In the Age of AI

In The Age Of A.I. (2019) — This just aired last night and it’s absolutely fantastic. It presents a great look at AI, and it also talks about automation, wealth inequality, data-mining and surveillance.
byu/srsly_its_so_ez inDocumentaries

13 min 40 sec = Wechat

14 min 60 sec = data is the new oil and China is the new Saudi Arabia

18 min 30 sec = social credit and facial recognition

++++++++++
more on deep learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=deep+learning

information gerrymandering

Information gerrymandering in social networks skews collective decision-making

https://www.nature.com/articles/d41586-019-02562-z

https://www.facebook.com/mariana.damova/posts/10221298893368558

An analysis shows that information flow between individuals in a social network can be ‘gerrymandered’ to skew perceptions of how others in the community will vote — which can alter the outcomes of elections.

The Internet has erased geographical barriers and allowed people across the globe to interact in real time around their common interests. But social media is starting to compete with, or even replace, nationally visible conversations in print and on broadcast media with ad libitum, personalized discourse on virtual social networks3. Instead of broadening their spheres of association, people gravitate towards interactions with ideologically aligned content and similarly minded individuals.

n information gerrymandering, the way in which voters are concentrated into districts is not what matters; rather, it is the way in which the connections between them are arranged (Fig. 1). Nevertheless, like geographical gerrymandering, information gerrymandering threatens ideas about proportional representation in a democracy.

Figure 1 | Social-network structure affects voters’ perceptions. In these social networks, ten individuals favour orange and eight favour blue. Each individual has four reciprocal social connections. a, In this random network, eight individuals correctly infer from their contacts’ preferences that orange is more popular, eight infer a draw and only two incorrectly infer that blue is more popular. b, When individuals largely interact with like-minded individuals, filter bubbles arise in which all individuals believe that their party is the most popular. Voting gridlock is more likely in such situations, because no one recognizes a need to compromise. c, Stewart et al.1 describe ‘information gerrymandering’, in which the network structure skews voters’ perceptions about others’ preferences. Here, two-thirds of voters mistakenly infer that blue is more popular. This is because blue proponents strategically influence a small number of orange-preferring individuals, whereas orange proponents squander their influence on like-minded individuals who have exclusively orane-preferring contacts, or on blue-preferring individuals who have enough blue-preferring contacts to remain unswayed.

Positioning the Academic Library within the Institution

Positioning the Academic Library within the Institution: A Literature Review

John Cox, Galway, Ireland, May 2018

https://doi.org/10.1080/13614533.2018.1466342

Higher education institutions are experiencing radical change, driven by greater accountability, stronger competition, and increased internationalization. They prioritize student success, competitive research, and global reputation. This has significant implications for library strategy, space, structures, partnerships, and identity. Strategic responses include refocusing from collections to users, reorganizing teams and roles, developing partnerships, and demonstrating value. Emphasis on student success and researcher productivity has generated learning commons buildings, converged service models, research data management services, digital scholarship engagement, and rebranding as partners. Repositioning is challenging, with the library no longer perceived as the heart of the campus but institutional leadership often holding traditional perceptions of its role.

Mastery of Library Instruction badge

Greetings all,

From your embedded librarian.

My name is Plamen Miltenoff (https://web.stcloudstate.edu/pmiltenoff/faculty/)  and I am InforMedia Specialist with the SCSU Library (https://blog.stcloudstate.edu/ims/free-tech-instruction/)

Dr. Sivaprakasam and I are developing a microcredentialing system for your class.

The “library” part has several components:

  • One badge for your ability to use the databases and find reliable scientific information in your field (required)
  • One badge for your ability to use social media for a serious, reliable, scientific research (required)
  • One badge for using the D2L “embedded librarian” widget to contact the librarian with questions regarding your class research (optional)
  • One badge for helping class peer with his research (optional)

Collecting two of the required and one of the optional badges let you earn the superbadge “Mastery of Library Instruction.”

The superbadge brings points toward your final grade.

paper handouts workshops Fall 2019 IMS instructional sessions

Mastery in Lib Instruciton badge

instruction

For the remaining of the class, please collect the superbadge                         by:

–       Provide at least 5 peer-reviewed articles regarding your research
to earn the “database” badge 
databases badge
–       Provide proof of participation at least in one LinkedIn professional group from your field

 

–       Either contact the embedded librarian with questions
regarding your research
or-       Provide proof of helping a class peer with their research
or

Link to MS Word document:
https://mnscu-my.sharepoint.com/:w:/r/personal/yg5734wd_minnstate_edu/Documents/conferences%20grants/grants/sharktank/CHEm%20491%20students%20instruction%20lib%20instruction%20badge.docx?d=w3b4c527fe9994b96809d7657017973a3&csf=1&e=RoNggi

Teaching Cybersecurity

Teaching Cybersecurity: What You Need to Know

Wednesday, Nov. 13 @ 4 pm CT

REGISTER HERE

In 2014, there were 1 million unfilled cybersecurity jobs globally. By 2021, it’s estimated that number will grow to 3.5 million. Exposing K-12 students to cybersecurity through a well-designed curriculum and set of activities will help alleviate the shortage by increasing the interest and skills of the new generation. Unfortunately, current secondary school curricula across the country leave students and educators with minimal or no exposure to cybersecurity topics.
Many K-12 school districts are looking for ways to create cybersecurity training programs. This edWebinar will focus on best practices for teaching and learning cybersecurity skills, including the following learning objectives:
  • What skills does the instructor need to teach an introductory cybersecurity course?
  • What are some best practices for teaching an introductory cybersecurity course?
  • Where can instructors get help teaching their courses?
  • What tools/resources do students and instructors need to teach an introductory cybersecurity course?
This edWebinar will be of interest to middle school through higher education teachers and school and district leaders. There will be time to have your questions answered at the end of the presentation. Learn more.

++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

required books

Required reading: The books that students read in 28 countries around the world

Dec 7, 2016  + 

Required reading: The books that students read in 28 countries around the world

Afghanistan

Quran
Albania

Kronikë në gur (1971) by Ismail Kadare
Chronicle in Stone

Australia

Tomorrow, When the War Began (1993) by John Marsden

Austria

Faust (1787) by Johann Wolfgang von Goethe

Bosnia; Serbia

Na drini ćuprija (1945) by Ivo Andrić
The Bridge on the Drina

Brazil

Morte e vida Severina (1955) by João Cabral de Melo Neto
The Death of a Severino

Bulgaria

Under the Yoke (1894) by Ivan Vazov

Canada

The Wars (1977) by Timothy Findley

Chile

Sub Terra (1904) by Baldomero Lillo

China

Analects by Confucius

Colombia

Cien años de Soledad (1967) by Gabriel García Márquez
100 Years of Solitude

Cyprus

The Murderess (1903) by Alexandros Papadiamantis

Egypt

The Days (1935) by Taha Hussein

Finland

Seitsemän veljestä (1870) by Aleksis Kivi
Seven Brothers

Germany

Tagebuch der Anne Frank (1947)
The Diary of Anne Frank

Ghana; Nigeria

Things Fall Apart (1958) by Chinua Achebe

Indonesia

Laskar Pelangi (2005) by Andrea Hirata
Rainbow Troop

India

Autobiography: The Story of My Experiments With Truth (1927-1929) by Mohandas K. Gandhi

Iran

Poems by writers such as HafizSa’AddiFerdowsiRumi and Khayyam

Ireland

Ice Man: the Adventures of an Irish Antarctic Hero (2010) by Michael Smith

Italy

I Promessi Sposi (1827) by Alessandro Manzoni
The Betrothed

Pakistan

The Reluctant Fundamentalist (2007) by Mohsin Hamid

Philippines

Noli Me Tangere (1887) by Jose Rizal
Touch Me Not

Russia

War and Peace (1869) by Leo Tolstoy

US

To Kill A Mockingbird (1960) by Harper Lee

Vietnam

Truyện Kiều (1820) by Nguyễn Du

The Tale of Kiu, the poem

 

surveillance in schools

https://www.edsurge.com/news/2019-10-22-high-tech-surveillance-comes-at-high-cost-to-students-is-it-worth-it

The phrase “school-to-prison pipeline” has long been used to describe how schools respond to disciplinary problems with excessively stringent policies that create prison-like environments and funnel children who don’t fall in line into the criminal justice system. Now, schools are investing in surveillance systems that will likely exacerbate existing disparities.

number of tech companies are capitalizing on the growing market for student surveillance measures as various districts and school leaders commit themselves to preventing acts of violence. Rekor Systems, for instance, recently announced the launch of OnGuard, a program that claims to “advance student safety” by implementing countless surveillance and “threat assessment” mechanisms in and around schools.

While none of these methods have been proven to be effective in deterring violence, similar systems have resulted in diverting resources away from enrichment opportunities, policing school communities to a point where students feel afraid to express themselves, and placing especially dangerous targets on students of color who are already disproportionately mislabeled and punished.ProPublica

++++++++++++++++
more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

1 150 151 152 153 154 493