http://www.businessinsider.com/tinder-date-portraits-2014-9?op=1#ixzz3ELVpR5XP
"It is my hope that people will look beyond the initial voyeuristic appeal and see the piece as a social commentary about how we connect with each other in a digital world," Cheers says, adding that personally, she thinks it's a little unhealthy to "shop" for a mate.
http://fcw.com/articles/2014/09/23/online-privacy-new-security-paradigm.aspx
Verizon’s 2014 Data Breach Investigations Report,
Fragmentation of online identity means that we as online users are forced to struggle with proliferating accounts and passwords. And we are regularly required to reveal sensitive information about ourselves and repeatedly enter the same information to create accounts that establish new, disparate online identities.
Establishing a system for trust management requires a common infrastructure for specifying policies that can protect yet enable access to data and systems, representing identities and credentials, and evaluating and enforcing an organization’s policies — all while maintaining privacy.
by Kevin Smith, M.L.S., J.D., Lisa A. Macklin, J.D.,M.L.S., Anne Gilliland, JD, MLS
thread Wk 1 – T2: Copyright: Shortened or Lengthened? – PART 1
Follow the money” was mentioned as a way to understand the concept of copyright and copyright law
Copyright lengths should be shortened. Term lengths like these rarely benefit actual people. They benefit corporations, be it publishers or things like Disney.
Karen Lightner: I can see the usefulness of bringing the US into line with the Berne Convention, so that we are in line with other nations’ laws. But the additional 20 years we have added for individuals and the incredibly long period for corporations goes against, I believe, what the founding fathers intended when they specified for a limited time.
Edwin A Quist: There are collections of so-called production music issued with licenses to be used for educational videos. We have at least two sets of these in our music library (in various styles: rock ,classical, world, electronic, etc.) — but don’t expect great art! Also WikiMedia Commons has some CC licensed music.
Brad Whitehead: I have no quarrel with protecting corporate trademarks — Disney characters or Nike swooshes, etc. — but maintaining monopolies on creative works for such extended periods primarily enriches publishers with no benefit to the creators.
Nicholas Theo: There are definitely works created where it can be next to impossible to find the owner, or their descendant 20 years after the creation of the work. I have also witnessed when you do track these people down that they want an exorbitant sum of money for permission to use their creation even when there has been absolutely no interest in it. In the end no deal is made. On the other hand I work with two small non profit organizations whose body of work is of value. The material is actively used, and the body of work is a core asset for the organization. What happens to each organization once the copyrights expire? One organization faces this reality in 2015. The Internet permits an environment where decades of work may be used, and in some instances in ways the original material was never intended to be used. For instance, written passages can be misquoted and there will no longer be a legal mechanism to halt this practice.
Karen Case: I would be curious to know if the Youtube video with Mozart would have been removed if the link was made private.
Susan Martel: I think about The Hobbit which was published in 1937. The author, Tolkien, died in 1973, and I remember his books being popular in the seventies and the eighties. It was fairly recently that movies were made based on his books. It seems fair (and I hope that it is the case) that he left a great legacy behind to his family so that they could continue to receive income from his work. If Tolkien’s works were in the public domain by the time the movies were made, it is just an easy way for those working in the movie industry to become even wealthier without having to pay anything to the author or his beneficiaries. Not all works have the kind of potential that Tolkien’s did, but without a crystal ball to predict the future it may be difficult to predict accurately what works will have continued success for generations and which will just be a flash in the pan.
Charles N. Norton: There is something called “Good Faith” effort that many archives hold to that tends to be the “standard” when trying to use copyrighted material for educational use, but it really only applies when you know who the copyright holder is and for whatever reason they simply do not respond to your requests. It does not remove the authors rights and, in fact, many times one does end up having to remove shared material after the fact because the copyright holders finally does get around to denying permission.
Lesli Moore: I’m glad to see some discussion about Open Access to works. Perhaps instead of shortening the term, creators can circumvent the terms by offering open access using Creative Commons.
Jef Gielen: There are pros and cons. Do we find it reasonable that heirs take benefit from a work they did not contribute to at all ? To me, this is not evident. On the other hand, the copyright can be in hand of foundations trying to continue the work of an author – e.g. by means of scholarships. That’s another story ..
Resources:
Here is a complete list of all the suggested readings for the Copyright for Educations and Librarians Course. Click here for a downloadable PDF version of the Suggested Readings that contains the full URL links.
Week 1
- The Copyright Law of the United States, Title 17 of the U.S. Code. Please scan the section headings to gain a general idea of the structure of the law.
- United States Copyright Office website, at http://copyright.gov/. Please read circular #1, “ Copyright Basics.”
- James Boyle, The Public Domain: Enclosing the Commons of the Mind (New Haven: Yale University Press, 2008. PDF book version. Please read Chapter One, “Why Intellectual Property?”
- Peter Hirtle, Emily Hudson & Andrew Kenyon, Copyright & Cultural Institutions: Guidelines for Digitization (Cornell University Library, 2009). Please read chapters 1 & 2.
- Kevin Smith & Lisa Macklin, Handout on “A Framework for Analyzing any Copyright Problem.”
Week 2
- The Copyright Law of the United States, Title 17 of the U.S. Code. Please read sections 101 through 106 and section 109.
- United States Copyright Office website, at http://copyright.gov/. Please read circulars 9 (“Work Made for Hire under the 1976 Copyright Act“) and 21 (“Reproductions of Copyrighted Works by Educators and Librarian”).
- Peter Hirtle, “Copyright and the Public Domain in the United States,” online chart.
- Peter Hirtle, Emily Hudson & Andrew Kenyon, Copyright & Cultural Institutions: Guidelines for Digitization (Cornell University Library, 2009). Please read chapters 3 & 4.
- “Copyright Law & Public Domain,” a series of short essays from NOLO, Law for All, at.
Week 3
- The Copyright Law of the United States, Title 17 of the U.S. Code. Available at http://www.copyright.gov/title17/. Please read sections 108 and 110.
- Peter Hirtle, Emily Hudson & Andrew Kenyon, Copyright & Cultural Institutions: Guidelines for Digitization (Cornell University Library, 2009). Please read chapter 6.
- Peggy Hoon, “The Original TEACH Act Toolkit.”
- Creative Commons website at . Please read the “Choose a license” page and “About the Licenses“.
- Copyright and Fair Use, Stanford University Libraries, “The Basics of Getting Permission” athttp://fairuse.stanford.edu/overview/introduction/getting-permission/.
- “Permissions,” Copyright Advisory Office, Columbia University Libraries.
- David R. Hansen, Copyright Reform Principles for Libraries, Archives, and Other Memory Institutions, 29 Berkeley Tech. L.J. (forthcoming 2014).
Samples:
OPTIONAL – Resources on music copyright:
Sources for examples:
For the history behind the controversy over “The Lion Sleeps Tonight,” listen to these three YouTube videos:
Week 4
Obama Adviser John Podesta: ‘Every Country Has a History of Going Over the Line’
http://www.spiegel.de/international/germany/interview-with-obama-advisor-john-podesta-on-nsa-and-cyber-security-a-978297.html
Instead of a no-spy deal, the US has begun a Cyber Dialogue with Germany. In a SPIEGEL interview, John Podesta, a special adviser to President Barack Obama, speaks of the balance between alliances and security and says that changes are being made to NSA espionage practices.
Pls consider the following additional resources on the topic:
Power, Privacy, and the Internet
http://www.nybooks.com/blogs/gallery/2014/feb/07/power-privacy-and-internet-conference/
- Governments, Corporations and Hackers: The Internet and Threats to the Privacy and Dignity of the Citizen:
https://api.soundcloud.com/tracks/126066881/download?secret_token=s-QvmZz&client_id=0f8fdbbaa21a9bd18210986a7dc2d72c
- The Internet and the Future of the Press
https://api.soundcloud.com/tracks/126066391/download?secret_token=s-v6mpP&client_id=0f8fdbbaa21a9bd18210986a7dc2d72c
- The Internet, Repression and Dissent
https://api.soundcloud.com/tracks/126066389/download?secret_token=s-Udzom&client_id=0f8fdbbaa21a9bd18210986a7dc2d72c
Merkel calls for separate EU internet
http://www.aljazeera.com/video/europe/2014/02/merkel-calls-separate-eu-internet-201421955226908928.html
http://www.ted.com/talks/edward_snowden_here_s_how_we_take_back_the_internet
The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/
The Overworked Bachelor’s Degree Needs a Makeover
http://m.chronicle.com/article/The-Overworked-Bachelors/147105
see also our blog post: Generation Z – the time of emojis approaching
Advanced college degrees are less important to them. 64% of Gen Z-ers are considering an advanced college degree, compared to 71% of millennials.
http://www.businessinsider.com/generation-z-spending-habits-2014-6#ixzz35nFL8oRS
What’s desperately needed is a bachelor’s-degree makeover, one that isolates the liberal-arts education everyone needs in a fast-changing global economy and is flexible enough to accommodate the demand for skills training throughout one’s life.
Do Digital Natives Really Exist?
http://blogs.kqed.org/mindshift/2013/12/do-digital-natives-really-exist/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+kqed%2FnHAK+%28MindShift%29
it’s an accurate depiction of the current generation of students? No one is born with knowledge. Everything is learned through environment and practice, so maybe it’s time to reexamine long held assumptions about students’ relationships to technology.
http://www.casel.org/social-and-emotional-learning/core-competencies
- Self-awareness: The ability to accurately recognize one’s emotions and thoughts and their influence on behavior. This includes accurately assessing one’s strengths and limitations and possessing a well-grounded sense of confidence and optimism.
- Self-management: The ability to regulate one’s emotions, thoughts, and behaviors effectively in different situations. This includes managing stress, controlling impulses, motivating oneself, and setting and working toward achieving personal and academic goals.
- Social awareness: The ability to take the perspective of and empathize with others from diverse backgrounds and cultures, to understand social and ethical norms for behavior, and to recognize family, school, and community resources and supports.
- Relationship skills: The ability to establish and maintain healthy and rewarding relationships with diverse individuals and groups. This includes communicating clearly, listening actively, cooperating, resisting inappropriate social pressure, negotiating conflict constructively, and seeking and offering help when needed.
- Responsible decision making: The ability to make constructive and respectful choices about personal behavior and social interactions based on consideration of ethical standards, safety concerns, social norms, the realistic evaluation of consequences of various actions, and the well-being of self and others.
http://www.nybooks.com/articles/archives/2013/nov/07/are-we-puppets-wired-world/
Are We Puppets in a Wired World?
But while we were having fun, we happily and willingly helped to create the greatest surveillance system ever imagined, a web whose strings give governments and businesses countless threads to pull, which makes us…puppets. The free flow of information over the Internet (except in places where that flow is blocked), which serves us well, may serve others better. Whether this distinction turns out to matter may be the one piece of information the Internet cannot deliver.
by Evgeny Morozov
PublicAffairs, 413 pp., $28.99
by Cole Stryker
Overlook, 255 pp., $25.95
by John Naughton
Quercus, 302 pp., $24.95
by Eric Siegel
Wiley, 302 pp., $28.00
by Viktor Mayer-Schönberger and Kenneth Cukier
Eamon Dolan/Houghton Mifflin Harcourt, 242 pp., $27.00
by Alice E. Marwick
Yale University Press, 368 pp., $27.50
by Terence Craig and Mary E. Ludloff
O’Reilly Media, 108 pp., $19.99 (paper)
5 Excellent Videos to Teach Your Students about Digital Citizenship ~ Educational Technology and Mobile Learning
bibliography:
Ramspott’s blog entry best written for my personal taste, but here is a long list of additional and similar opinions:
Bramman, R. (n.d.). Digital Identity Essentials: Understanding Online Etiquette and the Rules Social Media Engagement. Research Personal Branding. Retrieved October 3, 2013, from http://www.reachpersonalbranding.com/digital-identity-essentials-understanding-online-etiquette-and-the-rules-social-media-engagement/
Dalton, J. C., & Crosby, P. C. (2013). Digital Identity: How Social Media Are Influencing Student Learning and Development in College. Journal of College and Character, 14(1), 1–4. doi:10.1515/jcc-2013-0001
++++++++++++++++++++++++++++++++++++++++
Teach Digital Citizenship with … Minecraft
http://askatechteacher.wordpress.com/2013/10/03/teach-digital-citizenship-with-minecraft/
In the summer, there was an article about physics professor using Minecraft, but that’s not new because an MIT physics professor was using rap in the down of podcasting to teach physics and then another one later on was using Second Life. All of them gone by now…
From: Ewing, M Keith
Sent: Monday, September 30, 2013 4:43 PM
Subject: Eric Stoller on Digital Identity
A couple of interesting links to comments by Eric Stoller on “digital identity” – which he defines as “made up of their online interactions and exchanges.”
Character Clearinghouse – Interview with Eric Stoller, 2013 Jon C. Dalton Institute on College Student Values, Keynote Speaker
https://characterclearinghouse.fsu.edu/index.php/jon-c-dalton-institute-on-college-student-values/keynote-speakers/925-stoller
Digital Identity Keynote at Curry College (full video is about 63 minutes; includes transcript of the Twitter stream about his talk)
http://ericstoller.com/blog/2013/06/21/digital-identity-keynote-at-curry-college/
Eric might make a good speaker to students (and faculty) …
my (Plamen) note: Keith’s email and his suggestions for readings, e.g.
http://www.degruyter.com/view/j/jcc.2013.14.issue-1/jcc-2013-0001/jcc-2013-0001.xml
connects with “contemplative computing” and Turkle’s disconnect, so I am entering as tags