Searching for "fake"

Big Tech in schools

Former Google Design Ethicist: Relying on Big Tech in Schools Is a ‘Race to the Bottom’

By Jenny Abamu     Feb 7, 2018

https://www.edsurge.com/news/2018-02-07-former-google-design-ethicist-relying-on-big-tech-in-schools-is-a-race-to-the-bottom

Common Sense Media recently partnered with the Center for Humane Technology, which supports the development of ethical technological tools, to lay out a fierce call for regulation and awareness about the health issues surrounding tech addiction.

Tristan Harris, a former ethicist at Google who founded the Center for Humane Technology

To support educators making such decisions, Common Sense Media is taking their “Truth about Tech” campaign to schools through an upgraded version of their current Digital Citizenship curriculum. The new updates will include more information on subjects such as:

  • Creating a healthy media balance and digital wellness;
  • Concerns about the rise of hate speech in schools, that go beyond talking about cyberbullying; and
  • Fake news, media literacy and curating your own content

What Does ‘Tech Addiction’ Mean?

In a recent NPR report, writer Anya Kamenetz, notes that clinicians are debating whether technology overuse is best categorized as a bad habit, a symptom of other mental struggles (such as depression or anxiety) or as an addiction.

Dr. Jenny Radesky, a developmental-behavioral pediatrician at the American Academy of Pediatrics, notes that though she’s seen solid evidence linking heavy media usage to problems with sleep and obesity, she hesitated to call the usage “addiction.”

Dr. Robert Lustig, an endocrinologist who studies hormones at the University of Southern California disagreed, noting that parents have to see the overuse of technology as an addiction.

free speech and privacy

IT’S THE (DEMOCRACY-POISONING) GOLDEN AGE OF FREE SPEECH

Jan 16, 2018

https://www.wired.com/story/free-speech-issue-tech-turmoil-new-censorship/

My note: the author uses the 1960 military junta in Turkey as an example. Here it is the 2014 “modern” ideological fight of increasingly becoming dictatorial Turkish Prime Minister Recep Erdogan against his citizens by shutting off Twitter: http://time.com/33393/turkey-recep-tayyip-erdogan-twitter/
Here is more on civil disobedience and social media: https://blog.stcloudstate.edu/ims?s=civil+disobedience

until recently, broadcasting and publishing were difficult and expensive affairs, their infrastructures riddled with bottlenecks and concentrated in a few hands.

When protests broke out in Ferguson, Missouri, in August 2014, a single livestreamer named Mustafa Hussein reportedly garnered an audience comparable in size to CNN’s for a short while. If a Bosnian Croat war criminal drinks poison in a courtroom, all of Twitter knows about it in minutes.

In today’s networked environment, when anyone can broadcast live or post their thoughts to a social network, it would seem that censorship ought to be impossible. This should be the golden age of free speech.

And sure, it is a golden age of free speech—if you can believe your lying eyes. Is that footage you’re watching real? Was it really filmed where and when it says it was? Is it being shared by alt-right trolls or a swarm of Russian bots?
My note: see the ability to create fake audio and video footage:
https://blog.stcloudstate.edu/ims/2017/07/15/fake-news-and-video/

HERE’S HOW THIS golden age of speech actually works: In the 21st century, the capacity to spread ideas and reach an audience is no longer limited by access to expensive, centralized broadcasting infrastructure. It’s limited instead by one’s ability to garner and distribute attention. And right now, the flow of the world’s attention is structured, to a vast and overwhelming degree, by just a few digital platforms: Facebook, Google (which owns YouTube), and, to a lesser extent, Twitter.

at their core, their business is mundane: They’re ad brokers

They use massive surveillance of our behavior, online and off, to generate increasingly accurate, automated predictions of what advertisements we are most susceptible to and what content will keep us clicking, tapping, and scrolling down a bottomless feed.

in reality, posts are targeted and delivered privately, screen by screen by screen. Today’s phantom public sphere has been fragmented and submerged into billions of individual capillaries. Yes, mass discourse has become far easier for everyone to participate in—but it has simultaneously become a set of private conversations happening behind your back. Behind everyone’s backs.

It’s important to realize that, in using these dark posts, the Trump campaign wasn’t deviantly weaponizing an innocent tool. It was simply using Facebook exactly as it was designed to be used. The campaign did it cheaply, with Facebook staffers assisting right there in the office, as the tech company does for most large advertisers and political campaigns.

+++++++++
more on privacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=privacy

more on free speech in this IMS blog
https://blog.stcloudstate.edu/ims?s=free+speech

Social Media Making us dumber

Social Media Is Making Us Dumber. Here’s Exhibit A.

weaponizing the web RT hybrid war

Fake news and botnets: how Russia weaponised the web

https://www.theguardian.com/technology/2017/dec/02/fake-news-botnets-how-russia-weaponised-the-web-cyber-attack-estonia

The digital attack that brought Estonia to a standstill 10 years ago was the first shot in a cyberwar that has been raging between Moscow and the west ever since

It began at exactly 10pm on 26 April, 2007, when a Russian-speaking mob began rioting in the streets of Tallinn, the capital city of Estonia, killing one person and wounding dozens of others. That incident resonates powerfully in some of the recent conflicts in the US. In 2007, the Estonian government had announced that a bronze statue of a heroic second world war Soviet soldier was to be removed from a central city square. For ethnic Estonians, the statue had less to do with the war than with the Soviet occupation that followed it, which lasted until independence in 1991. For the country’s Russian-speaking minority – 25% of Estonia’s 1.3 million people – the removal of the memorial was another sign of ethnic discrimination.

That evening, Jaan Priisalu – a former risk manager for Estonia’s largest bank, Hansabank, who was working closely with the government on its cybersecurity infrastructure – was at home in Tallinn with his girlfriend when his phone rang. On the line was Hillar Aarelaid, the chief of Estonia’s cybercrime police.

“It’s going down,” Aarelaid declared. Alongside the street fighting, reports of digital attacks were beginning to filter in. The websites of the parliament, major universities, and national newspapers were crashing. Priisalu and Aarelaid had suspected something like this could happen one day. A digital attack on Estoniahad begun.

“The Russian theory of war allows you to defeat the enemy without ever having to touch him,” says Peter Pomerantsev, author of Nothing is True and Everything is Possible. “Estonia was an early experiment in that theory.”

Since then, Russia has only developed, and codified, these strategies. The techniques pioneered in Estonia are known as the “Gerasimov doctrine,” named after Valery Gerasimov, the chief of the general staff of the Russian military. In 2013, Gerasimov published an article in the Russian journal Military-Industrial Courier, articulating the strategy of what is now called “hybrid” or “nonlinear” warfare. “The lines between war and peace are blurred,” he wrote. New forms of antagonism, as seen in 2010’s Arab spring and the “colour revolutions” of the early 2000s, could transform a “perfectly thriving state, in a matter of months, and even days, into an arena of fierce armed conflict”.

Russia has deployed these strategies around the globe. Its 2008 war with Georgia, another former Soviet republic, relied on a mix of both conventional and cyber-attacks, as did the 2014 invasion of Crimea. Both began with civil unrest sparked via digital and social media – followed by tanks. Finland and Sweden have experienced near-constant Russian information operations. Russian hacks and social media operations have also occurred during recent elections in Holland, Germany, and France. Most recently, Spain’s leading daily, El País, reported on Russian meddling in the Catalonian independence referendum. Russian-supported hackers had allegedly worked with separatist groups, presumably with a mind to further undermining the EU in the wake of the Brexit vote.

The Kremlin has used the same strategies against its own people. Domestically, history books, school lessons, and media are manipulated, while laws are passed blocking foreign access to the Russian population’s online data from foreign companies – an essential resource in today’s global information-sharing culture. According to British military researcher Keir Giles, author of Nato’s Handbook of Russian Information Warfare, the Russian government, or actors that it supports, has even captured the social media accounts of celebrities in order to spread provocative messages under their names but without their knowledge. The goal, both at home and abroad, is to sever outside lines of communication so that people get their information only through controlled channels.

+++++++++++++++++++++
24-hour Putin people: my week watching Kremlin ‘propaganda channel’ RT

https://www.theguardian.com/media/2017/nov/29/24-hour-putin-people-my-week-watching-kremlin-propaganda-channel-rt-russia-today

 Wednesday 29 November 2017 

According to its detractors, RT is Vladimir Putin’s global disinformation service, countering one version of the truth with another in a bid to undermine the whole notion of empirical truth. And yet influential people from all walks of public life appear on it, or take its money. You can’t criticise RT’s standards, they say, if you don’t watch it. So I watched it. For a week.

Suchet, the son of former ITV newsreader John Suchet and the nephew of actor David Suchet, has been working for RT since 2009. The offspring of well-known people feature often on RT. Sophie Shevardnadze, who presents Sophie & Co, is the granddaughter of former Georgian president and Soviet foreign minister Eduard ShevardnadzeTyrel Ventura, who presents Watching the Hawks on RT America, is the son of wrestler-turned-politician Jesse Ventura. His co-host is Oliver Stone’s son Sean.

My note; so this is why Oliver Stone in his “documentary” went gentle on Putin, so his son can have a job. #Nepotism #FakeNews

RT’s stated mission is to offer an “alternative perspective on major global events”, but the world according to RT is often downright surreal.

Peter Pomerantsev, author of Nothing Is True and Everything Is Possible, about Putin’s Russia, and now a senior visiting fellow in global affairs at the London School of Economics, was in Moscow working in television when Russia Today first started hiring graduates from Britain and the US. “The people were really bright, they were being paid well,” he says. But they soon found they were being ordered to change their copy, or instructed how to cover certain stories to reflect well on the Kremlin. “Everyone had their own moment when they first twigged that this wasn’t like the BBC,” he says. “That, actually, this is being dictated from above.” The coverage of Russia’s war with Georgia in 2008 was a lightbulb moment for many, he says. They quit.

+++++++++++++++

more on Russian bots, trolls:
https://blog.stcloudstate.edu/ims/2017/11/22/bots-trolls-and-fake-news/

+++++++++++++++
more on state propaganda in this IMS blog
https://blog.stcloudstate.edu/ims/2017/11/21/china-of-xi/

FCC and netneutrality

https://hackernoon.com/more-than-a-million-pro-repeal-net-neutrality-comments-were-likely-faked-e9f0e3ed36a6

Jeff Kao Data Scientist, Software Engineer, Language Nerd, Biglaw Refugee. jeffykao.com

More than a Million Pro-Repeal Net Neutrality Comments were Likely Faked

++++++++++++++++

The Federal Communications Commission released a plan on Tuesday to dismantle landmark regulations that ensure equal access to the internet, clearing the way for internet service companies to charge users more to see certain content and to curb access to some websites.

The proposal, made by the F.C.C. chairman, Ajit Pai, is a sweeping repeal of rules put in place by the Obama administration. The rules prohibit high-speed internet service providers, or I.S.P.s, from stopping or slowing down the delivery of websites. They also prevent the companies from charging customers extra fees for high-quality streaming and other services.

++++++++++

FCC chairman defends net neutrality repeal plan

“All we are simply doing is putting engineers and entrepreneurs, instead of bureaucrats and lawyers, back in charge of the internet,” Pai said on Fox News’s “Fox & Friends,”

Pai on Tuesday confirmed his plan to fully dismantle the Obama-era net neutrality rules, which were approved by the FCC’s previous Democratic majority in 2015. His order would remove bans on blocking and throttling web traffic and allow internet service providers to charge for internet “fast lanes” to consumers. The move sparked a barrage of criticism from Democrats and public interest groups who call it a giveaway to big telecom companies.

+++++++++++++++++

What Everyone Gets Wrong in the Debate Over Net Neutrality

DATE OF PUBLICATION: 06.23.14TIME OF PUBLICATION: 6:30 AM.

The only trouble is that, here in the year 2014, complaints about a fast-lane don’t make much sense. Today, privileged companies—including Google, Facebook, and Netflix—already benefit from what are essentially internet fast lanes, and this has been the case for years. Such web giants—and others—now have direct connections to big ISPs like Comcast and Verizon, and they run dedicated computer servers deep inside these ISPs. In technical lingo, these are known as “peering connections” and “content delivery servers,” and they’re a vital part of the way the internet works.

in today’s world, they don’t address the real issue with the country’s ISPs, and if we spend too much time worried about fast lanes, we could hurt the net’s progress rather than help it.

The real issue is that the Comcasts and Verizons are becoming too big and too powerful. Because every web company has no choice but to go through these ISPs, the Comcasts and the Verizons may eventually have too much freedom to decide how much companies must pay for fast speeds.

++++++++++++++++

FAKE AMERICANS ARE INFLUENCING THE DEBATE OVER NET NEUTRALITY, SAYS NEW YORK’S ATTORNEY GENERAL

http://www.newsweek.com/bots-influencing-debate-over-net-neutrality-says-new-york-attorney-general-719454
An analysis of the millions of comments conducted by the data company Gravwell in October found that just 17.4 percent of the comments to the FCC on the net neutrality rules came from real people.
+++++++++++++++
Finley, K. (2017, November 22). Here’s How the End of Net Neutrality Will Change the Internet. WIRED. Retrieved from https://www.wired.com/story/heres-how-the-end-of-net-neutrality-will-change-the-internet/
Because many internet services for mobile devices include limits on data use, the changes will be visible there first. In one dramatic scenario, internet services would begin to resemble cable-TV packages, where subscriptions could be limited to a few dozen sites and services. Or, for big spenders, a few hundred. Fortunately, that’s not a likely scenario. Instead, expect a gradual shift towards subscriptions that provide unlimited access to certain preferred providers while charging extra for everything else.
Even Verizon’s “unlimited” plans impose limits. The company’s cheapest unlimited mobile plan limits video streaming quality to 480p resolution, which is DVD quality, on phones and 720p resolution, the lower tier of HD quality, on tablets. Customers can upgrade to a more expensive plan that enables 720p resolution on phones and 1080p on tablets, but the higher quality 4K video standard is effectively forbidden.
Meanwhile, Comcast customers in 28 states face 1 terabyte data caps. Going over that limit costs subscribers as much as an additional $50 a month. As 4K televisions become more common, more households may hit the limit. That could prompt some to stick with a traditional pay-TV package from Comcast.
Republican FCC Chair Ajit Pai argues that Federal Trade Commission will be able to protect consumers and small business from abuses by internet providers once the agency’s current rules are off the books. But that’s not clear.
The good news is the internet won’t change overnight, if it all. Blake Reid, a clinical professor at Colorado Law, says the big broadband providers will wait to see how the inevitable legal challenges to the new FCC order shakeout. They’ll probably keep an eye on 2018 and even 2020 elections as well.

++++++++++++++++
more on netneutrality in this IMS blog
https://blog.stcloudstate.edu/ims?s=netneutrality

China of Xi

Time of Xi



My note: CCTV (http://english.cctv.com/), accidentally overlaps with cctv (https://en.wikipedia.org/wiki/Closed-circuit_television): “also known as video surveillance”

China Central Television (formerly Beijing Television), commonly abbreviated as CCTV, is the predominant state television broadcaster in the People’s Republic of China. CCTV has a network of 50 channels broadcasting different programmes and is accessible to more than one billion viewers.[1] As of present, there are 50 television channels, and the broadcaster provides programming in six different languages. Most of its programmes are a mixture of news, documentary, social education, comedy, entertainment, and drama, the majority of which consists of Chinese soap operas and entertainment.[2]

https://en.wikipedia.org/wiki/China_Central_Television

CCTV is one of the official mouthpieces of the Communist Party of China, and is part of what is known in China as the “central three” (中央三台), with the others being China National Radio and China Radio International.

Fake news and CCTV

https://en.wikipedia.org/wiki/China_Central_Television

https://blogs.wsj.com/chinarealtime/2014/03/28/china-targets-fake-news/

http://ascportfolios.org/chinaandmedia/2011/01/31/fake-news-in-the-news/

https://www.huffingtonpost.com/entry/united-states-china-fake-news_us_592494d5e4b00c8df29f88d7

CCTV mentioned positively: http://www.bbc.com/news/world-asia-china-22424129

manufacturing consent

https://politicsmeanspolitics.com/fake-news-is-just-another-form-of-manufacturing-consent-e8ebc0b6d971

https://www.byline.com/column/3/article/7

http://journals.sagepub.com/doi/abs/10.1177/0267323102017002691

http://journals.sagepub.com/doi/abs/10.1177/0267323114564758

https://www.omicsonline.org/open-access/a-critique-of-edward-herman-and-noam-chomskys-manufacturingconsent-the-political-economy-of-mass-media-2168-9717-1000176.pdf

http://www.rollingstone.com/politics/features/matt-taibbi-on-the-death-of-edward-herman-w511766


topics for IM260

proposed topics for IM 260 class

  • Media literacy. Differentiated instruction. Media literacy guide.
    Fake news as part of media literacy. Visual literacy as part of media literacy. Media literacy as part of digital citizenship.
  • Web design / web development
    the roles of HTML5, CSS, Java Script, PHP, Bootstrap, JQuery, React and other scripting languages and libraries. Heat maps and other usability issues; website content strategy. THE MODEL-VIEW-CONTROLLER (MVC) design pattern
  • Social media for institutional use. Digital Curation. Social Media algorithms. Etiquette Ethics. Mastodon
    I hosted a LITA webinar in the fall of 2016 (four weeks); I can accommodate any information from that webinar for the use of the IM students
  • OER and instructional designer’s assistance to book creators.
    I can cover both the “library part” (“free” OER, copyright issues etc) and the support / creative part of an OER book / textbook
  • Big Data.” Data visualization. Large scale visualization. Text encoding. Analytics, Data mining. Unizin. Python, R in academia.
    I can introduce the students to the large idea of Big Data and its importance in lieu of the upcoming IoT, but also departmentalize its importance for academia, business, etc. From infographics to heavy duty visualization (Primo X-Services API. JSON, Flask).
  • NetNeutrality, Digital Darwinism, Internet economy and the role of your professional in such environment
    I can introduce students to the issues, if not familiar and / or lead a discussion on a rather controversial topic
  • Digital assessment. Digital Assessment literacy.
    I can introduce students to tools, how to evaluate and select tools and their pedagogical implications
  • Wikipedia
    a hands-on exercise on working with Wikipedia. After the session, students will be able to create Wikipedia entries thus knowing intimately the process of Wikipedia and its information.
  • Effective presentations. Tools, methods, concepts and theories (cognitive load). Presentations in the era of VR, AR and mixed reality. Unity.
    I can facilitate a discussion among experts (your students) on selection of tools and their didactically sound use to convey information. I can supplement the discussion with my own findings and conclusions.
  • eConferencing. Tools and methods
    I can facilitate a discussion among your students on selection of tools and comparison. Discussion about the their future and their place in an increasing online learning environment
  • Digital Storytelling. Immersive Storytelling. The Moth. Twine. Transmedia Storytelling
    I am teaching a LIB 490/590 Digital Storytelling class. I can adapt any information from that class to the use of IM students
  • VR, AR, Mixed Reality.
    besides Mark Gill, I can facilitate a discussion, which goes beyond hardware and brands, but expand on the implications for academia and corporate education / world
  • IoT , Arduino, Raspberry PI. Industry 4.0
  • Instructional design. ID2ID
    I can facilitate a discussion based on the Educause suggestions about the profession’s development
  • Microcredentialing in academia and corporate world. Blockchain
  • IT in K12. How to evaluate; prioritize; select. obsolete trends in 21 century schools. K12 mobile learning
  • Podcasting: past, present, future. Beautiful Audio Editor.
    a definition of podcasting and delineation of similar activities; advantages and disadvantages.
  • Digital, Blended (Hybrid), Online teaching and learning: facilitation. Methods and techniques. Proctoring. Online students’ expectations. Faculty support. Asynch. Blended Synchronous Learning Environment
  • Gender, race and age in education. Digital divide. Xennials, Millennials and Gen Z. generational approach to teaching and learning. Young vs old Millennials. Millennial employees.
  • Privacy, [cyber]security, surveillance. K12 cyberincidents. Hackers.
  • Gaming and gamification. Appsmashing. Gradecraft
  • Lecture capture, course capture.
  • Bibliometrics, altmetrics
  • Technology and cheating, academic dishonest, plagiarism, copyright.

digital assessment

Unlocking the Promise of Digital Assessment

By Stacey Newbern Dammann, EdD, and Josh DeSantis October 30, 2017

https://www.facultyfocus.com/articles/teaching-with-technology-articles/unlocking-promise-digital-assessment/

The proliferation of mobile devices and the adoption of learning applications in higher education simplifies formative assessment. Professors can, for example, quickly create a multi-modal performance that requires students to write, draw, read, and watch video within the same assessment. Other tools allow for automatic grade responses, question-embedded documents, and video-based discussion.

  • Multi-Modal Assessments – create multiple-choice and open-ended items that are distributed digitally and assessed automatically. Student responses can be viewed instantaneously and downloaded to a spreadsheet for later use.
    • (socrative.com) and
    • Poll Everywhere (http://www.pollev.com).
    • Formative (http://www.goformative.com) allows professors to upload charts or graphic organizers that students can draw on with a stylus. Formative also allows professors to upload document “worksheets” which can then be augmented with multiple-choice and open-ended questions.
    • Nearpod (http://www.nearpod.com) allows professors to upload their digital presentations and create digital quizzes to accompany them. Nearpod also allows professors to share three-dimensional field trips and models to help communicate ideas.
  • Video-Based Assessments – Question-embedded videos are an outstanding way to improve student engagement in blended or flipped instructional contexts. Using these tools allows professors to identify if the videos they use or create are being viewed by students.
    • EdPuzzle (edpuzzle.com) and
    • Playposit (http://www.playposit.com) are two leaders in this application category. A second type of video-based assessment allows professors to sustain discussion-board like conversation with brief videos.
    • Flipgrid (http://www.flipgrid.com), for example, allows professors to posit a video question to which students may respond with their own video responses.
  • Quizzing Assessments – ools that utilize close-ended questions that provide a quick check of student understanding are also available.
    • Quizizz (quizizz.com) and
    • Kahoot (http://www.kahoot.com) are relatively quick and convenient to use as a wrap up to instruction or a review of concepts taught.

Integration of technology is aligned to sound formative assessment design. Formative assessment is most valuable when it addresses student understanding, progress toward competencies or standards, and indicates concepts that need further attention for mastery. Additionally, formative assessment provides the instructor with valuable information on gaps in their students’ learning which can imply instructional changes or additional coverage of key concepts. The use of tech tools can make the creation, administration, and grading of formative assessment more efficient and can enhance reliability of assessments when used consistently in the classroom. Selecting one that effectively addresses your assessment needs and enhances your teaching style is critical.

+++++++++++++++++
more on digital assessment in this IMS blog
https://blog.stcloudstate.edu/ims/2017/03/15/fake-news-bib/

social media algorithms

How algorithms impact our browsing behavior? browsing history?
What is the connection between social media algorithms and fake news?
Are there topic-detection algorithms as they are community-detection ones?
How can I change the content of a [Google] search return? Can I? 

Larson, S. (2016, July 8). What is an Algorithm and How Does it Affect You? The Daily Dot. Retrieved from https://www.dailydot.com/debug/what-is-an-algorithm/
Berg, P. (2016, June 30). How Do Social Media Algorithms Affect You | Forge and Smith. Retrieved September 19, 2017, from https://forgeandsmith.com/how-do-social-media-algorithms-affect-you/
Oremus, W., & Chotiner, I. (2016, January 3). Who Controls Your Facebook Feed. Slate. Retrieved from http://www.slate.com/articles/technology/cover_story/2016/01/how_facebook_s_news_feed_algorithm_works.html
Lehrman, R. A. (2013, August 11). The new age of algorithms: How it affects the way we live. Christian Science Monitor. Retrieved from https://www.csmonitor.com/USA/Society/2013/0811/The-new-age-of-algorithms-How-it-affects-the-way-we-live
Johnson, C. (2017, March 10). How algorithms affect our way of life. Desert News. Retrieved from https://www.deseretnews.com/article/865675141/How-algorithms-affect-our-way-of-life.html
Understanding algorithms and their impact on human life goes far beyond basic digital literacy, some experts said.
An example could be the recent outcry over Facebook’s news algorithm, which enhances the so-called “filter bubble”of information.
personalized search (https://en.wikipedia.org/wiki/Personalized_search)
Kounine, A. (2016, August 24). How your personal data is used in personalization and advertising. Retrieved September 19, 2017, from https://www.tastehit.com/blog/personal-data-in-personalization-and-advertising/
Hotchkiss, G. (2007, March 9). The Pros & Cons Of Personalized Search. Retrieved September 19, 2017, from http://searchengineland.com/the-pros-cons-of-personalized-search-10697
Magid, L. (2012). How (and why) To Turn Off Google’s Personalized Search Results. Forbes. Retrieved from https://www.forbes.com/sites/larrymagid/2012/01/13/how-and-why-to-turn-off-googles-personalized-search-results/#53a30be838f2
Nelson, P. (n.d.). Big Data, Personalization and the No-Search of Tomorrow. Retrieved September 19, 2017, from https://www.searchtechnologies.com/blog/big-data-search-personalization

gender

Massanari, A. (2017). #Gamergate and The Fappening: How Reddit’s algorithm, governance, and culture support toxic technocultures. New Media & Society19(3), 329-346. doi:10.1177/1461444815608807

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d121748152%26site%3dehost-live%26scope%3dsite

community detection algorithms:

Bedi, P., & Sharma, C. (2016). Community detection in social networks. Wires: Data Mining & Knowledge Discovery6(3), 115-135.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d114513548%26site%3dehost-live%26scope%3dsite

CRUZ, J. D., BOTHOREL, C., & POULET, F. (2014). Community Detection and Visualization in Social Networks: Integrating Structural and Semantic Information. ACM Transactions On Intelligent Systems & Technology5(1), 1-26. doi:10.1145/2542182.2542193

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d95584126%26site%3dehost-live%26scope%3dsite

Bai, X., Yang, P., & Shi, X. (2017). An overlapping community detection algorithm based on density peaks. Neurocomputing2267-15. doi:10.1016/j.neucom.2016.11.019

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d120321022%26site%3dehost-live%26scope%3dsite

topic-detection algorithms:

Zeng, J., & Zhang, S. (2009). Incorporating topic transition in topic detection and tracking algorithms. Expert Systems With Applications36(1), 227-232. doi:10.1016/j.eswa.2007.09.013

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d34892957%26site%3dehost-live%26scope%3dsite

topic detection and tracking (TDT) algorithms based on topic models, such as LDA, pLSI (https://en.wikipedia.org/wiki/Probabilistic_latent_semantic_analysis), etc.

Zhou, E., Zhong, N., & Li, Y. (2014). Extracting news blog hot topics based on the W2T Methodology. World Wide Web17(3), 377-404. doi:10.1007/s11280-013-0207-7

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d94609674%26site%3dehost-live%26scope%3dsite

The W2T (Wisdom Web of Things) methodology considers the information organization and management from the perspective of Web services, which contributes to a deep understanding of online phenomena such as users’ behaviors and comments in e-commerce platforms and online social networks.  (https://link.springer.com/chapter/10.1007/978-3-319-44198-6_10)

ethics of algorithm

Mittelstadt, B. D., Allo, P., Taddeo, M., Wachter, S., & Floridi, L. (2016). The ethics of algorithms: Mapping the debate. Big Data & Society, 3(2), 2053951716679679. https://doi.org/10.1177/2053951716679679

journalism

Malyarov, N. (2016, October 18). Journalism in the age of algorithms, platforms and newsfeeds | News | FIPP.com. Retrieved September 19, 2017, from http://www.fipp.com/news/features/journalism-in-the-age-of-algorithms-platforms-newsfeeds

+++++++++++++++++
https://blog.stcloudstate.edu/ims?s=algorithm
more on algorithms in this IMS blog

see also

1 12 13 14 15