Searching for "data privacy"

technology for social workers

Plan for Sylvester Lamin’s course:

  1. introduce myself – 5 min
  2. discuss with students how they see the impact of technology on their work – 5 min
  3. discuss with students the implications of technology on their work – 15
    http://www.socialworklicensure.org/articles/social-media-social-work.html
    http://www.socialworkblog.org/practice-and-professional-development/2011/07/social-work-social-media-where-are-the-ethical-boundaries/
    http://www.theguardian.com/social-care-network/2013/jul/23/social-workers-social-media-challenge-perception
    email as unreliable medium
    privacy
    security
  4. discuss with students the possibilities, which SCSU resources and Internet resources can provide for collaboration, creativity and streamlining the work of the social worker – 15
    File space at SCSU versus other free resources
    keeping data in the cloud
    collaborating on documents and policies
    sharing data with clients
  5. Other issues, ideas – 10

WHAT ARE YOU REVEALING ONLINE? MUCH MORE THAN YOU THINK

WHAT ARE YOU REVEALING ONLINE? MUCH MORE THAN YOU THINK

http://ideas.ted.com/2014/07/01/do-you-know-what-youre-revealing-online-much-more-than-you-think/

Right now in the U.S. it’s essentially the case that when you post information online, you give up control of it.

Some companies may give you that right, but you don’t have a natural, legal right to control your personal data. So if a company decides they want to sell it or market it or release it or change your privacy settings, they can do that.

The point is, we really don’t know how this information will be used. For instance, say I’m a merchant — once I get information about you, I can use this information to try to extract more economic surplus from the transaction. I can price-discriminate you, so that I can get more out of the transaction than you will.

I’m interested in working in this area, not because disclosure is bad — human beings disclose all the time, it’s an innate need as much as privacy is — but because we really don’t know how this information will be used in the long run.

Research and Ethics: If Facebook can tweak our emotions and make us vote, what else can it Do?

If Facebook can tweak our emotions and make us vote, what else can it do?

http://www.businessinsider.com/facebook-calls-experiment-innovative-2014-7#ixzz36PtsxVfL

Google’s chief executive has expressed concern that we don’t trust big companies with our data – but may be dismayed at Facebook’s latest venture into manipulation

Please consider the information on Power, Privacy, and the Internet and details on ethics and big data in this IMS blog entry:https://blog.stcloudstate.edu/ims/2014/07/01/privacy-and-surveillance-obama-advisor-john-podesta-every-country-has-a-history-of-going-over-the-line/

important information:
Please consider the SCSU Research Ethics and the IRB (Institutional Review Board) document:
http://www.stcloudstate.edu/graduatestudies/current/culmProject/documents/ResearchEthicsandQualitative–IRBPresentationforGradStudentsv2.2011.pdf
For more information, please contact the SCSU Institutional Review Board : http://www.stcloudstate.edu/irb/default.asp

The Facebook Conundrum: Where Ethics and Science Collide

http://blogs.kqed.org/mindshift/2014/07/the-facebook-conundrum-where-ethics-and-science-collide

The field of learning analytics isn’t just about advancing the understanding of learning. It’s also being applied in efforts to try to influence and predict student behavior.

Learning analytics has yet to demonstrate its big beneficial breakthrough, its “penicillin,” in the words of Reich. Nor has there been a big ethical failure to creep lots of people out.

“There’s a difference,” Pistilli says, “between what we can do and what we should do.”

MOOC and Libraries

MOOC and Libraries

http://explore.tandfonline.com/content/bes/moocsandlibraries

New ACRL Discussion Group—Library Support for MOOCs

Libraries in the Time of MOOCs

http://www.educause.edu/ero/article/libraries-time-moocs
issues related to MOOCs, such as intellectual property rights, privacy issues, and state regulations.
MOOCs have arrived on the scene at a time when many institutions of higher learning are in extreme financial crisis
OCLC conference, “MOOCs and Libraries: Massive Opportunity or Overwhelming Challenge? http://www.oclc.org/research/events/2013/03-18.html
The MOOC movement might change this copyright-ownership contract between university and faculty.

Stephens, M. m., & Jones, K. L. (2014). MOOCs as LIS Professional Development Platforms: Evaluating and Refining SJSU’s First Not-for-Credit MOOC. Journal Of Education For Library & Information Science, 55(4), 345-361.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d99055676%26site%3deds-live%26scope%3dsite
xMOOCs. Using central­ized learning platforms (e.g., Coursera),they emphasize individual learning usingautomated assessment tools.In contrast, cMOOCs stress the relation­ship between course content and a com­munity of learners. Social learning, in thecase of cMOOCs, is emphasized  through uses of distributed tools (e.g., a combina­tion of a course site, student blogs, andsocial  etworking sites) to build networks of knowledge and learners. Unlike their xMOOC counterparts, the role of an in­ istructor in a cMOOC is to be a “guide on the side,” a facilitator of the knowledge­ making process who uses connectivist learning theory (Siemens, 2004; Siemens,2012)

Learning 2.0 programs, also known as“23 Things,” have offered online technol­ogy-focused  professional development for library staff and could be considered an early version of LIS-focused MOOCs (Stephens, 2013a). Utilizing concepts such as self-directed learning, play, and an emphasis on lifelong learning, these pro­grams have been offered for individual li­braries as well as consortial  and state level iterations to reach thousands of library staff.
The course structure of the MOOCversion of the HL incorporated content updated from the SLIS course by the co­instructors. Ten modules were scheduled over a twelve-week “semester.” Students
could earn a certificate of completion, if they finished three of five artifact-based assignments of their choosing, in addition to blogging and participating in an end-of-course virtual symposium. The weekly schedule is available in Appendix A, and assignment descriptions are available in Appendix B
utilizing concepts such as self-directed learning, play, and an emphasis on lifelong learning, these pro­grams have been offered for individual li­braries as well as consortial and state level iterations to reach thousands of library staff. Benefits to staff include increased comfort with emerging technologies and an increased desire to continue learning (p. 348).

Center for Democracy & Technology

Big Data and Privacy

April 17, 2014

Big data has been generating big hype for a while. In January, the White House jumped into the fray, launching a big data and privacy review. CDT participated in all three public workshops convened in connection with the review and submitted written comments.

CDT’s Big Data and Privacy Comments

In our comments, we focused on three main areas: applying the Fair Information Practice Principles (FIPPs) to both private sector and government big data programs; exploring technical measures such as de-identification to safeguard privacy; and reforming existing privacy laws, most notably the Electronic Communications Privacy Act, to account for rapid changes in the ways that digital data is collected, stored, and used.

CDT stressed that, as entities collect more data to offer innovative products and more efficient services, they must still be guided by purpose specification, consent, security, and the other elements of the FIPPs framework.

Government and Big Data

“Strong consensus is forming that the bulk collection of phone records should end.”

-Harley Geiger

The Administration says that it will end its bulk collection of telephony metadata, although the details of what will replace it remain unsettled. Meanwhile, CDT is pointing out that the laws the government has used to justify bulk collection are not limited just to phone records. Instead, they could be used to justify collection of location data, Internet browsing history, financial records, and more. CDT has been vocal in advocating the end of all forms of bulk collection, and we endorse the USA FREEDOM Act as the best legislation to do just that.

A report from the White House review is due before the end of April, but it is expected to present more questions than answers. In this complex and unsettled space, CDT will continue to work with companies and other stakeholders to develop workable approaches that will protect privacy while pursuing the benefits promised by advanced data analytics.


Check Out CDT’s New Website

CDT has launched a totally revamped website: http://www.cdt.org. It has a fresh new look and tools that should make our content more easily accessible. Thanks to our partners at iStrategy Labs for their creative and technical efforts on the new site.

mega trends in technology

THE SIX BIGGEST TRENDS IN SOCIAL THAT WILL BLOW YOUR MIND

Mega shifts in social business will significantly affect the way that business will run in the future.

http://www.socialmediaexplorer.com/social-media-marketing/the-six-biggest-trends-in-social-that-will-blow-your-mind/

1. Big Data

How it works: Businesses collect multiple data points, helping to create hyper-specific marketing for users, while making better predictions with more information from a larger data set.

Examples: You’ve already seen this when Target figured out a teen was pregnant before her dad did. Even though she didn’t buy diapers or formula, her purchasing habits correlated closely with other customers’ who were pregnant, and Target sent her coupons for her upcoming baby.

Factors: Big data is being powered by the reduction in costs of data storage, as well as an explosion in the ability of businesses to capture data points. Never before have retailers been able to capture as much data about purchases, never before has online tracking been so robust, nor have social platforms offered access to so much data about users.

How to Prepare: As a user, you can expect to see much more targeted marketing, and not necessarily what you may expect. By drawing conclusions from large sets of data, companies might be even a little creepy in being able to predict your life – like the Target pregnancy. For marketers, you can expect to find new ways to streamline your sales funnel and get more analytical data about customers through social networks, web analytics groups and at retail.

2. Social Tool Aggregation

How it works: More and more third-party tools are springing up to help marketers and social network users make sense of multiple networks. Furthermore, networks themselves are offering ways of connecting to other apps and networks.

Examples: Tools like IFTTT and Zapier use social network APIs to trigger responses, while others like HootSuite allow users to aggregate multiple network communication into one tool. At the same time, tools like About.me allow a combined view of an individual’s social activity. Furthermore, networks themselves are beginning to integrate. Facebook allows cross posts from Instagram, Foursquare, Yelp and a variety of others.

Factors: It’s already taking too much time for individuals and marketers alike to keep up with just a couple social networks, and both the social networks and third-party tools know this. By consolidating social network interaction into a single place, users may be able to spend less time trying to make sense of the chaos.

How to Prepare: Users and marketers alike should keep an eye out for how this data is being used. What happens if you like Eminem on Facebook, but check into a venue during a Taylor Swift concert on Foursquare? What happens if you listen to the Glee channel on Pandora? What says more about who you really are? Do these networks share that information? Is it part of the authorization you okayed? The future may tell.

3. Social Network Consolidation

How it works: Social networks and tool providers are consolidating to remain competitive, both in creating a better offering for users, as well as buying market share.

Examples: Facebook has had nearly 40 different acquisitions since 2005 including technologies that help import contacts, manage photos, create mobile apps, and more, with their largest acquisition being Instagram for one beelion dollars (Doctor Evil style, of course.) Not to be outdone, LinkedIn has scored about 10 of their own acquisitions including Slideshare. Twitter has acquired tools like TweetDeck, platforms like Posterous and has created Vine, but acquisitions aren’t limited to social networks, they extend into social tools as well. Salesforce just had their largest couple years so far acquiring Radian6, Buddy Media and most recently, their largest, Exact Target. Adobe purchased Omniture, and Google bought YouTube and Wildfire Apps, and Oracle took over Involver social apps. Everyone is finding some value in social.

Factors: Not only is social the big thing, but it’s the logical next step after Social Aggregation. People want to be able to easily publish across social networks and marketers want to have the ability to create one true set of data. Rather than having multiple tools these companies are attempting to offer consolidated suites for data creation, storage and analysis.

How to Prepare: Marketers need to be aware of evolving tools and networks. When Twitter bought TweetDeck, it dropped many of the supported features for Facebook, LinkedIn, Myspace and others. Be aware of these types of changes so you can make plans for uninterrupted service.

4. Crowdsourcing

How it works: Companies are offering bigger roles to consumers.

Examples: Small and medium business often resort to sites like DesignCrowd, who offers thousands of designers the opportunity to design a logo, print piece or something else. The customer picks the best designs, offers revisions and the winner gets about $200. Starbucks turned to crowdsourcing for coming up with new product ideas, with over 50,000 ideas coming through My Starbucks Idea. Doritos, Lincoln, Pepsi, Pizza Hut, Toyota and others have even crowdsourced Super Bowl ads.

Factors: Customers want to have a stake in companies. As more businesses go to greater and greater lengths to spotlight influential users or creative user-generated work, consumers are expecting to interact more and more with companies in these ways. Furthermore, consumers are expecting more unique messaging rather than traditional corporate marketing speak.

How to Prepare: Find new ways that you can incorporate customer feedback and ideas into marketing campaigns, product updates or other areas of the business.

5. Sharing Economy

How it works: Online networks, “peer-to-peer marketplaces” are set up to pay to use people’s spare assets – rent a bedroom, or car from, or even eat a meal with complete strangers.

Examples: Perhaps some of the first companies in this space followed the crowdfunding model – with Kickstarter and Indiegogo being the top two. Airbnb offers to rent out unoccupied living space from a bedroom to an entire island including 250,000 listings in 192 countries. Taskrabbit allows users to outsource small jobs such as picking up dog food and dropping it off at your door. RelayRides even offers unused personal vehicles to rent.

Factors: It could be the downturn in the economy making some folks want to rent out their cars and rooms for extra cash, or causing others to avoid committing to a car payment. Furthermore, people are increasingly aware of the toll on natural resources in manufacturing and the high costs of parking in major urban areas. Sharing based businesses help to alleviate these problems and make use of otherwise idle resources.

How to Prepare: See if there may be a natural fit in working with one of these sharing services or offering your services through one. Jeremiah Owyang offers an example where Marriott could work with a shared lodging hosts to offer a “stamp of approval” of sorts, where hosts could agree to abide by certain standards or receive certain training to become certified. Marriott could even offer bedding, linens or other materials that could both help guests feel more confident in their accommodations while helping guests distinguish themselves from competitors.

6. Quantified Self

How it works: Individuals using devices or social networks to track information about themselves. This data can be cross referenced to identify some interesting trends about yourself.

Examples: FitBit tracks your physical activity, while foursquare tracks the types of businesses where you check in. It’s not too difficult to find out that when you go to movie theaters, you tend to eat poorly, and when you go to museums, you add an extra thousand steps to your routine. Apply that across other areas of life, music, work, love and you can some very interesting trends can turn out.

Factors: People are increasingly using technology to extrapolate information to work more efficiently. Furthermore, an increase in the scrutiny of the NSA and increased awareness of privacy have perhaps made people more interested in creating and storing their own information.

How to Prepare: Companies need to offer APIs and other ways for users to control and access their own information where possible. Connect to services like IFTTT and Zapier so users can import data and manipulate it, and make accommodations for people using personal technology like FitBits, Nike Fuelband, Jawbone Up, and others.

Overall, these mega shifts in social networking and social business can significantly affect the way that business will run in the future. Are you prepared? Have you seen these shifts or experienced them? Look for our future posts on the Micro-Trends within each of these larger trends and let us know your thoughts in the comments.

==========================================================================

CES 2014: Four mega-trends for the professionals

Summary: Trends matter at CES. While there may not be major product announcements, trends will emerge to shape 2014. Here’s what to watch in business tech.

http://www.zdnet.com/ces-2014-four-mega-trends-for-the-professionals-7000024727/

1. Wearables

2. The Internet of Things

3. Contextual computing

4. Consumerization of business tech

blog under the articles holds good information

Tablets (iPADs) in the Classroom

From: Perry Bratcher [mailto:bratcher@nku.edu]
Sent: Wednesday, November 06, 2013 9:01 AM
To: ‘lita-l@ala.org’
Cc: Michael Providenti; Michael Wells; Millie Mclemore; Perry Bratcher; Stephen Moon
Subject: [lita-l] RE: Classroom iPads

All – Thanks to each of you for your responses to my email regarding classroom use of iPads (see email at the bottom).  Listed below are is a summary of the comments I received.  I cut/pasted and have reconfigured these comments for this email, so some may be taken out of context.  NOTE: My systems staff have adamantly opposed using the Microsoft Surface.  We have a campus “tech bar” where student/staff can check out new devices for experimentation.  My staff said that the Surface doesn’t work in our particular situation for a variety of reasons and they prefer the iPad tablet option (if we go the tablet route).

Before deciding on implementation of PCs vs. laptops vs. tablet for use in a classroom setting, one needs to consider the motivation for doing so.  Space? Portability? Availability of apps?  Is there a demand for using personal devices for research, etc?  What type of portable device to use (iPad, Microsoft Surface, etc.)

Pros for using iPad/tablets:

  • Keep a few in there to provide examples of how to search on mobile devices.
  • The amount of apps and types of apps out there. Great education apps exist that do not exist elsewhere online or on other platforms (Android or Windows).
  • The iPad is flexible and allows you to regain that floor space you lose with computers and give the user privacy.
  • If setup correctly, the devices can be erased when they are returned so any private data is wiped.
  • Users can download additional apps, even purchase apps if you allow them.
  • They hold a charge much longer then any laptop or ChromeBook on the market.
  • Apple sold 94% of its iPads into education – the reason being that it’s a great education and research tool.
    • Another advantage that I can see boot up time. The iPad is instantly on and connected to the network. Perhaps this most applicable to last-minute library instruction or ad hoc group research?   However, if I had the choice, I would equip a classroom with MacBook Air SSDs
    • Understand how they need to be configured and the tools needed to do so. I created a kit for this not long ago for public libraries: http://www.macprofessionals.com/new-library-ipad-checkout-solution/   Thank you Chris Ross, Macprofessionals
    • UVA has been using iPads for instruction for about 2 years.  They have been very pleased with the results.
    • Our electronic classroom is very small, so we purchased 30 iPads over a year ago to allow teaching in our larger meeting room. There are definitely distinct advantages: flexibility, mobility, lack of technical infrastructure needed (wires, ports, etc.), and the myriad possibilities of apps.

 

Cons for using iPad/tablets:

  • Most mobile devices have not become “workhorse” devices as of yet, so much of the students’ research will still need to be done on a computer.
  • We haven’t seen any advantage to having them either – but our librarians use them sporadically for instruction.
  • Charging, syncing, configuring, Apple ID’s, erasing, cases, restrictions, printing, presenting, etc. For example if you want to present with these, you will need an Apple TV or an adapter. If you want to print you will need AirPrint supported printers or software. If you want to configure and erase you will need a Mac.
  • The challenge I have found is trying to use an inherently personal device in the typical one shot classroom environment. There are lots of things you need to consider. How will they access the wireless? What about taking notes? What about apps that require login? And much more.
  • Someone on staff is equipped and has the time to manage them.
  • We have a pool of 30 loan laptops, recently we have supplemented this with 11 loan iPads. The iPads have generally been very popular but wouldn’t work as a substitute for laptops. As many have mentioned when it comes to getting real work done they are inferior to laptops and people have commented as such.
  • As a complement to laptops though they are great – they are more portable and our nursing students love being able to carry them around and quickly access medical apps, take notes, check calculations etc. I definitely see them as being a valuable resource but if it’s an either/or proposition then I would go on the side of laptops.
  • My personal opinion is that it’s not a bad idea as a supplement to existing systems, but I’d be wary of  replacing more flexible with more limited ones, and am particularly wary of committing to one operating system/vendor (particularly one that tends to charge half-again to twice as much as their competitors with only limited advantages).
  • In a classroom setting (e.g. instruction room) I see little advantage of tablets;  their sole advantage from I can figure out is their portability.   Why force people into a limited device if it is only going to be in one room anyway?

 

ECAR STUDY OF UNDERGRADUATE STUDENTS AND INFORMATION TECHNOLOGY, 2013

Key Findings

See the 2013 report for a full list of key messages, findings, and supporting data.

  • Students recognize the value of technology but still need guidance when it comes to better using it for academics.
  • Students prefer blended learning environments while beginning to experiment with MOOCs.
  • Students are ready to use their mobile devices more for academics, and they look to institutions and instructors for opportunities and encouragement to do so.
  • Students value their privacy, and using technology to connect with them has its limits.
p. 10 students are generally confident in their prepraredness to use technology for course work, but those who are interested in more tech training favor “in calss” guidance over separate training options.

Educause’s ECAR Study, 2013

http://www.educause.edu/library/resources/ecar-study-undergraduate-students-and-information-technology-2013

Infographic:

http://net.educause.edu/ir/library/pdf/ERS1302/Eig1302.pdf

1 14 15 16