Artificial intelligence could erase many practical advantages of democracy, and erode the ideals of liberty and equality. It will further concentrate power among a small elite if we don’t take steps to stop it.
liberal democracy and free-market economics might become obsolete.
The Russian, Chinese, and Cuban revolutions were made by people who were vital to the economy but lacked political power; in 2016, Trump and Brexit were supported by many people who still enjoyed political power but feared they were losing their economic worth.
artificial intelligence is different from the old machines. In the past, machines competed with humans mainly in manual skills. Now they are beginning to compete with us in cognitive skills. And we don’t know of any third kind of skill—beyond the manual and the cognitive—in which humans will always have an edge.
Israel is a leader in the field of surveillance technology, and has created in the occupied West Bank a working prototype for a total-surveillance regime.
The conflict between democracy and dictatorship is actually a conflict between two different data-processing systems. AI may swing the advantage toward the latter.
As we rely more on Google for answers, our ability to locate information independently diminishes. Already today, “truth” is defined by the top results of a Google search.
The race to accumulate data is already on, and is currently headed by giants such as Google and Facebook and, in China, Baidu and Tencent. So far, many of these companies have acted as “attention merchants”—they capture our attention by providing us with free information, services, and entertainment, and then they resell our attention to advertisers.
We aren’t their customers—we are their product.
Nationalization of data by governments could offer one solution; it would certainly curb the power of big corporations. But history suggests that we are not necessarily better off in the hands of overmighty governments.
Blockchain: Recommendations for the Information Profession
Monday, September 24, 2018 12:00 pm
Central Daylight Time (Chicago, GMT-05:00)
Blockchain technology is being discussed widely, but without clear directions for library applications. The Blockchain National Forum, funded by IMLS and held at San Jose State University’s iSchool in Summer 2018, brought together notable experts in the information professions, business, government, and urban planning to discuss the issues and develop recommendations on the future uses of blockchain technology within the information professions. In this free webinar, Drs. Sandy Hirsh and Sue Alman, co-PIs of the project, will present the recommendations made throughout the year in the Blockchain blog, Library 2.0 Conference,Blockchain Applied: Impact on the Information Profession, and the National Forum.
Q/S TO ASK: WHAT KINDS OF DATA AND RECORDS MUST BE STORED AND PRESERVES exactly the way they were created (provenance records, transcripts). what kinds of info are at risk to be altered and compromised by changing circumstances (personally identifiable data)
515 rule: BC can be hacked if attacked by a group of miners controlling more than 50% of the network
Standards Issues: BC systems- open ledger technology for managing metadata. baseline standards will impact future options. can BC make management of metadata worth. Is it worth, or more cautious.
Potential Use cases: archives and special collections where provenance and authenticity are essential for authoritative tracking. digital preservation to track distributed digital assets. BC-based currencies for international financial transactions (to avoid exchange rates ILL and publishing) . potential to improve ownership and first sale record management. credentialing: personal & academic documents (MIT already has transcripts and diplomas of students in BC – personal data management and credentialing electronically).
public libraries: house docs of temporarily displaced or immigrants. but power usage and storage usage became problems.
a city south of Denver CO is build right now, and will be build on these principles.
benefits for recordkeeping: LOCKSS (lot of copies keeps stuff safe) – Stanford U; chain of custody (SAA Glossary); Trust and Immutability (BC) vs confidentiality and performance (dbase)
Libarians role: need to understand BC (how does it work and what can it do for us; provide BC education for users; use BC in various applications
recommendations from National Forum:
ASIS&T presentation in Vancouver, Nov. 2018; MOOC on BLockchain Basics; Libary Futures Series, BOok3 Alman & Hirsh
My notes: this is a 1997 article
the explosion of information is not accompanied by understanding of information.
p. 337 However, if one accepts a definition of information as a process rather than as a thing, then such policies can at best form a framework for the creation of mean- ing by the individuals or groups who are creating information by bring- ing their knowledge to bear on the data available to them
Data acquisition, maintenance and delivery are a vital part of organisational life, but problems arise when we fail to recognise the necessary links to knowledge.
p. 338 However, just teaching users the practi- calities of applications has been seen to be deficient. It leads to an exces- sive focus on ‘how’ to use a particular application rather than on ‘why’ it should be used 13.
p. 379 Information literacy is a stage above computer literacy, the latter usually implying the ability to use a personal computer . My note: some librarians assume that “computer literacy” is the same as “digital literacy” and were trying to convince me that information literacy is succeeding digital literacy, where it is the other way around
p. 380 There are those within the LIS community who warn that librar- ians should not stray into areas that are not appropriate. Behrens points out that the future is likely to see an increased emphasis on a part- nership between librarians and educators. My note another glaring discrepancy between myself and the librarians at SCSU
p. 386 The phrase information literacy has some value in expressing what might need to be done if the aims of information policies are to be made concrete. It points to the need for an emphasis on the awareness of the individual using data of a range of issues. These are not, it has been argued, to be limited to issues of storage and retrieval but have, centrally, to be concerned with issues of definition and meaning. These issues might be tackled in this order: what are the issues in this field surround- ing the nature of knowledge (i.e. how do we formulate questions); how might data be best acquired, stored, etc. in order to answer these ques- tions? (this might well best be paralleled by training in computer literacy); and what factors, both social and individual, place constraints on our ability to use the data?
+++++++++++++++++++++ Defining my interests. Narrowing a topic. How do I collect information? How do I search for information?
How do we search for “serious” information?
Google and Google Scholar
Microsoft Semantic Scholar (Semantic Scholar); Microsoft Academic Search; Academicindex.net; Proquest Dialog; Quetzal; arXiv;
basic electronic (library) search information and strategies. Library research services (5 min)
using the library database, do a search on a topic of your interest.
compare the returns on your search. make an attempt to refine the search.
retrieve the following information about the book of interest: is it relevant to your topic (check the subjects); is it timely (check the published date); is it available
Strategies for conducting advanced searches (setting up filters and search criteria)
“Academic libraries are concerned about the digital literacy of their users but their programs continue to be focused on the information components defined by the President’s Commission on Information Literacy.” (p. 45)
Cordell, R. (2013). Library Instruction in the 21st Century. In: Rosanne, M (Ed.) Library Reference Services and Information Literacy: Models for Academic Institutions: Models for Academic Institutions. IGI Global.
creating a learner profile, a set of criteria the school district wanted students to learn while in school. That profile includes: seek knowledge and understanding; think critically and solve problems; listen, communicate, and interact effectively; exhibit strong personal qualities; and engage and compete in a global environment. The profile helps guide all approaches to learning in the district.
Kids already know how to use their devices, but they don’t know how to learn with their devices,” Clark said in an edWeb webinar. It’s the teacher’s role to help them discover how to connect to content, one another and learning with a device that they may have only used for texting and Facebook previously. “It’s about the kids being empowered in the classroom to make decisions about the ways that they are learning,”
IN-CLASS BACK-CHANNELING: Backchanneling refers to the use of networks & social media to maintain an online, real-time conversation alongside spoken remarks.
IN-CLASS READINGS AND HANDOUTS. Smartphones can also be used productively in the classroom as eReaders for books and handouts. You can place all student handouts into DropBox folders (see “Dropbox A Multi-Tool for Educators”).
ORGANIZING RESEARCH.
Using Google Docs for backchanneling with students: