, leading up to degrees in management information systems. Management classes unsurprisingly focus on how to organize people working on and with digital tools.

Digital Literacy for Computer Science: Naturally, coding appears as a central competency within this discipline. Other aspects of the digital world feature prominently, including hardware and network architecture. Some courses housed within the computer science discipline offer a deeper examination of the impact of computing on society and politics, along with how to use digital tools. Media production plays a minor role here, beyond publications (posters, videos), as many institutions assign multimedia to other departments. Looking forward to a future when automation has become both more widespread and powerful, developing artificial intelligence projects will potentially play a role in computer science literacy.

6. Integrated Planning and Advising Systems for Student Success (iPASS)

7. Instructional Design

8. Online and Blended Learning

In traditional instruction, students’ first contact with new ideas happens in class, usually through direct instruction from the professor; after exposure to the basics, students are turned out of the classroom to tackle the most difficult tasks in learning — those that involve application, analysis, synthesis, and creativity — in their individual spaces. Flipped learning reverses this, by moving first contact with new concepts to the individual space and using the newly-expanded time in class for students to pursue difficult, higher-level tasks together, with the instructor as a guide.

Let’s take a look at some of the myths about flipped learning and try to find the facts.

Myth: Flipped learning is predicated on recording videos for students to watch before class.

Fact: Flipped learning does not require video. Although many real-life implementations of flipped learning use video, there’s nothing that says video must be used. In fact, one of the earliest instances of flipped learning — Eric Mazur’s peer instruction concept, used in Harvard physics classes — uses no video but rather an online text outfitted with social annotation software. And one of the most successful public instances of flipped learning, an edX course on numerical methods designed by Lorena Barba of George Washington University, uses precisely one video. Video is simply not necessary for flipped learning, and many alternatives to video can lead to effective flipped learning environments [http://rtalbert.org/flipped-learning-without-video/].

Myth: Flipped learning replaces face-to-face teaching.

Fact: Flipped learning optimizes face-to-face teaching. Flipped learning may (but does not always) replace lectures in class, but this is not to say that it replaces teaching. Teaching and “telling” are not the same thing.

Myth: Flipped learning has no evidence to back up its effectiveness.

Fact: Flipped learning research is growing at an exponential pace and has been since at least 2014. That research — 131 peer-reviewed articles in the first half of 2017 alone — includes results from primary, secondary, and postsecondary education in nearly every discipline, most showing significant improvements in student learning, motivation, and critical thinking skills.

Myth: Flipped learning is a fad.

Fact: Flipped learning has been with us in the form defined here for nearly 20 years.

Myth: People have been doing flipped learning for centuries.

Fact: Flipped learning is not just a rebranding of old techniques. The basic concept of students doing individually active work to encounter new ideas that are then built upon in class is almost as old as the university itself. So flipped learning is, in a real sense, a modern means of returning higher education to its roots. Even so, flipped learning is different from these time-honored techniques.

Myth: Students and professors prefer lecture over flipped learning.

Fact: Students and professors embrace flipped learning once they understand the benefits. It’s true that professors often enjoy their lectures, and students often enjoy being lectured to. But the question is not who “enjoys” what, but rather what helps students learn the best.They know what the research says about the effectiveness of active learning

Assertion: Flipped learning provides a platform for implementing active learning in a way that works powerfully for students.

9. Evaluating Technology-based Instructional Innovations

Transitioning to an ROI lens requires three fundamental shifts
What is the total cost of my innovation, including both new spending and the use of existing resources?

What’s the unit I should measure that connects cost with a change in performance?

How might the expected change in student performance also support a more sustainable financial model?

The Exposure Approach: we don’t provide a way for participants to determine if they learned anything new or now have the confidence or competence to apply what they learned.

The Exemplar Approach: from ‘show and tell’ for adults to show, tell, do and learn.

The Tutorial Approach: Getting a group that can meet at the same time and place can be challenging. That is why many faculty report a preference for self-paced professional development.build in simple self-assessment checks. We can add prompts that invite people to engage in some sort of follow up activity with a colleague. We can also add an elective option for faculty in a tutorial to actually create or do something with what they learned and then submit it for direct or narrative feedback.

The Course Approach: a non-credit format, these have the benefits of a more structured and lengthy learning experience, even if they are just three to five-week short courses that meet online or in-person once every week or two.involve badges, portfolios, peer assessment, self-assessment, or one-on-one feedback from a facilitator

The Academy Approach: like the course approach, is one that tends to be a deeper and more extended experience. People might gather in a cohort over a year or longer.Assessment through coaching and mentoring, the use of portfolios, peer feedback and much more can be easily incorporated to add a rich assessment element to such longer-term professional development programs.

The Mentoring Approach: The mentors often don’t set specific learning goals with the mentee. Instead, it is often a set of structured meetings, but also someone to whom mentees can turn with questions and tips along the way.

The Coaching Approach: A mentor tends to be a broader type of relationship with a person.A coaching relationship tends to be more focused upon specific goals, tasks or outcomes.

The Peer Approach:This can be done on a 1:1 basis or in small groups, where those who are teaching the same courses are able to compare notes on curricula and teaching models. They might give each other feedback on how to teach certain concepts, how to write syllabi, how to handle certain teaching and learning challenges, and much more. Faculty might sit in on each other’s courses, observe, and give feedback afterward.

The Self-Directed Approach:a self-assessment strategy such as setting goals and creating simple checklists and rubrics to monitor our progress. Or, we invite feedback from colleagues, often in a narrative and/or informal format. We might also create a portfolio of our work, or engage in some sort of learning journal that documents our thoughts, experiments, experiences, and learning along the way.

The Buffet Approach:

10. Open Education

Figure 1. A Model for Networked Education (Credit: Image by Catherine Cronin, building on
Interpretations of
Balancing Privacy and Openness (Credit: Image by Catherine Cronin. CC BY-SA)

11. Learning Analytics

12. Adaptive Teaching and Learning

13. Working with Emerging Technology

In 2014, administrators at Central Piedmont Community College (CPCC) in Charlotte, North Carolina, began talks with members of the North Carolina State Board of Community Colleges and North Carolina Community College System (NCCCS) leadership about starting a CBE program.

Building on an existing project at CPCC for identifying the elements of a digital learning environment (DLE), which was itself influenced by the EDUCAUSE publication The Next Generation Digital Learning Environment: A Report on Research,1 the committee reached consensus on a DLE concept and a shared lexicon: the “Digital Learning Environment Operational Definitions,

Figure 1. NC-CBE Digital Learning Environment

the intellectual dark web

Nuance: A Love Story. My affair with the intellectual dark web

Meghan Daum Aug 24 https://medium.com/s/greatescape/nuance-a-love-story-ae6a14991059

the standard set of middle-class Democratic Party values: Public safety nets were a force for good, corporate greed was a real threat, civil and reproductive rights were paramount.

I remember how good it felt to stand with my friends in our matching college sweatshirts shouting “never again!” and “my body, my choice!”

(hey, why shouldn’t Sarah Palin call herself a feminist?) brought angry letters from liberals as well as conservatives.

We would all go to the mat for women’s rights, gay rights, or pretty much any rights other than gun rights. We lived, for the most part, in big cities in blue states.

When Barack Obama came into the picture, we loved him with the delirium of crushed-out teenagers, perhaps less for his policies than for being the kind of person who also listens to NPR. We loved Hillary Clinton with the fraught resignation of a daughter’s love for her mother. We loved her even if we didn’t like her. We were liberals, after all. We were family.

Words like “mansplaining” and “gaslighting” were suddenly in heavy rotation, often invoked with such elasticity as to render them nearly meaningless. Similarly, the term “woke,” which originated in black activism, was being now used to draw a bright line between those on the right side of things and those on the wrong side of things.

From the Black Guys on Bloggingheads, YouTube’s algorithms bounced me along a path of similarly unapologetic thought criminals: the neuroscientist Sam Harris and his Waking Up podcast; Christina Hoff Sommers, aka “The Factual Feminist”; the comedian turned YouTube interviewer Dave Rubin; the counter-extremist activist Maajid Nawaz; and a cantankerous and then little-known Canadian psychology professor named Jordan Peterson, who railed against authoritarianism on both the left and right but reserved special disdain for postmodernism, which he believed was eroding rational thought on campuses and elsewhere.

the sudden national obsession with female endangerment on college campuses struck me much the same way it had in the early 1990s: well-intended but ultimately infantilizing to women and essentially unfeminist.

Weinstein and his wife, the evolutionary biologist Heather Heying, who also taught at Evergreen, would eventually leave the school and go on to become core members of the “intellectual dark web.”

Weinstein talked about intellectual “feebleness” in academia and in the media, about the demise of nuance, about still considering himself a progressive despite his feeling that the far left was no better at offering practical solutions to the world’s problems than the far right.

an American Enterprise Institute video of Sommers, the Factual Feminist, in conversation with the scholar and social critic Camille Paglia — “My generation fought for the freedom for women to risk getting raped!” I watched yet another video in which Paglia sat by herself and expounded volcanically about the patriarchal history of art (she was all for it).

the brothers sat down together for a two-hour, 47-minute interview on theRubin Report,

James Baldwin’s line, “I love America more than any other country in the world, and, exactly for this reason, I insist on the right to criticize her perpetually

Jordan Peterson Twelve Rules for Life: An Antidote for Chaos, is a sort of New and Improved Testament for the purpose-lacking young person (often but not always male) for whom tough-love directives like “clean up your room!” go down a lot easier when dispensed with a Jungian, evo-psych panache.

Quillette, a new online magazine that billed itself as “a platform for free thought”

the more honest we are about what we think, the more we’re alone with our thoughts. Just as you can’t fight Trumpism with tribalism, you can’t fight tribalism with a tribe.

Identity Politics New Tribalism and the Crisis of Democracy

Fukuyama, F. (2018). Against Identity Politics: The New Tribalism and the Crisis of Democracy. Foreign Affairs97(5), 90–114. Retrieved from http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d131527250%26site%3dehost-live%26scope%3dsite

For the most part, twentieth-century politics was defined by economic issues. On the left, politics centered on workers, trade unions, social welfare programs, and redistributive policies. The right, by contrast, was primarily interested in reducing the size of government and promoting the private sector. Politics today, however, is defined less by economic or ideological concerns than by questions of identity. Now, in many democracies, the left focuses less on creating broad economic equality and more on promoting the interests of a wide variety of marginalized groups, such as ethnic minorities, immigrants and refugees, women, and lgbt people. The right, meanwhile, has redefined its core mission as the patriotic protection of traditional national identity, which is often explicitly connected to race, ethnicity,
or religion.

Again and again, groups have come to believe that their identities—whether national, religious, ethnic, sexual, gender, or otherwise—are not receiving adequate recognition. Identity politics is no longer a minor phenomenon, playing out only in the rarified confines of university campuses or providing a backdrop to low-stakes skirmishes in “culture wars” promoted by the mass media. Instead, identity politics has become a master concept that explains much of what is going on in global affairs.

Democratic societies are fracturing into segments based on ever-narrower identities,
threatening the possibility of deliberation and collective action by society as a whole. This is a road that leads only to state breakdown and, ultimately, failure. Unless such liberal democracies can work their way back to more universal understandings of human dignity,
they will doom themselves—and the world—to continuing conflict.

But in liberal democracies, equality under the law does not result in economic or social equality. Discrimination continues to exist against a wide variety of groups, and market economies produce large inequalities of outcome.

And the proportion of white working-class children growing up in single-parent families rose from 22 percent in 2000 to 36 percent in 2017.

Nationalists tell the disaffected that they have always been core members of a great
nation and that foreigners, immigrants, and elites have been conspiring to hold them down.

transforming liaison roles in research libraries

!*!*!*!*! — this article was pitched by Mark Vargas in the fall of 2013, back then dean of LRS and discussed at a faculty meeting at LRS in the same year—- !*!*!*!

New Roles for New Times: Transforming Liaison Roles in Research Libraries

https://conservancy.umn.edu/bitstream/handle/11299/169867/TransformingLiaisonRoles.pdf?sequence=1&isAllowed=y

(p. 4) Building strong relationships with faculty and other campus professionals, and establishing collaborative partnerships within and across institutions, are necessary building blocks to librarians’ success. In a traditional liaison model, librarians use their subject knowledge to select books and journals and teach guest lectures.

“Liaisons cannot be experts themselves in each new capability, but knowing when to call in a colleague, or how to describe appropriate expert capabilities to faculty, will be key to the new liaison role.

six trends in the development of new roles for library liaisons
user engagement is a driving factor
what users do (research, teaching, and learning) rather than on what librarians do (collections, reference, library instruction).
In addition, an ALA-accredited master’s degree in library science is no longer strictly required.
In a networked world, local collections as ends in themselves make learning fragmentary and incomplete. (p. 5)
A multi-institutional approach is the only one that now makes sense.
Scholars already collaborate; libraries need to make it easier for them to do so.
but they also advise and collaborate on issues of copyright, scholarly communication, data management, knowledge management, and information literacy. The base level of knowledge that a liaison must possess is much broader than familiarity with a reference collection or facility with online searching; instead, they must constantly keep up with evolving pedagogies and research methods, rapidly developing tools, technologies, and ever-changing policies that facilitate and inform teaching, learning, and research in their assigned disciplines.
In many research libraries, programmatic efforts with information literacy have been too narrowly defined. It is not unusual for libraries to focus on freshman writing programs and a series of “one-shot” or invited guest lectures in individual courses. While many librarians have become excellent teachers, traditional one-shot, in-person instructional sessions can vary in quality depending on the training librarians have received in this arena; and they neither scale well nor do they necessarily address broader curricular goals. Librarians at many institutions are now focusing on collaborating with faculty to develop thoughtful assignments and provide online instructional materials that are built into key courses within a curriculum and provide scaffolding to help students develop library research skills over the course of their academic careers.
And many libraries stated that they lack instructional designers and/or educational technologists on their staff, limiting the development of interactive online learning modules and tutorials. (my note: or just ignore the desire by unites such as IMS to help).

(p. 7). This move away from supervision allows the librarians to focus on their liaison responsibilities rather than on the day-to-day operations of a library and its attendant personnel needs.

effectively support teaching, (1.) learning, and research; (2.) identify opportunities for further development of tools and services; (3.) and connect students, staff, and faculty to deeper expertise when needed.

At many institutions, therefore, the conversation has focused on how to supplement and support the liaison model with other staff.

At many institutions, therefore, the conversation has focused on how to supplement and support the liaison model with other staff.

the hybrid exists within the liaison structure, where liaisons also devote a portion of their time (e.g., 20% or more) to an additional area of expertise, for example digital humanities and scholarly communication, and may work with liaisons across all disciplinary areas. (my note: and at the SCSU library, the librarians firmly opposed the request for a second master’s degree)

functional specialists who do not have liaison assignments to specific academic departments but instead serve as “superliaisons” to other librarians and to the entire campus. Current specialist areas of expertise include copyright, geographic information systems (GIS), media production and integration, distributed education or e-learning, data management, emerging technologies, user experience, instructional design, and bioinformatics. (everything in italics is currently done by IMS faculty).

divided into five areas of functional specialization: information resources and collections management; information literacy, instruction, and curriculum development; discovery and access; archival and special collections; scholarly communication and the research enterprise.

E-Scholarship Collaborative, a Research Support Services Collaborative (p. 8).

p. 9. managing alerts and feeds, personal archiving, and using social networking for teaching and professional development

p. 10. new initiatives in humanistic research and teaching are changing the nature and frequency of partnerships between faculty and the Libraries. In particular, cross-disciplinary Humanities Laboratories (http://fhi.duke.edu/labs), supported by the John Hope Franklin Humanities Institute and the Andrew W. Mellon Foundation-funded Humanities Writ Large project, have allowed liaisons to partner with faculty to develop and curate new forms of scholarship.

consultations on a range of topics, such as how to use social media to effectively communicate academic research and how to mark up historical texts using the Text Encoding Initiative (TEI) guidelines

p. 10. http://www.rluk.ac.uk/news/rluk-report-the-role-of-research-libraries-in-the-creation-archiving-curation-and-preservation-of-tools-for-the-digital-humanities/
The RLUK report identified a wide skills gap in nine key areas where future involvement of liaisons is considered important now and expected to grow

p. 11. Media literacy, and facilitating the integration of media into courses, is an area in which research libraries can play a lead role at their institutions. (my note: yet still suppressed or outright denied to IMS to conducts such efforts)

Purdue Academic Course Transformation, or IMPACT (http://www.lib.purdue.edu/infolit/impact). The program’s purpose is to make foundational courses at Purdue more student-centered and participatory. Librarians are key members of interdepartmental teams that “work with Purdue instructors to redesign courses by applying evidence-based educational practices” and offer “learning solutions” that help students engage with and critically evaluate information. (my note: as offered by Keith and myself to Miguel, the vice provost for undergrads, who left; then offered to First Year Experience faculty, but ignored by Christine Metzo; then offered again to Glenn Davis, who bounced it back to Christine Metzo).

p. 15. The NCSU Libraries Fellows Program offers new librarians a two-year appointment during which they develop expertise in a functional area and contribute to an innovative initiative of strategic importance. NCSU Libraries typically have four to six fellows at a time, bringing in people with needed skills and working to find ongoing positions when they have a particularly good match. Purdue Libraries have experimented with offering two-year visiting assistant professor positions. And the University of Minnesota has hired a second CLIR fellow for a two-year digital humanities project; the first CLIR fellow now holds an ongoing position as a curator in Archives and Special Collections. The CLIR Fellowship is a postdoctoral program that hires recent PhD graduates (non-librarians), allowing them to explore alternative careers and allowing the libraries to benefit from their discipline-specific expertise.

ECAR Study of Undergraduate Students and Information Technology, 2017

ECAR Study of Undergraduate Students and Information Technology, 2017

  • Students would like their instructors to use more technology in their classes.Technologies that provide students with something (e.g., lecture capture, early-alert systems, LMS, search tools) are more desired than those that require students to give something (e.g., social media, use of their own devices, in-class polling tools). We speculate that sound pedagogy and technology use tied to specific learning outcomes and goals may improve the desirability of the latter.
  • Students reported that faculty are banning or discouraging the use of laptops, tablets, and (especially) smartphones more often than in previous years. Some students reported using their devices (especially their smartphones) for nonclass activities, which might explain the instructor policies they are experiencing. However, they also reported using their devices for productive classroom activities (e.g., taking notes, researching additional sources of information, and instructor-directed activities).

++++++++++++++
more on ECAR studies in this IMS blog
https://blog.stcloudstate.edu/ims?s=ecar

corporate monopoly or public control net neutrality

Net Neutrality is just the beginning

Interview with Victor Pickard

Victor Pickard, associate professor of communication at the University Pennsylvania’s Annenberg School, whose research focuses on internet policy and the political economy of media.

https://www.academia.edu/35305972/Net_Neutrality_Is_Just_the_Beginning

https://www.jacobinmag.com/2017/11/net-neutrality-fcc-ajit-pai-monopoly

with each new victory for the American telecommunications oligopoly, that digital optimism fades further from view.

Definition:

Net neutrality protections are essentially safeguards that prevent internet service providers (ISPs) from interfering with the internet. Net neutrality gives the FCC the regulatory authority to prevent ISPs like Comcast and Verizon from slowing down or blocking certain types of content. It also prevents them from offering what’s known as paid prioritization, where an ISP could let particular websites or content creators pay more for faster streaming and download times. With paid prioritization an ISP could shake down a company like Netflix or an individual website owner, coercing them to pay more in order to be in the fast lane.

Net neutrality often gets treated as a sort of technocratic squabble over ownership and control of internet pipes. But in fact it speaks to a core social contract between government, corporations, and the public. What it really comes down to is, how can members of the public obtain information and services, and express ourselves creatively and politically, without interference from massive corporations?

Should we think of the internet as a good, a service, an infrastructure, or something else?

It’s all of the above.

The internet has been radically privatized. It wasn’t inevitable, but through policy decisions over the years, the internet has become increasingly commodified. Meanwhile it’s really difficult to imagine living in modern society without fast internet services — it’s no longer a luxury but a necessity for everything ranging from education to health to livelihood. The “digital divide” is a phrase that sounds like it’s from the 1990s, but it’s still very relevant. Somewhere around one fifth of American households don’t have access to wireline broadband services. It’s a social problem. We should be thinking about the internet as a public service and subsidizing it to make sure that everyone has access.

In your recent book on media democracy, you discuss the rise of what you call “corporate libertarianism.” What is corporate libertarianism and how does it relate to net neutrality?

Corporate libertarianism is an ideological project that has origins at a core moment in the 1940s. It sees corporations as having individual freedoms, like those in the First Amendment, which they can use to shield themselves from public interest oversight and regulation. It’s also often connected to this assumption that the government should never intervene in markets, and media markets in particular. (My note: Milton Friedman)

Of course, this is a libertarian mythology — the government is always involved. The question ought to be how it should be involved. Under corporate libertarianism it’s assumed that the government should only be involved in ways that enhance profit maximization for communication oligopolies.

There are clear dangers associated with vertical integration, where the company that owns the pipes is able to control the dissemination of information, and able to set the terms by which we access that information.
There have been cases like this already. In 2005, the company Telus, which is the second largest telecommunications company in Canada, began blocking access to a server that hosted a website that supported a labor strike against Telus.

Net neutrality is just one part of the story. What other regulations, policies and interventions could resist corporate control of the internet?

Roughly half of Americans live in communities that have access to only one ISP.  My note: Ha Ha Ha, “pick me, pick me,” as Dori from “Finding Nemo” will say… Charter, whatever they will rename themselves again, is the crass example in Central MN.

Strategies to contain and confront monopolies:

  • break them up, and to prevent monopolies and oligopolies from happening in the first place by blocking mergers and acquisitions.
  • if we’re not going to outright nationalize them then we want to heavily regulate them, and enforce some kind of social contract where they’re compelled to provide a public service in exchange for the right to operate.
  • create public alternatives, like municipal wireless networks that can circumvent and compete with corporate monopolies. There’s a growing number of these publicly owned and governed internet infrastructures, and building more is crucial.

+++++++++++++
more on #netNeutrality in this IMS blog
https://blog.stcloudstate.edu/ims?s=netneutrality

1 2 3 4 5