Date: Wednesday, April 3rd Time: 3:30 PM to 4:15 PM Conference Session: Concurrent Session 3 Streamed session Lead Presenter: Brian Kane (General Design LLC) Track: Research: Designs, Methods, and Findings Location: Juniper A Session Duration: 45min Brief Abstract:What happens when you apply design thinking to AI? AI presents a fundamental change in the way people interact with machines. By applying design thinking to the way AI is made and used, we can generate an unlimited amount of new ideas for products and experiences that people will love and use.https://onlinelearningconsortium.org/olc-innovate-2019-session-page/?session=6964&kwds=
Notes from the session:
design thinking: get out from old mental models. new narratives; get out of the sci fi movies.
narrative generators:
we need machines to make mistakes. Ai even more then traditional software.
Lessons learned: don’t replace people
Date: Thursday, April 4th Time: 8:45 AM to 9:30 AM Conference Session: Concurrent Session 4 Streamed session Lead Presenter: Matt Crosslin (University of Texas at Arlington LINK Research Lab) Track: Experiential and Life-Long Learning Location: Cottonwood 4-5 Session Duration: 45min Brief Abstract:How can teachers utilize chatbots and artificial intelligence in ways that won’t remove humans out of the education picture? Using tools like Twine and Recast.AI chatobts, this session will focus on how to build adaptive content that allows learners to create their own heutagogical educational pathways based on individual needs.++++++++++++++++
Date: Thursday, April 4th Time: 9:45 AM to 10:30 AM Conference Session: Concurrent Session 5 Streamed session Lead Presenter: Maikel Alendy (FIU Online) Co-presenter: Sky V. King (FIU Online – Florida International University) Track: Teaching and Learning Practice Location: Cottonwood 4-5 Session Duration: 45min Brief Abstract:“This is Us” demonstrates how leveraging storytelling in learning engages students to effectively communicate their authentic story, transitioning from consumerism to become creators and influencers. Addressing responsibility as a digital citizen, information and digital literacy, online privacy, and strategies with examples using several edtech tools, will be reviewed.++++++++++++++++++
Date: Thursday, April 4th Time: 11:15 AM to 12:00 PM Conference Session: Concurrent Session 6 Streamed session Lead Presenter: Kristin Bushong (Arizona State University ) Co-presenter: Heather Nebrich (Arizona State University) Track: Effective Tools, Toys and Technologies Location: Juniper C Session Duration: 45min Brief Abstract:Considering today’s overstimulated lifestyle, how do we engage busy learners to stay on task? Join this session to discover current efforts in implementing ubiquitous educational opportunities through customized interests and personalized learning aspirations e.g., adaptive math tools, AI support communities, and memory management systems.+++++++++++++
Date: Thursday, April 4th Time: 1:15 PM to 2:00 PM Conference Session: Concurrent Session 7 Streamed session Lead Presenter: Katie Linder (Oregon State University) Co-presenter: June Griffin (University of Nebraska-Lincoln) Track: Teaching and Learning Practice Location: Cottonwood 4-5 Session Duration: 45min Brief Abstract:The concept of High-impact Educational Practices (HIPs) is well-known, but the conversation about transitioning HIPs online is new. In this session, contributors from the edited collection High-Impact Practices in Online Education will share current HIP research, and offer ideas for participants to reflect on regarding implementing HIPs into online environments.https://www.aacu.org/leap/hipshttps://www.aacu.org/sites/default/files/files/LEAP/HIP_tables.pdf+++++++++++++++++++++++
Date: Thursday, April 4th Time: 3:45 PM to 5:00 PM Streamed session Lead Presenter: Manoush Zomorodi (Stable Genius Productions) Track: N/A Location: Adams Ballroom Session Duration: 1hr 15min Brief Abstract:How can we ensure that students and educators thrive in increasingly digital environments, where change is the only constant? In this keynote, author and journalist Manoush Zomorodi shares her pioneering approach to researching the effects of technology on our behavior. Her unique brand of journalism includes deep-dive investigations into such timely topics as personal privacy, information overload, and the Attention Economy. These interactive multi-media experiments with tens of thousands of podcast listeners will inspire you to think creatively about how we use technology to educate and grow communities.Friday
Date: Friday, April 5th Time: 8:30 AM to 9:30 AM Streamed session Lead Presenter: Michael Caulfield (Washington State University-Vancouver) Track: N/A Location: Adams Ballroom Position: 2 Session Duration: 60min Brief Abstract:Years ago, John Lyndon (then Johnny Rotten) sang that “anger is an energy.” And he was right, of course. Anger isn’t an emotion, like happiness or sadness. It’s a reaction, a swelling up of a confused urge. I’m a person profoundly uncomfortable with anger, but yet I’ve found in my professional career that often my most impactful work begins in a place of anger: anger against injustice, inequality, lies, or corruption. And often it is that anger that gives me the energy and endurance to make a difference, to move the mountains that need to be moved. In this talk I want to think through our uneasy relationship with anger; how it can be helpful, and how it can destroy us if we’re not careful.++++++++++++++++
Date: Friday, April 5th Time: 10:45 AM to 11:30 AM Conference Session: Concurrent Session 10 Streamed session Lead Presenter: Laurie Daily (Augustana University) Co-presenter: Sharon Gray (Augustana University) Track: Problems, Processes, and Practices Location: Juniper A Session Duration: 45min Brief Abstract:The purpose of this session is to explore the implementation of a Community of Practice to support professional development, enhance online course and program development efforts, and to foster community and engagement between and among full and part time faculty.+++++++++++++++
Date: Friday, April 5th Time: 11:45 AM to 12:30 PM Conference Session: Concurrent Session 11 Streamed session Lead Presenter: Katrina Rainer (Strayer University) Co-presenter: Jennifer M McVay-Dyche (Strayer University) Track: Teaching and Learning Practice Location: Cottonwood 2-3 Session Duration: 45min Brief Abstract:Learning is more effective and organic when we teach through the art of storytelling. At Strayer University, we are blending the principles story-driven learning with research-based instructional design practices to create engaging learning experiences. This session will provide you with strategies to strategically infuse stories into any lesson, course, or curriculum.
Encyclopedia of Criminal Activities and the Deep Web
Countries all over the world are seeing significant increases in criminal activity through the use of technological tools. Such crimes as identity theft, cyberattacks, drug trafficking, and human trafficking are conducted through the deep and dark web, while social media is utilized by murderers, sex offenders, and pedophiles to elicit information and contact their victims. As criminals continue to harness technology to their advantage, law enforcement and government officials are left to devise alternative strategies to learn more about all aspects of these modern criminal patterns and behavior, to preserve the safety of society, and to ensure that proper justice is served. Regrettably, the lack of adequate research findings on these modern criminal activities is limiting everyone’s abilities to devise effective strategies and programs to combat these modern technology-related criminal activities.
In an effort to compile the most current research on this topic, a new major reference work titled Encyclopedia of Criminal Activities and the Deep Web is currently being developed. This comprehensive Encyclopedia is projected to encompass expert insights about the nature of these criminal activities, how they are conducted, and societal and technological limitations. It will also explore new methods and processes for monitoring and regulating the use of these tools, such as social media, online forums, and online ads, as well as hidden areas of the internet including the deep and dark web. Additionally, this Encyclopedia seeks to offer strategies for predicting and preventing criminals from using technology as a means to track, stalk, and lure their victims.
You are cordially invited to share your research to be featured in this Encyclopedia by submitting a chapter proposal/abstract using the link on the formal call for papers page here. If your chapter proposal is accepted, guidelines for preparing your full chapter submission (which should be between 5,000-7,500 total words in length) can be accessed at: http://www.igi-global.com/publish/contributor-resources/ (under the “For Authors” heading – “Encyclopedia Chapter Organization and Formatting”).
Recommended topics for papers include, but are not limited to:
Bitcoin and Crime
Botnets and Crime
Child Exploitation
Contract Killing
Criminology
Cryptocurrency
Cyber Espionage
Cyber Stalking
Cybercrime
Cybercriminals
Cybersecurity Legislation
Cyberterrorism Fraud
Dark Web
Dark Web Vendors
Darknets
Data Privacy
Dating Websites and Crime
Deep Web
Drug Trafficking
E-Banking Fraud
Email Scams
Fraud and Internet
Gaming and Crime
Government Regulations of the Dark Web
Hacking and Crime
Hacktivism
Human Trafficking
Identity Theft
International Regulations of the Dark Web
Internet Privacy
Internet Regulations
Internet Safety & Crime
Online Advertisement Websites and Crime
Online Blackmail
Online Forums and Crime
Online Hate Crimes
Online Predators
Online Privacy
Social Media Deception
Social Networking Traps
Undercover Dark Web Busts
Undercover Operations
Vigilante Justice
Virtual Currencies & Crime
Whistleblowing
IMPORTANT DATES: Chapter Proposal Submission Deadline: October 15, 2018; Full Chapters Due: December 15, 2018
Note: There are no publication fees, however, contributors will be requested to provide a courtesy to their fellow colleagues by serving as a peer reviewer for this project for at least 2-3 articles. This will ensure the highest level of integrity and quality for the publication.
Should you have any questions regarding this publication, or this invitation, please do not hesitate to contact: EncyclopediaCADW@igi-global.com
Mehdi Khosrow-Pour, DBA Editor-in-Chief Encyclopedia of Criminal Activities and the Deep Web EncyclopediaCADW@igi-global.com
over the last four years, 49 states and the District of Columbia have introduced 410 bills related to student data privacy, and 36 states have passed 85 new education data privacy laws. Also, since 2014, 19 states have passed laws that in some way address the work done by researchers.
researchers need to get better at communicating about their projects, especially with non-researchers.
One approach to follow in gaining trust “from parents, advocates and teachers” uses the acronym CUPS:
Collection: What data is collected by whom and from whom;
Use: How the data will be used and what the purpose of the research is;
Protection: What forms of data security protection are in place and how access will be limited; and
Sharing: How and with whom the results of the data work will be shared.
Second, researchers must pin down how to share data without making it vulnerable to theft.
Third, researchers should build partnerships of trust and “mutual interest” pertaining to their work with data. Those alliances may involve education technology developers, education agencies both local and state, and data privacy stakeholders.
real-time impact on curriculum structure, instruction delivery and student learning, permitting change and improvement. It can also provide insight into important trends that affect present and future resource needs.
Big Data: Traditionally described as high-volume, high-velocity and high-variety information.
Learning or Data Analytics: The measurement, collection, analysis and reporting of data about learners and their contexts, for purposes of understanding and optimizing learning and the environments in which it occurs.
Educational Data Mining: The techniques, tools and research designed for automatically extracting meaning from large repositories of data generated by or related to people’s learning activities in educational settings.
Predictive Analytics: Algorithms that help analysts predict behavior or events based on data.
Predictive Modeling: The process of creating, testing and validating a model to best predict the probability of an outcome.
Data analytics, or the measurement, collection, analysis and reporting of data, is driving decisionmaking in many institutions. However, because of the unique nature of each district’s or college’s data needs, many are building their own solutions.
For example, in 2014 the nonprofit company inBloom, Inc., backed by $100 million from the Gates Foundation and the Carnegie Foundation for the Advancement of Teaching, closed its doors amid controversy regarding its plan to store, clean and aggregate a range of student information for states and districts and then make the data available to district-approved third parties to develop tools and dashboards so the data could be used by classroom educators.22
Tips for Student Data Privacy
Know the Laws and Regulations
There are many regulations on the books intended to protect student privacy and safety: the Family Educational Rights and Privacy Act (FERPA), the Protection of Pupil Rights Amendment (PPRA), the Children’s Internet Protection Act (CIPA), the Children’s Online Privacy Protection Act (COPPA) and the Health Insurance Portability and Accountability Act (HIPAA)
— as well as state, district and community laws. Because technology changes so rapidly, it is unlikely laws and regulations will keep pace with new data protection needs. Establish a committee to ascertain your institution’s level of understanding of and compliance with these laws, along with additional safeguard measures.
Make a Checklist Your institution’s privacy policies should cover security, user safety, communications, social media, access, identification rules, and intrusion detection and prevention.
Include Experts
To nail down compliance and stave off liability issues, consider tapping those who protect privacy for a living, such as your school attorney, IT professionals and security assessment vendors. Let them review your campus or district technologies as well as devices brought to campus by students, staff and instructors. Finally, a review of your privacy and security policies, terms of use and contract language is a good idea.
Communicate, Communicate, Communicate
Students, staff, faculty and parents all need to know their rights and responsibilities regarding data privacy. Convey your technology plans, policies and requirements and then assess and re-communicate those throughout each year.
“Anything-as-a-Service” or “X-as-a-Service” solutions can help K-12 and higher education institutions cope with big data by offering storage, analytics capabilities and more. These include:
• Infrastructure-as-a-Service (IaaS): Providers offer cloud-based storage, similar to a campus storage area network (SAN)
• Platform-as-a-Service (PaaS): Opens up application platforms — as opposed to the applications themselves — so others can build their own applications
using underlying operating systems, data models and databases; pre-built application components and interfaces
• Software-as-a-Service (SaaS): The hosting of applications in the cloud
• Big-Data-as-a-Service (BDaaS): Mix all the above together, upscale the amount of data involved by an enormous amount and you’ve got BDaaS
Suggestions:
Use accurate data correctly
Define goals and develop metrics
Eliminate silos, integrate data
Remember, intelligence is the goal
Maintain a robust, supportive enterprise infrastructure.
Prioritize student privacy
Develop bullet-proof data governance guidelines
Create a culture of collaboration and sharing, not compliance.
eutersreports that Weibo will begin showing the rough locations of its users using IP addresses to combat “bad behaviour” online. The locations show up on both profiles and posts.
Chinese citizens have long resorted to using VPNs and other privacy tools to help either access non-Chinese services or speak freely online and you can see why.
In a similar view to the Panopticon, visibly showing users that the service knows where they are will lead to self-censorship, reducing the strain on Chinese censors to cover an internet with hundreds of millions of users.
“Facebook’s business model has evolved into social engineering via psychological warfare,” she declared. “The platform weaponizes user data to fuel algorithmic manipulation in order to maximize ad sales—not just for products, but for ideas like the disinformation that led to the conspiracy theories associated with the January 6 Capitol attack.”
“One thing is clear: Facebook and the other digital platforms that rely on an extractive business model will not change on their own,” the letter states. “Congress needs to step in.”
“The secretive collection, sale, and algorithmic manipulation of our personal data by platforms like Facebook must end,” he said. “It is a primary driver of the virality of the misinformation, hate speech, and online radicalization that people across the political spectrum are worried about.”
A recent Educause study found that 63 percent of colleges and universities in the U.S. and Canada mention the use of remote proctoring on their websites.
One reason colleges are holding onto proctoring tools, Urdan adds, is that many colleges plan to expand their online course offerings even after campus activities return to normal. And the pandemic also saw rapid growth of another tech trend: students using websites to cheat on exams.
Teaching Crowds: Learning and Social Media by Jon Dron and Terry Anderson Published by Athabasca University, Canada, ISBN: 978-1-927356-81-4 (PDF), September 2014, Pages: 370
Dr. Jon Dron and Professor Terry Anderson of Athabasca University, Canada attempt to introduce a new model for understanding and exploiting the pedagogical potential of Web-based technologies. Recognizing the E-learning/ online education as new model of teaching and learning, the authors show how learners can engage with social media platforms to create an unbounded field of emergent connections.
In chapter 9 ‘Issues and Challenges in Educational Uses of Social Software’ , the writers accordingly examine the dark side of social software—the ways in which it can undermine or even jeopardize, rather than deepen and extend, the experience of learning. They present a series of over-arching issues that warrant consideration by anyone who plans to use social software for learning. These include issues surrounding privacy, disclosure, and trust, cross-cultural dissonances, problems posed by the complexities of technology and by the digital divide, unpredictable systemic effects, and risks such as mob stupidity and filter bubbles.
A poorly explained update to its terms of service has pushed WhatsApp users to adopt alternative services such as Signal and Telegram in their millions.
Apps like Signal, Telegram, Wickr, and WhatsApp offer privacy features ranging from end-to-end encrypted data transfer to ‘self-destructing messages’.”
++++++++++++
Fast-Growing Alternative To Facebook And Twitter Finds Post-Trump Surge ‘Messy’
MeWe markets itself as privacy forward. It doesn’t harness users’ data to sell ads or decide what content to show them. My note: but has to charge somehow, so, differently from FB Messenger, one needs to pay, in order to do audio call in MeWe.
MeWe’s Weinstein resists the comparison to Parler or Gab, which tout themselves as free-speech sites. For one thing, he says, MeWe is serious about putting limits on what people can say.
The tech website OneZero uncovered right-wing militia groups on MeWe as well as a “Stop the Steal” group that discussed shooting people. The company removed the groups after OneZero flagged them.
“I think we all still treat social media companies like they’re these inexpensive startups, but maybe they need to be treated more like starting an airplane company or a company that makes cars,” said Megan Squire, a professor at Elon University who studies online extremists. “You’ve got to think about seat belts.”
The recently published report “Free to Be Online?” by Plan International found that more than half of the 14,000 girls and young women surveyed worldwide have experienced online harassment or abuse.