10 years ago, we should have taught faculty how to be better at the internet: to design for privacy, security, accessibility. Even how to use keyboard shortcuts. Anything else but lecture capture, online quizzes, and boilerplate feedback. 1/2
10 years ago, we should have taught faculty how to be better at the internet: to design for privacy, security, accessibility. Even how to use keyboard shortcuts. Anything else but lecture capture, online quizzes, and boilerplate feedback. 1/2
\Asking for a “friend,” does anyone know if on a Zoom call whether the host can tell if you’ve navigated to another window – i.e., multi-tasking? I’ve heard of teachers threatening students with this capability.
My note: From a pedagogical point of view, the bigger question is: does one (instructor) need to “big brother” students’ activities, in this case multi-tasking on another window.
Blast from the past: https://blog.stcloudstate.edu/ims/2017/04/03/use-of-laptops-in-the-classroom/
Here is the collection of opinions regarding a similar issue 15 years ago: do we have to let students use Internet-connected laptops in the class room and 5 years ago: can we let students use smart phones in the classroom.
The opinion i liked most and side with it: if we (the instructors) are not able to create arresting content and class presence, we should not blame students for straying away from our activities. It does not matter how much control Zoom will give us to “big brother” students, it is up to our teaching, not to the technology to keep students learning
#Gaming #gamification
Dr. Sivaprakasam and I are developing a microcredentialing system for your class.
The “library” part has several components:
One badge for your ability to use the databases and find reliable scientific information in your field (required)
submit your results in the respective D2L assignment folder. A badge will be issued to you after the assignment is graded
One badge for completing the quiz based on the information from this library instruction (required)
a badge will be issued to you automatically after successful completion of the quizz
One badge for your ability to use social media for a serious, reliable, scientific research (required)
submit your results in the respective D2L assignment folder. A badge will be issued to you after the assignment is graded
One badge for using the D2L “embedded librarian” widget to contact the librarian with questions regarding your class research (one of two optional)
A badge will be issued to you after your post with your email or any other contact information is submitted
One badge for helping class peer with his research (one of two optional)
submit your results in the respective D2L assignment folder. A badge will be issued to you after the assignment is graded
Collecting two of the required and one of the optional badges let you earn the superbadge “Mastery of Library Instruction.”
The superbadge brings points toward your final grade.
Once you acquire the badges, Dr. Sivaprakasam will reflect your achievement in D2L Grades.
If you are building a LinkedIn portfolio, here are directions to upload your badges in your LinkedIn account using Badgr:
according to Pew Research Center, 68 percent of American adults get their news from social media—platforms where opinion is often presented as fact.
results of the international test revealed that only 14 percent of U.S. students were able to reliably distinguish between fact and opinion.
News and Media Literacy (and the lack of) is not very different from Information Literacy
An “information literate” student is able to “locate, evaluate, and effectively use information from diverse sources.” See more About Information Literacy.
How does information literacy help me?
Every day we have questions that need answers. Where do we go? Whom can we trust? How can we find information to help ourselves? How can we help our family and friends? How can we learn about the world and be a better citizen? How can we make our voice heard?
Standard 1. The information literate student determines the nature and extent of the information needed
Standard 2. The information literate student accesses needed information effectively and efficiently
Standard 3. The information literate student evaluates information and its sources critically and incorporates selected information into his or her knowledge base and value system
Standard 4. The information literate student, individually or as a member of a group, uses information effectively to accomplish a specific purpose
Standard 5. The information literate student understands many of the economic, legal, and social issues surrounding the use of information and accesses and uses information ethically and legally
Project Information Literacy
A national, longitudinal research study based in the University of Washington’s iSchool, compiling data on how college students seek and use information.
+++++++++++++++++++++++
Developing Your Research Topic/Question
Research always starts with a question. But the success of your research also depends on how you formulate that question. If your topic is too broad or too narrow, you may have trouble finding information when you search. When developing your question/topic, consider the following:
Is my question one that is likely to have been researched and for which data have been published? Believe it or not, not every topic has been researched and/or published in the literature.
Be flexible. Consider broadening or narrowing the topic if you are getting a limited number or an overwhelming number of results when you search. In nursing it can be helpful to narrow by thinking about a specific population (gender, age, disease or condition, etc.), intervention, or outcome.
Discuss your topic with your professor and be willing to alter your topic according to the guidance you receive.
Getting Ready for Research
Library Resources vs. the Internet
How (where from) do you receive information about your professional interests?
Advantages/disadvantages of using Web Resources
Evaluating Web Resources
Google or similar; Yahoo, Bing
Google Scholar
Reddit, Digg, Quora
Wikipedia
Become a member of professional organizations and use their online information
Use the SCSU library page to online databases
Building Your List of Keywords
Why Keyword Searching?
Why not just type in a phrase or sentence like you do in Google or Yahoo!?
Because most electronic databases store and retrieve information differently than Internet search engines.
A databases searches fields within a collection of records. These fields include the information commonly found in a citation plus an abstract (if available) and subject headings. Search engines search web content which is typically the full text of sources.
The bottom line: you get better results in a database by using effective keyword search strategies.
To develop an effective search strategy, you need to:
determine the key concepts in your topic and
develop a good list of keyword synonyms.
Why use synonyms?
Because there is more than one way to express a concept or idea. You don’t know if the article you’re looking for uses the same expression for a key concept that you are using.
Consider: Will an author use:
Hypertension or High Blood Pressure?
Teach or Instruct?
Therapy or Treatment?
Don’t get “keyword lock!” Be willing to try a different term as a keyword. If you are having trouble thinking of synonyms, check a thesaurus, dictionary, or reference book for ideas.
Keyword worksheet
Library Resources
How to find the SCSU Library Website
SCSU online databases
SCSU Library Web page
Basic Research Skills
Locating and Defining a Database
Database Searching Overview:
You can search using the SCSU library online dbases by choosing:
Simple search
Advanced search
Identifying a Scholarly Source
Boolean operators
Databases:
CINAHL, MEDLINE, PubMed, Health Source: Consumer Edition, Health Source: Nursing/Academic Edition
Psychology:
PsychINFO
General Science
ScienceDirect
Arts & Humanities Citation Index
How do you evaluate a source of information to determine if it is appropriate for academic/scholarly use. There is no set “checklist” to complete but below are some criteria to consider when you are evaluating a source.
ACCURACY
Does the author cite reliable sources?
How does the information compare with that in other works on the topic?
Can you determine if the information has gone through peer-review?
Are there factual, spelling, typographical, or grammatical errors?
AUDIENCE
Who do you think the authors are trying to reach?
Is the language, vocabulary, style and tone appropriate for intended audience?
What are the audience demographics? (age, educational level, etc.)
Are the authors targeting a particular group or segment of society?
AUTHORITY
Who wrote the information found in the article or on the site?
What are the author’s credentials/qualifications for this particular topic?
Is the author affiliated with a particular organization or institution?
What does that affiliation suggest about the author?
CURRENCY
Is the content current?
Does the date of the information directly affect the accuracy or usefulness of the information?
OBJECTIVITY/BIAS
What is the author’s or website’s point of view?
Is the point of view subtle or explicit?
Is the information presented as fact or opinion?
If opinion, is the opinion supported by credible data or informed argument?
Is the information one-sided?
Are alternate views represented?
Does the point of view affect how you view the information?
PURPOSE
What is the author’s purpose or objective, to explain, provide new information or news, entertain, persuade or sell?
Does the purpose affect how you view the information presented?
InterLibrary Loan
Copyright and Fair Use
Author Rights and Publishing & Finding Author Instructions for Publishing in Scholarly Journals
Institutional support for accessibility technologies
Blended data center (on premises and cloud based)
Incorporation of mobile devices in teaching and learning
Open educational resources
Technologies for improving analysis of student data
Security analytics
Integrated student success planning and advising systems
Mobile apps for enterprise applications
Predictive analytics for student success (institutional level)
At least 35% of institutions are tracking these five technologies in 2020: Support for 5G; Wi-Fi 6 (802.11 ax, AX Wi-Fi); Identity as a Service (IDaaS); Digital microcredentials (including badging); Uses of the Internet of Things for teaching and learning; and Next-generation digital learning environment
according to Pew Research Center, 68 percent of American adults get their news from social media—platforms where opinion is often presented as fact.
results of the international test revealed that only 14 percent of U.S. students were able to reliably distinguish between fact and opinion.
News and Media Literacy (and the lack of) is not very different from Information Literacy
An “information literate” student is able to “locate, evaluate, and effectively use information from diverse sources.” See more About Information Literacy
Developing Your Research Topic/Question
Research always starts with a question. But the success of your research also depends on how you formulate that question. If your topic is too broad or too narrow, you may have trouble finding information when you search. When developing your question/topic, consider the following:
Is my question one that is likely to have been researched and for which data have been published? Believe it or not, not every topic has been researched and/or published in the literature.
Be flexible. Consider broadening or narrowing the topic if you are getting a limited number or an overwhelming number of results when you search. In nursing it can be helpful to narrow by thinking about a specific population (gender, age, disease or condition, etc.), intervention, or outcome.
Discuss your topic with your professor and be willing to alter your topic according to the guidance you receive.
Getting Ready for Research
Library Resources vs. the Internet
How (where from) do you receive information about your professional interests?
Advantages/disadvantages of using Web Resources
Become a member of professional organizations and use their online information
Use the SCSU library page to online databases
Building Your List of Keywords
Why Keyword Searching?
Why not just type in a phrase or sentence like you do in Google or Yahoo!?
Because most electronic databases store and retrieve information differently than Internet search engines.
A databases searches fields within a collection of records. These fields include the information commonly found in a citation plus an abstract (if available) and subject headings. Search engines search web content which is typically the full text of sources.
The bottom line: you get better results in a database by using effective keyword search strategies.
To develop an effective search strategy, you need to:
determine the key concepts in your topic and
develop a good list of keyword synonyms.
Why use synonyms?
Because there is more than one way to express a concept or idea. You don’t know if the article you’re looking for uses the same expression for a key concept that you are using.
Consider: Will an author use:
Hypertension or High Blood Pressure?
Teach or Instruct?
Therapy or Treatment?
Don’t get “keyword lock!” Be willing to try a different term as a keyword. If you are having trouble thinking of synonyms, check a thesaurus, dictionary, or reference book for ideas.
Keyword worksheet
Library Resources
How to find the SCSU Library Website
SCSU online databases
SCSU Library Web page
+++++!!!!!++++++++++
Test your knowledge:
******* !! *************
Basic Research Skills
Identifying a Scholarly Source
Boolean Operators
Databases
How do you evaluate a source of information to determine if it is appropriate for academic/scholarly use. There is no set “checklist” to complete but below are some criteria to consider when you are evaluating a source.
ACCURACY
Does the author cite reliable sources?
How does the information compare with that in other works on the topic?
Can you determine if the information has gone through peer-review?
Are there factual, spelling, typographical, or grammatical errors?
AUDIENCE
Who do you think the authors are trying to reach?
Is the language, vocabulary, style and tone appropriate for intended audience?
What are the audience demographics? (age, educational level, etc.)
Are the authors targeting a particular group or segment of society?
AUTHORITY
Who wrote the information found in the article or on the site?
What are the author’s credentials/qualifications for this particular topic?
Is the author affiliated with a particular organization or institution?
What does that affiliation suggest about the author?
CURRENCY
Is the content current?
Does the date of the information directly affect the accuracy or usefulness of the information?
OBJECTIVITY/BIAS
What is the author’s or website’s point of view?
Is the point of view subtle or explicit?
Is the information presented as fact or opinion?
If opinion, is the opinion supported by credible data or informed argument?
Is the information one-sided?
Are alternate views represented?
Does the point of view affect how you view the information?
PURPOSE
What is the author’s purpose or objective, to explain, provide new information or news, entertain, persuade or sell?
Does the purpose affect how you view the information presented?
Vietnam‘s cyber-army, also known as Force 47, was deployed to counter the content on social media platforms deemed critical of the way the authorities handled the situation.
Vietnam’s Force 47 is run by the Ministry of Public Security (MPS) to hack anti-government websites and spread pro-government messages online, and is believed to be at least 10,000-strong.
Digital rights campaigners accuse Vietnam of attempting to replicate China’s “Great Firewall” by regulating and censoring the internet with the cybersecurity law.
Neither Google, which owns YouTube, nor Facebook has complied with the legislation, which requires the American tech giants to open local data storage facilities inside Vietnam by January 1.
Vietnam has a population of 96 million. With more than 60 million Facebook users, it is the platform’s one of the fastest-growing markets.
Project Information Literacy, a nonprofit research institution that explores how college students find, evaluate and use information. It was commissioned by the John S. and James L. Knight Foundation and The Harvard Graduate School of Education.
focus groups and interviews with 103 undergraduates and 37 faculty members from eight U.S. colleges.
To better equip students for the modern information environment, the report recommends that faculty teach algorithm literacy in their classrooms. And given students’ reliance on learning from their peers when it comes to technology, the authors also suggest that students help co-design these learning experiences.
While informed and critically aware media users may see past the resulting content found in suggestions provided after conducting a search on YouTube, Facebook, or Google, those without these skills, particularly young or inexperienced users, fail to realize the culpability of underlying algorithms in the resultant filter bubbles and echo chambers (Cohen, 2018).
Media literacy education is more important than ever. It’s not just the overwhelming calls to understand the effects of fake news or addressing data breaches threatening personal information, it is the artificial intelligence systems being designed to predict and project what is perceived to be what consumers of social media want.
it’s time to revisit the Eight Key Concepts of media literacy with an algorithmic focus.
Literacy in today’s online and offline environments “means being able to use the dominant symbol systems of the culture for personal, aesthetic, cultural, social, and political goals” (Hobbs & Jensen, 2018, p 4).
Until now, technology that readily identifies everyone based on his or her face has been taboo because of its radical erosion of privacy. Tech companies capable of releasing such a tool have refrained from doing so; in 2011, Google’s chairman at the time said it was the one technology the company had held back because it could be used “in a very bad way.” Some large cities, including San Francisco, have barred police from using facial
But without public scrutiny, more than 600 law enforcement agencies have started using Clearview in the past year, according to the company, which declined to provide a list. recognition technology.
Facial recognition technology has always been controversial. It makes people nervous about Big Brother. It has a tendency to deliver false matches for certain groups, like people of color. And some facial recognition products used by the police — including Clearview’s — haven’t been vetted by independent experts.
Clearview deployed current and former Republican officials to approach police forces, offering free trials and annual licenses for as little as $2,000. Mr. Schwartz tapped his political connections to help make government officials aware of the tool, according to Mr. Ton-That.
“We have no data to suggest this tool is accurate,” said Clare Garvie, a researcher at Georgetown University’s Center on Privacy and Technology, who has studied the government’s use of facial recognition. “The larger the database, the larger the risk of misidentification because of the doppelgänger effect. They’re talking about a massive database of random people they’ve found on the internet.”
Part of the problem stems from a lack of oversight. There has been no real public input into adoption of Clearview’s software, and the company’s ability to safeguard data hasn’t been tested in practice. Clearview itself remained highly secretive until late 2019.
The software also appears to explicitly violate policies at Facebook and elsewhere against collecting users’ images en masse.
while there’s underlying code that could theoretically be used for augmented reality glasses that could identify people on the street, Ton-That said there were no plans for such a design.
In May of last year, San Francisco banned facial recognition; the neighboring city of Oakland soon followed, as did Somerville and Brookline in Massachusetts (a statewide ban may follow). In December, San Diego suspended a facial recognition program in advance of a new statewide law, which declared it illegal, coming into effect. Forty major music festivals pledged not to use the technology, and activistsare calling for a nationwide ban. Many Democratic presidential candidates support at least a partial ban on the technology.
facial recognition bans are the wrong way to fight against modern surveillance. Focusing on one particular identification method misconstrues the nature of the surveillance society we’re in the process of building. Ubiquitous mass surveillance is increasingly the norm. In countries like China, a surveillance infrastructure is being built by the government for social control. In countries like the United States, it’s being built by corporations in order to influence our buying behavior, and is incidentally used by the government.
People can be identified at a distance by their heart beat or by their gait, using a laser-based system. Cameras are so good that they can read fingerprints and irispatterns from meters away. And even without any of these technologies, we can always be identified because our smartphones broadcast unique numbers called MAC addresses.
The data broker industry is almost entirely unregulated; there’s only one law — passed in Vermont in 2018 — that requires data brokers to register and explain in broad terms what kind of data they collect.
Until now, technology that readily identifies everyone based on his or her face has been taboo because of its radical erosion of privacy. Tech companies capable of releasing such a tool have refrained from doing so; in 2011, Google’s chairman at the time said it was the one technology the company had held back because it could be used “in a very bad way.” Some large cities, including San Francisco, have barred police from using facial recognition technology.
Report: Florida, Ohio called ‘advanced leaders’ in K-12 media literacy efforts
Advocacy group Media Literacy Now says 14 states have laws with “some media-literacy language” and others will consider bills this year, but some say progress “is too slow.”
Media Literacy Now considers digital citizenship as part of media literacy — not the other way around
nine states — California, Colorado, Connecticut, Illinois, Massachusetts, Minnesota, New Jersey, Rhode Island and Utah — are identified as “emerging leaders” for “beginning the conversation” and consulting with experts and others.
Calls for increased attention to media literacy skills and demand from educators for training in this area increased following an outbreak of “fake news” reports associated with the 2016 presidential election. Studies and assessments showing students are easily misled by digital information have also contributed to a sense of urgency.
because the topic can fit into multiple content areas, it can also be overlooked because of other pressures on teachers. Media literacy, the group notes, also “encompasses the foundational skills of digital citizenship and internet safety including the norms of appropriate, responsible, ethical, and healthy behavior, and cyberbullying prevention.”
Lawmakers in Missouri and South Carolina have also pre-filed versions of Media Literacy Now’s model bill, the report noted, and legislation is expected in Hawaii and Arizona.