Skip to main content

Home/ beyondwebct/ Group items tagged based

Rss Feed Group items tagged

Barbara Lindsey

Offbeat Bride | Copyright, Creative Commons, and your wedding photos - 0 views

  • The purpose of copyright law is to promote the progress of science and art.
  • most of what you find online is under copyright, even if there is no copyright symbol and no attribution and no source listed
  • Copyright comes with a set of exclusive rights.
  • ...6 more annotations...
  • The right to make copies. The right to distribute copies. The right to make derivative works. The right to perform or display the work.
  • The way the default rules of copyright ownership work, the photographer you hire to shoot your wedding holds the copyrights in your wedding photos.
  • But that's just the default. You can change all that with the contract you sign when you hire your photographer. Most wedding photographers these days do retain the copyrights in the photos they take of your wedding, but they may give you a license to make personal, non-commercial uses of your photos. This is especially common when photographers offer a CD or DVD containing the high-res files of all your pictures. You usually have to pay extra, but a license like this means you can print copies yourself, post your pictures on Facebook, and send them to your friends, without asking for permission and without violating your photographer's copyright. These are all good rights to have, and I highly recommend reading your contract carefully to see if you get them, and if you don't, to ask.
  • Many photographers, artists, musicians, and authors – including the ones who make a living from their art – now use Creative Commons licenses because they recognize that it is good for them. They always get credit as the creator, and it's easier for people to discover and fall in love with their work when fans are free to copy and share it.
  • Her biggest concern was that if the license was attached to high-resolution versions of the photos it would be too easy for people to make infringing uses, especially in print
  • we compromised with an agreement that we would be allowed to attach a Creative Commons Attribution-Noncommercial license only to low-res versions of the files. This is enough to allow for web-based reuses of our photos, but was limited enough that our photographer was comfortable giving it a try. We edited the language in her standard photographer contract to reflect the new license, and that was it.
  •  
    Another excellent post by Molly Klein about copyright
Barbara Lindsey

Apple's iPhone OS 4.0: What Will It Mean for Mobile Learning? by Bill Brandon : Learni... - 0 views

  • This has pretty exciting possibilities for Webinar/virtual classroom applications. The demo this morning was Skype. Until now, if you weren’t running Skype in the foreground on your iPhone, you couldn’t receive calls, and if you left the Skype app during a call, the call would disconnect. Now even when the phone is locked, you will still be able to receive Skype calls. When the phone is asleep or when the user is running other apps, VoIP apps can receive calls. When you send Skype to the background, incoming call invites will appear as the standard iPhone/iPod notification. Clicking the answer button brings the Skype app back. One question in the backchat during the presentation was whether there might be a new iPhone coming with a front-facing camera for such calls, but this went unanswered.
  • The new OS, in the background, will use cell towers to detect the phone’s location, in order to minimize power demands. The primary use of this service will be for turn-by-turn navigation. The secondary use will be to support social networking apps, such as Loopt. The OS has privacy protection for this service. An indicator on the status bar lets the user know when an app is using his or her location. The user can enable and disable location use by individual apps. This service could be useful for “location-based learning.”
  • Users can read books on any device (iPhone/iPod Touch/iPad). The books sync between devices, so that a user can stop reading a book on one device, then open it on another, and at the same place. This could be extremely handy for textbook use.
  • ...1 more annotation...
  • Mobile device management Wireless application distribution (iTunes sync not required)
suzanne ondrus

Social Media in Africa, Part 1 - 1 views

  • undergoing a connectivity revolution
  • Africa
  • Part One of this series looks at social media contributions from Africans, Part Two looks at mobile and connectivity innovations and Part Three looks at how local Governments, NGOs and nonprofits are being affected.
  • ...8 more annotations...
  • Technology unconferences and Barcamps have sprung up all over the continent, everywhere from Kenya to Nairobi to Madagascar to Uganda and Senegal.
  • The three biggest success stories of independent social media projects taking off in Africa are Afrigator (a South African aggregator of African blogs and news), Zoopy (a YouTube/Flickr like service also out of South Africa) and Ushahidi (an SMS crisis reporting and mapping engine from Kenya). All three have drawn international attention which resulted in a major investment for Zoopy and Afrigator's acquisition (ReadWriteWeb's coverage). Meanwhile Ushahidi has successfully raised several rounds of funding after winning the Net2 Mashup Compeition prize of $25,000.
  • Afrigator defines itself as "a social media aggregator and directory built especially for African digital citizens who publish and consume content on the web."
  • Zoopy is a South African social media tool created by Jason Elk that allows users to upload videos, podcasts, and pictures and share them on the web.
  • Ushahidi relies heavily upon GoogleMaps, which it uses for mapping reports of incidents. It's built on the Zend framework for PHP and uses a number of different protocols for SMS, GPRS and mapping data.
    • Barbara Lindsey
       
      Example of mashup and use of geomapping.
  • The applications to follow are definitely the ones that leverage the mobile telephony infrastructure. An overwhelming portion of African users have no convenient access beyond cellular terminals - and that has spawned very innovative solutions based on existing and widely accessible technologies such as SMS. Examples abound such as Mpesa, Celpay, Etranzact and everyone else who is thriving in that formerly almost entirely cash-bound insecure environment. Underdeveloped banking and underdeveloped fixed telecommunications infrastructures are huge opportunities.
  • The Web Community
    • suzanne ondrus
       
      Internet is expensive in Africa, at least where I was in Benin. It was a dollar an hour where I was. And teachers only earned $3 a day.
  • Mobile phones
    • suzanne ondrus
       
      I was in Benin for nine months in 2006-2007 and can attest to how expensive it is to talk on cell phones- for local calls! A 15 min. local call cost about $20. I remember thinking how calling from the U.S. to Benin was cheaper than making local calls in Benin.
Chenwen Hong

Planning for Neomillennial Learning Styles: Implications for Investments in Technology ... - 0 views

shared by Chenwen Hong on 30 Apr 10 - Cached
  • One major advantage of egocentric perspectives is that they enable participants' actional immersion and motivation more strongly than exocentric FORs, which are better suited for dispassionate observer roles.
    • Chenwen Hong
       
      Can we say teaching through gaming is proving an egocentric FOR to course content?
    • Chenwen Hong
       
      I think teaching through gaming is proving an egocentric FOR to course content.
  • While the content of these games and activities often does not lead to knowledge useful in the real world, rich types of learning and identity formation do take place in these environments, fostering neomillennial learning styles based on characteristics of immersive mediated interaction.
    • Chenwen Hong
       
      Therefore, if we are to integrating gaming into the course, the content and activities then will have meanings and can be made useful in the real world.
  • Virtual identity unfettered by physical attributes such as gender, race, disabilities
    • Chenwen Hong
       
      I have doubts on this "unfettered" virtual identity, which has been mentioned earlier in this article. If avatars are created in terms of how we defines identities in real world, how come those physical attributes will disappear?
  • ...2 more annotations...
  • Multitasking among disparate experiences and information sources
    • Chenwen Hong
       
      Is this not proved to be less efficient and result in less successul acedmic performances?
  • These virtual worlds are persistent social and material worlds, loosely structured by open-ended (fantasy) narratives, where players are largely free to do as they please—slay ogres, siege castles, barter goods in town, or shake the fruit out of trees
    • Chenwen Hong
       
      While it is easy to confuse virtual life with real life, do we instructors play a role of teaching them to tell their differences as we are blending their real life into the virtual world in teaching? Or is there such a role?
Barbara Lindsey

Twitter's role in Bangkok conflict unprecedented - The Globe and Mail - 0 views

  • “We all become our own news wire service, breaking stories and events instantly. Did [tweets from inside Wat Pathum] prevent a massacre? Maybe they did. Who knows?” wrote Andrew Spooner, a London-based journalist who waded deep into the Thailand story from afar, tweeting about events from a decidedly pro-Red Shirt perspective.
  • That partisanship was the ugly side of Twitter’s role in the Thai crisis. While the social networking site did perhaps save lives in a few specific instances, Twitter – and the opportunity it gives to instantly broadcast whatever is on your mind, often from behind a cloak of near-anonymity – also gave Thais and foreigners living here the chance to broadcast vitriolic, often hateful, thoughts to the world, raising the temperature inside this already volatile country and arguably helping nudge the situation toward its violent end.
  • “More people will die inside Wat Patum unless we get ceasefire to get to hospital across the road,” I added a few minutes later, as my desperation grew. Within minutes, my pleas had indeed been retweeted hundreds, maybe thousands of times, in English, Thai and other languages. They were posted on the websites of Britain’s The Guardian newspaper and other international media. People I knew only through Twitter started calling me to check on our situation. More helpfully, others started calling embassies, hospitals and the Thai government. Eighty minutes later, I was carrying stretchers out to a row of waiting ambulances. “Twitter may just have done this,” was my next update.
  • ...1 more annotation...
  • “People were not really that interested in Twitter until Thaksin started using it,” said Ms. Poomjit, the Internet freedom activist. “He made it a trend.”
Barbara Lindsey

t r u t h o u t | Dumbing Down Teachers: Attacking Colleges of Education in the Name of... - 0 views

  • the Obama administration's educational policy under the leadership of Arne Duncan lacks a democratic vision and sense of moral direction
  • Almost all of Duncan's polices are indebted to the codes of a market-driven business culture, legitimated through discourses of measurement, efficiency and utility. This is a discourse that values hedge fund managers over teachers, privatization over the public good, management over leadership and training over education. Duncan's fervent support of neoliberal values are well-known and are evident in his support for high-stakes testing, charter schools, school-business alliances, merit pay, linking teacher pay to higher test scores, offering students monetary rewards for higher grades, CEO-type management, abolishing tenure, defining the purpose of schooling as largely job training, the weakening of teacher unions and blaming teachers exclusively for the failure of public schooling.[4]
  • Duncan has expanded the reach of his educational reform policies and is now attempting to rewrite curricular mandates. Emphasizing the practical and experiential, he seeks to gut the critical nature of theory, pedagogy and knowledge taught in colleges of education. This is an important issue to more than just teachers who are denied a voice in curricular development; it also affects whole generations of youth. Such a bold initiative reveals in very clear terms the political project that drives his reforms and what he fears about both public schooling and the teachers who labor in classrooms every day.
  • ...8 more annotations...
  • According to Duncan, the great sin these colleges have committed in the past few decades is that they have focused too much on theory and not enough on clinical practice; and by theory he means critical pedagogy, or those theories that enable prospective teachers to situate school knowledges, practices and modes of governance within wider critical, historical, social, cultural, economic and political contexts. Duncan wants such colleges to focus on practical methods in order to prepare teachers for an outcome-based education system, which is code for pedagogical methods that are as anti-intellectual as they are politically conservative.
  • Rather than provide the best means for confronting "difficult truths about the inequality of America's political economy," such a pedagogy produces the swindle of "blaming inequalities on individuals and groups with low test scores."[7] This is a pedagogy that sabotages any attempt at self-reflection and quality education, all the while providing an excuse for producing moral comas and a flight from responsibility.
  • Duncan's insistence on banishing theory from teacher education programs in favor of promoting narrowly defined skills and practices foreshadows the preparation of teachers as a subaltern class who believe that the purpose of education is only to train students to compete successfully in a global economy. This model of teaching being celebrated here is one in which teachers are constructed as clerks and technicians who have no need for a public vision in which to imagine the democratic role and social responsibility that schools, teachers or pedagogy might assume for the world and future they offer to young people.
  • Duncan then goes on to praise Louisiana as a model for building longitudinal data systems that track the impact of new teachers on student achievement. For Duncan, Louisiana represents a beacon for how schools should be redefined, largely as sites of management and data collection, and advances the notion that teachers should be trained to operate proficiently in such sites.
  • the overuse of harsh discipline disproportionately affects some Louisiana school children over others. African American students make up 44% of the statewide public school population, but 68% of suspensions and 72.5% of expulsions. And in school districts with a larger percentage of African American and low-income students, there are higher rates of suspension and expulsion. These districts tend to have fewer resources for positive interventions.
  • Duncan's collusion with the growing corporatization and militarizing of public schools, along with the increased use of harsh disciplinary modes of punishment, surveillance, control and containment, especially in schools inhabited largely by poor minorities of color, reveals his unwillingness to address the degree to which many schools are dominated by a politics of fear, containment and authoritarianism, even as he advances reform as a civil rights issue.[12] Schools are not merely places where potential workers learn the marketable skills and abilities necessary to secure a decent job, they are also, as Martha C. Nussbaum pointed out, key institutions of the public good and are "crucial to both the health of democracy and to the creation of a decent world culture and a robust type of global citizenship."[13]
  • The diverse range of political, economic, racial and social forces that influence all aspects of schooling need to be critically engaged and rearticulated in the interest of justice, human development, freedom and equal opportunity. These are not merely political issues, they are also pedagogical concerns and the former cannot be separated from the latter, just as equity cannot be separated from matters of excellence. Defining schools exclusively in terms of mathematical coordinates and statistical formulas suggests that Duncan has no language for addressing schools as sites or teachers as engaged intellectuals that mediate, accommodate, reproduce and sometimes challenge the diverse and often anti-democratic forces that bear down on them.
  • What does it mean to ignore the increasing corporatization, privatization and militarization of schools at a time when all aspects of public life are under siege by corporate and market-driven forces? How can schools fulfill their democratic mission when they are shaped by a social order characterized by massive inequalities in wealth and power?
Barbara Lindsey

Cognitive Surplus: The Great Spare-Time Revolution | Magazine - 0 views

  • Somehow, watching television became a part-time job for every citizen in the developed world. But once we stop thinking of all that time as individual minutes to be whiled away and start thinking of it as a social asset that can be harnessed, it all looks very different. The buildup of this free time among the world’s educated population—maybe a trillion hours per year—is a new resource. It’s what I refer to as the cognitive surplus.
  • Shirky:
  • Pink: A surplus that post-TV media—blogs, wikis, and Twitter—can tap for other, often more valuable, uses.
  • ...8 more annotations...
  • he very nature of these new technologies fosters social connection—creating, contributing, sharing. When someone buys a TV, the number of consumers goes up by one, but the number of producers stays the same. When someone buys a computer or mobile phone, the number of consumers and producers both increase by one. This lets ordinary citizens, who’ve previously been locked out, pool their free time for activities they like and care about. So instead of that free time seeping away in front of the television set, the cognitive surplus is going to be poured into everything from goofy enterprises like lolcats, where people stick captions on cat photos, to serious political activities like Ushahidi.com, where people report human rights abuses.
  • All the time that people devote to Wikipedia—which that guy considered weird and wasteful—is really a tiny portion of our worldwide cognitive surplus. It’s less than one-tenth of 1 percent of the total.
  • Our third drive—our intrinsic motivation—can be even more powerful.
  • Shirky: Right—because television crowded out other forms of social engagement. Look, behavior is motivation filtered through opportunity. So if you see people behaving in new ways, like with Wikipedia and whatnot, it’s very unlikely that their motivations have changed, because human nature doesn’t change that quickly. It’s quite likely that the opportunities have changed.
  • When we lacked the ability to efficiently connect and collaborate with each other, that intrinsic motivation often didn’t surface. So we assumed that productive, public activities revolved around extrinsic motivation and external rewards. And we assumed that all rewards were substitutable for all other rewards. So I can pay you more or I can praise you or I can put a Lucite brick on your desk and it all works the same way.
  • When Deci took people who enjoyed solving complicated puzzles for fun and began paying them if they did the puzzles, they no longer wanted to play with those puzzles during their free time. And the science is overwhelming that for creative, conceptual tasks, those if-then rewards rarely work and often do harm.
  • Pink: Yes, often these outside motivators can give us less of what we want and more of what we don’t want. Think about that study of Israeli day care centers, which we both write about. When day care centers fined parents for being late to pick up their kids, the result was that more parents ended up coming late. People no longer felt a social obligation to behave well. Shirky: If you assume bad faith from the average participant, you’ll probably get it. In social media, the design principle that has worked remarkably well is to treat good faith as the normal case and to regard defections from that as essentially a special case to be solved.
  • Shirky: Well, organizations that are founded to solve problems end up committed to the preservation of the problems. So Trentway-Wagar, an Ontario-based bus company, sues PickupPal, an online ride-sharing service, because T-W isn’t committed to solving transportation problems. It’s committed to solving transportation problems with buses. In the media world, Britannica is now committed to making reference works that can’t easily be referred to, and the music industry is now distributing music that can’t easily be shared because new ways of distributing music undermine the old business model.
    • Barbara Lindsey
       
      Does the same hold true for education?
  •  
    Pink and Shirky talk about the shift in technology-enabled human interaction.
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

iPads for College Classrooms? Not So Fast, Some Professors Say. - Technology - The Chro... - 3 views

  • But Mr. Steinhaus and other administrators soon realized that the iPad, with the slow finger-typing it requires, actually makes written course work more difficult, and that the devices wouldn't run all of the university's applications.
  • When the University of Notre Dame tested iPads in a management class, students said the finger-based interface on its glassy surface was not good for taking class notes and didn't allow them to mark up readings. For their online final exam, 39 of the 40 students put away their iPads in favor a laptop, because of concerns that the Apple tablet might not save their material.
  • iPads also foster collaboration. Students using them for group assignments in a math class at Pepperdine University were more in sync than were students in a section not using iPads. The iPad-equipped students worked at the same pace as one another and shared their screens to help one another solve tough problems, says Dana Hoover, assistant chief information officer for communications and planning.
  • ...4 more annotations...
  • At Reed College, having all the texts available in a political-science class on the iPad meant it was easier to refer to readings and pull in outside material for discussion, says Martin Ringle, the college's chief technology officer.
  • Course readings were converted to PDF's at Reed, which allowed students to mark them up using an application called iAnnotate, but Mr. Ringle acknowledges that this wouldn't work for all classes, because many texts can't easily be converted to PDF's, and many electronic textbooks don't allow annotation.
  • While Apple has promoted the iPad's ability to change learning, Ms. Simon says that as far as she knows, the company isn't working with leaders in the learning process: professors themselves.
  • but consumer decisions rather than educational ones will probably determine which tablets students purchase—and which ones colleges will support, he says.
    • Barbara Lindsey
       
      Should this concern us? Does this happen with technology in general?
Barbara Lindsey

danah boyd | apophenia » "Real Names" Policies Are an Abuse of Power - 0 views

  • The people who most heavily rely on pseudonyms in online spaces are those who are most marginalized by systems of power. “Real names” policies aren’t empowering; they’re an authoritarian assertion of power over vulnerable people. T
  • what many folks failed to notice is that countless black and Latino youth signed up to Facebook using handles. Most people don’t notice what black and Latino youth do online. Likewise, people from outside of the US started signing up to Facebook and using alternate names. Again, no one noticed because names transliterated from Arabic or Malaysian or containing phrases in Portuguese weren’t particularly visible to the real name enforcers. Real names are by no means universal on Facebook, but it’s the importance of real names is a myth that Facebook likes to shill out. And, for the most part, privileged white Americans use their real name on Facebook. So it “looks” right.
  • privileged people
  • ...4 more annotations...
  • If companies like Facebook and Google are actually committed to the safety of its users, they need to take these complaints seriously. Not everyone is safer by giving out their real name. Quite the opposite; many people are far LESS safe when they are identifiable. And those who are least safe are often those who are most vulnerable.
  • Likewise, the issue of reputation must be turned on its head when thinking about marginalized people. Folks point to the issue of people using pseudonyms to obscure their identity and, in theory, “protect” their reputation.
  • The assumption baked into this is that the observer is qualified to actually assess someone’s reputation. All too often, and especially with marginalized people, the observer takes someone out of context and judges them inappropriately based on what they get online.
  • There is no universal context, no matter how many times geeks want to tell you that you can be one person to everyone at every point. But just because people are doing what it takes to be appropriate in different contexts, to protect their safety, and to make certain that they are not judged out of context, doesn’t mean that everyone is a huckster. Rather, people are responsibly and reasonably responding to the structural conditions of these new media. And there’s nothing acceptable about those who are most privileged and powerful telling those who aren’t that it’s OK for their safety to be undermined. And you don’t guarantee safety by stopping people from using pseudonyms, but you do undermine people’s safety by doing so.
Barbara Lindsey

Facebook App Suggests Concerts Based on Bands You & Your Friends Like - 0 views

  •  
    fall 2011 syllabus
Barbara Lindsey

Actually Going to Class? How 20th-Century. - Technology - The Chronicle of Higher Educa... - 0 views

  • Mr. Somade told me recently that "the general idea is that if I don't have to come to class, I don't want to come to class—and technology is giving students more and more reason not to come."
  • In an era when students can easily grab material online, including lectures by gifted speakers in every field, a learning environment that avoids courses completely—or seriously reshapes them—might produce a very effective new form of college.
    • Barbara Lindsey
       
      How do you respond to this?
  • much of what students rate as the most valuable part of their learning experience at college these days takes place outside the traditional classroom, citing data from the National Survey of Student Engagement, an annual study based at Indiana University at Bloomington. Four of the eight "high-impact" learning activities identified by survey participants required no classroom time at all: internships, study-abroad programs, senior thesis or other "capstone" projects, or the mundane-sounding "undergraduate research," meaning working with faculty members on original research, much as graduate students do.
  • ...5 more annotations...
  • At the start of each session, Mr. Campbell gave the 11 students a strange kind of pop quiz. For one thing, it was anonymous, so no grades were given. And rather than ask questions about the content of the homework, he asked students to detail how much time and effort they spent preparing for class. Among the questions: Did you talk to a classmate about the assignment? And how many hours did you spend on the reading?
  • The scores started low—between 4 and 5, meaning the students did far less than the assigned homework. Something happened as the term progressed, though, as students bought into the concept
  • "The commenting and linking are crucial," he says, "as those activities are essential parts of being in the real blogosphere."
  • If the core activity at college shifts away from the classroom and into practical activities, do students even need to come to a campus?
  • "There is definitely a broader array of options available to students who wish to forgo the commute to class altogether in exchange for online classes that essentially provide the same content that professors regurgitate to students in lecture."
    • Barbara Lindsey
       
      What would George Siemens (Teaching in Social and Technological Networks) say to this?
  •  
    fall 2011 syllabus
Barbara Lindsey

The OU's mission | About the OU | Open University - 0 views

  • We promote educational opportunity and social justice by providing high-quality university education to all who wish to realise their ambitions and fulfil their potential.
  • Nearly all of our undergraduate courses have no formal entry requirements, either prior qualifications or experience.
  • We believe that it is the qualifications with which our students leave, rather than those with which they enter, that count.
  • ...4 more annotations...
  • We have an Access Centre dedicated to ensuring our disabled students are provided with whatever technical and practical support they need to study successfully. Support can mean anything from special computer software to sitting exams in their own home, having a personal assistant at day or residential school, and advice on available funding support.
  • We have developed a range of ways to include people from under-represented groups in higher education. Working in partnership with locally-based organisations we are able to offer programmes that reach out to potential students in their communities. And we are also working to make sure that these students receive the support they need to succeed in their studies.
    • Barbara Lindsey
       
      Where do we see this approach in the U.S.? Why?
  • As part of our mission we are making an increasing amount of Open University teaching and learning resources available free of charge to anyone with access to the internet, no matter where in the world they live.
  • Is the OU a real university?
    • Barbara Lindsey
       
      How do they address this? What metrics do they use? How do they measure up against traditional metrics of program excellence?
Barbara Lindsey

Principle III. Provide Multiple Means of Engagement | National Center On Universal Desi... - 0 views

  • Offering learners choices can develop self-determination, pride in accomplishment, and increase the degree to which they feel connected to their learning. However, it is important to note that individuals differ in how much and what kind of choices they prefer to have. It is therefore not enough to simply provide choice. The right kind of choice and level of independence must be optimized to ensure engagement.
  • In an educational setting, one of the most important ways that teachers recruit interest is to highlight the utility and relevance, of learning and to demonstrate that relevance through authentic, meaningful activities. It is a mistake, of course, to assume that all learners will find the same activities or information equally relevant or valuable to their goals. To recruit all learners equally, it is critical to provide options that optimize what is relevant, valuable, and meaningful to the learner.
  • Vary activities and sources of information so that they can be:  Personalized and contextualized to learners’ lives  Culturally relevant and responsive  Socially relevant Age and ability appropriate  Appropriate for different racial, cultural, ethnic, and gender groups
  • ...5 more annotations...
  • The level of perceived challenge The type of rewards or recognition available The context or content used for practicing and assessing skills The tools used for information gathering or production The color, design, or graphics of layouts, etc. The sequence or timing for completion of subcomponents of tasks
  • it is important to build in periodic or persistent “reminders” of both the goal and its value in order for them to sustain effort and concentration in the face of distracters.
  • Prompt or require learners to explicitly formulate or restate goal Display the goal in multiple ways Encourage division of long-term goals into short-term objectives Demonstrate the use of hand-held or computer-based scheduling tools Use prompts or scaffolds for visualizing desired outcome  Engage learners in assessment discussions of what constitutes excellence and generate relevant examples that connect to their cultural background and interests 
  • Mastery-oriented feedback is the type of feedback that guides learners toward mastery rather than a fixed notion of performance or compliance.
  • Provide feedback that is frequent, timely, and specific Provide feedback that is substantive and informative rather than comparative or competitive
« First ‹ Previous 81 - 99 of 99
Showing 20 items per page