Skip to main content

Home/ beyondwebct/ Group items tagged behavior

Rss Feed Group items tagged

Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

Modeling Social Media in Groups, Communities, and Networks - 0 views

  • the evolution of what was initially a group into a community of practice is illustrated, as well as how social media enables one CoP to interact with others to become part of a distributed learning network. Participants in the networked communities continually leverage each other’s professional development, and what is modeled and practiced in transactions there is applied later in their teaching practices
  • Teachers can be shown how to use social media, but unless they use it themselves they are unlikely to change their practices. There is evidence that teachers trained in programs where their instructors used social media (modeled it) are more comfortable with technology than if their instructors did not themselves use these tools. This article suggests how teachers can interact with numerous communities of practice and distributed learning networks where other participants are modeling to and learning from one another optimal ways of using social media in teaching. This strongly suggests that teachers must be trained not only in the use of social media, but through its use.
    • Barbara Lindsey
       
      "Through its use" is key here!
  • “To teach is to model and demonstrate. To learn is to practice and reflect.”
  • ...24 more annotations...
  • Networks are ideal as enhancements for all four of these essential activities of lifelong learners, and they enable us to model, demonstrate, practice, and reflect constantly and effectively.
  • “teachers who practice autonomy in their own professional development formulate heuristics for harvesting knowledge within their personal learning spaces, and thus stand a better chance of inculcating the desired behaviors in their students, thus increasing the likelihood of producing potentially autonomous and lifelong learners. But it is a percolative process.
  • The wiki allowed anyone (anyone could write on it, not just Webheads) to leave an email address if they needed an invitation, and those who had spare invitations would give one to someone in need. The system worked to organize a quick and robust Webheads Wave, a sandbox for teachers to try out the tool and to model and demonstrate and practice with one another.
  • Networks provide the framework for this to happen.
  • Pedagogy
  • Networking
  • Literacy
  • Paradigm shift results when many people in a community or network follow the same process of seeing things modeled and demonstrated for one another in such a way that after considered reflection and weighing of the old and new ways of addressing a problem, they gradually alter their practice.
    • Barbara Lindsey
       
      ACOT showed this in the late 80's with their ten year study.  http://imet.csus.edu/imet1/baeza/PDF%20Files/Upload/10yr.pdf
  • Heuristics
  • hose with knowledge and those seeking it treat each other equally, often reversing roles frequently as seekers and providers of knowledge and content.
  • multiliteracies approaches
  • When the Writing for Webheads group of students and teachers formed in 1998, participants were distrustful of sending their pictures to strangers on the Internet, and even to reveal their real names.
  • Photographs and voice/webcam communications enable group members to see the human behind the text message and enhance bonds leading to a sense of community
  • Scaffolding one another’s practice by modeling to one another and answering each other’s questions
  • the evolution of social media has enabled the Webheads CoP to interact with others to become part of a much wider distributed learning network.
  • Siemens has long espoused the notion of connectivism, famously summarized as “The pipe is more important than the content within the pipe.” (Siemens, 2004, n.p.). Here, Siemens means that it is more important to nurture a system of connections between knowledgeable people (the pipe) than to be concerned with what these knowledgeable people know (the content within the pipe) since this content can be directed as needed to anyone with appropriate connections within the pipe.
  • Communities and networks help us to aggregate, filter, and assimilate this information into some kind of knowledge structure and then disseminate it throughout the community or network.
  • distributed learning networks (DLN’s), or personal or professional learning networks (PLNs), or personal learning environments (PLE’s)–all provide direct (and indirect) contact with many people in one’s network, each possessing a reservoir of knowledge which contributes to the entire pool of knowledge residing in the network. This can be accessed through listservs or sometimes almost instantaneously through Twitter or RSS feeds, or Skype, or instant messaging. Therefore the knowledge possessed by any individual, or node in the network, is the sum total of all aggregated knowledge within that network. It is to this that we ascribe the incredible power inherent in distributed learning networks which often comprise to some extent communities of practice.
  • Wenger, McDermott, and Snyder (2002, p. 6) promote the CoP model as an anecdote to the fact, as he puts it, that “increasing complexity of knowledge requires greater … collaboration; whereas … the half life of knowledge is getting shorter.”
  • the skill of leveraging networks is increasingly important in the 21st century in plumbing and aggregating knowledge when that knowledge base is forever changing at an increasingly accelerated pace.
  • or appropriate use of online social networks to be taught in schools, teachers themselves must be familiar with their impact on learning. One problem is that teacher-trainers without sufficient experience with technology and who are rooted in old-school methodologies are simply not modeling new age learning behaviors for their trainees by showing them how to reach out to networks.
  • research indicates that teachers don’t necessarily activate the knowledge they are exposed to in training curricula. The example he gave was on reverting to traditional methods rather than utilizing knowledge about communicative language teaching (Richards, 2009: 4), but the same applies to knowledge of technology.
  • In order for training in pedagogical affordances of networking to take hold it is crucial that teachers be trained not only in social media, but through its use. Those who use social media in their professional networking find this self-evident, but there is at least annecdotal evidence for the need for modeling by mentors.
  • teachers need to be shown the connections between their use of social media in their personal and professional lives. Glogowski and Sessums pointed out in their presentation at the WiAOC 2007 conference their surprise that student teachers who were already using technology with online acquaintances in their after-hours social networking were not carrying this over into their professional teaching practices.
    • Barbara Lindsey
       
      The same holds true for our students.
Barbara Lindsey

ASCD Inservice: Seven Ways to Go from On-Task to Engaged - 0 views

  •  
    how do we ramp up both on-task behavior and real, meaningful engagement for our students? Here are seven easy ways to increase the likelihood that students are both engaged and on-task:
Barbara Lindsey

Educator's Voice: Data is the Foundation for Progress | Pearson Academic Executives - 0 views

  • which provide us with endless sources of information on student and faculty behaviors. This data can then be mined for clues on in-course retention, program persistence, quality of student learning, and admission demographics correlated to student success.
    • Barbara Lindsey
       
      Does anyone else find this disconcerting?
Barbara Lindsey

Education Week: Science Grows on Acquiring New Language - 0 views

  • For example, when babies born to native-English-speaking parents played three times a week during that window with a native-Mandarin-speaking tutor, at 12 months, they had progressed in their ability to recognize both English and Mandarin sounds, rather than starting to retrench in the non-native language. By contrast, children exposed only to audio or video recordings of native speakers showed no change in their language trajectory. Brain-imaging of the same children backed up the results of test-based measures of language specialization.
  • The research may not immediately translate into a new language arts curriculum, but it has already deepened the evidence for something most educators believe instinctively: Social engagement, particularly with speakers of multiple languages, is critical to language learning.
  • “The key to that series of studies is exposure and live interactions with native speakers,” Ms. Lebedeva said. “The interactions need to be naturalistic: eye contact, gestures, exaggerated phonemes.”
  • ...2 more annotations...
  • “Human brains are wired to learn best in social interactions, whether that learning is about language or problem-solving or emotion,” Ms. Lebedeva said, “but language is such a ubiquitous human behavior that studying it gives us an example of how more general learning takes place.”
  • at the science-oriented Ultimate Block Party held in New York City this month, children of different backgrounds played games in which they were required to sort toys either by shape or color, based on a rule indicated by changing flashcards. A child sorting blue and yellow ducks and trucks by shape, say, might suddenly have to switch to sorting them by color. The field games exemplified research findings that bilingual children have greater cognitive flexibility than monolingual children. That is, they can adapt better than monolingual children to changes in rules—What criteria do I use to sort?—and close out mental distractions—It doesn’t matter that some blue items are ducks and some are trucks.
  •  
    researchers long thought the window for learning a new language shrinks rapidly after age 7 and closes almost entirely after puberty. Yet interdisciplinary research conducted over the past five years at the University of Washington, Pennsylvania State University, and other colleges suggest that the time frame may be more flexible than first thought and that students who learn additional languages become more adaptable in other types of learning, too.
Barbara Lindsey

gladwell dot com - designs for working - 0 views

  • The task of the office, then, is to invite a particular kind of social interaction--the casual, nonthreatening encounter that makes it easy for relative strangers to talk to each other. Offices need the sort of social milieu that Jane Jacobs found on the sidewalks of the West Village. "It is possible in a city street neighborhood to know all kinds of people without unwelcome entanglements, without boredom, necessity for excuses, explanations, fears of giving offense, embarrassments respecting impositions or commitments, and all such paraphernalia of obligations which can accompany less limited relationships," Jacobs wrote. If you substitute "office" for "city street neighborhood," that sentence becomes the perfect statement of what the modern employer wants from the workplace.
    • Barbara Lindsey
       
      This reminds me of the strength of weak ties argument.
  • In the war-room study, the company moved the client, the programmers, and a manager into a dedicated conference room, and made them stay there until the project was done. Using the war room cut the software-development time by two-thirds, in part because there was far less time wasted on formal meetings or calls outside the building: the people who ought to have been bumping into each other were now sitting next to each other.
  • The agency is in a huge old warehouse, three stories high and the size of three football fields. It is informally known as Advertising City, and that's what it is: a kind of artfully constructed urban neighborhood. The floor is bisected by a central corridor called Main Street, and in the center of the room is an open space, with café tables and a stand of ficus trees, called Central Park. There's a basketball court, a game room, and a bar. Most of the employees are in snug workstations known as nests, and the nests are grouped together in neighborhoods that radiate from Main Street like Paris arrondissements. The top executives are situated in the middle of the room. The desk belonging to the chairman and creative director of the company looks out on Central Park. The offices of the chief financial officer and the media director abut the basketball court. Sprinkled throughout the building are meeting rooms and project areas and plenty of nooks where employees can closet themselves when they need to.
  • ...7 more annotations...
  • A vital community, in Jacobs's view, required more than the appropriate physical environment. It also required a certain kind of person, who could bind together the varied elements of street life.
  • What Stephenson's X-rays do best, though, is tell you who the public characters are. In every network, there are always one or two people who have connections to many more people than anyone else. Stephenson calls them "hubs," and on her charts lines radiate out from them like spokes on a wheel. (Bernie the candy-store owner, on Jacobs's Hudson Street, was a hub.) A few people are also what Stephenson calls "gatekeepers": they control access to critical people, and link together a strategic few disparate groups. Finally, if you analyze the graphs there are always people who seem to have lots of indirect links to other people--who are part of all sorts of networks without necessarily being in the center of them. Stephenson calls those people "pulsetakers." (In Silicon Valleyspeak, the person in a sea of cubicles who pops his or her head up over the partition every time something interesting is going on is called a prairie dog: prairie dogs are pulsetakers.)
  • she pointed to the lines connecting that department with other departments. "They're all coming into this one place," she said, and she showed how all the lines coming out of marketing converged on one senior executive. "There's very little path redundancy. In human systems, you need redundancy, you need communication across multiple paths."
  • What concerned Stephenson wasn't just the lack of redundancy but the fact that, in her lingo, many of the paths were "unconfirmed": they went only one way.
  • What you want to do is put people who don't trust each other near each other. Not necessarily next to each other, because they get too close. But close enough so that when you pop your head up, you get to see people, they are in your path, and all of a sudden you build an inviting space where they can hang out, kitchens and things like that. Maybe they need to take a hub in an innovation network and place the person with a pulsetaker in an expert network--to get that knowledge indirectly communicated to a lot of people."
  • it's clear that there are some very simple principles from the study of public characters which ought to drive the design process. "You want to place hubs at the center," Joyce Bromberg, the director of space planning, says. "These are the ones other people go to in order to get information. Give them an environment that allows access. But there are also going to be times that they need to have control--so give them a place where they can get away. Gatekeepers represent the fit between groups. They transmit ideas. They are brokers, so you might want to put them at the perimeter, and give them front porches"--areas adjoining the workspace where you might put little tables and chairs. "Maybe they could have swinging doors with white boards, to better transmit information. As for pulsetakers, they are the roamers. Rather than give them one fixed work location, you might give them a series of touchdown spots--where you want them to stop and talk. You want to enable their meandering."
  • The point of the new offices is to compel us to behave and socialize in ways that we otherwise would not--to overcome our initial inclination to be office suburbanites. But, in all the studies of the new workplaces, the reservations that employees have about a more social environment tend to diminish once they try it. Human behavior, after all, is shaped by context, but how it is shaped--and whether we'll be happy with the result--we can understand only with experience.
Barbara Lindsey

Curricula Designed to Meet 21st-Century Expectations | Resources | EDUCAUSE - 0 views

  • W here students had once called a large number of their classes "death by lecture," she noted they were now calling them "death by PowerPoint." >
  • here students had once called a large number of their classes "death by lecture," she noted they were now calling them "death by PowerPoint."
    • Barbara Lindsey
       
      Not representative sample
  • ...13 more annotations...
  • With such specific applications of technology and the limited use of other forms (for example, multimedia), students' low expectations for the use of technology in the curriculum is not surprising. Such constrained use of technology by the faculty in the curriculum and low student expectations may serve to limit innovation and creativity as well as the faculty's capacity to engage students more deeply in their subject matter. Like all organizations, colleges and universities respond to the demands placed upon them. Students' and institutions' low expectations for the use of technology for learning provide insufficient impetus for faculties to change their behavior and make broader, more innovative use of these tools in the service of learning.
  • Consider this scenario:
  • From the beginning, however, a problem arose in that those middle school students went on to high schools and later to colleges that did not (and do not) provide this type of rich learning experience—a learning experience that can best be achieved when technology is used in the service of learning.
  • Data obtained from these sessions with high school and college seniors in Indiana, Oregon, and Virginia
  • Less attention has been given to how to help students achieve the desired learning outcomes through technology.
  • comparatively little support has been devoted to helping faculty use computers and other technologies in creative and innovative ways to deepen student learning.
  • To develop intentional learners, the curriculum must go beyond helping students gain knowledge for knowledge's sake to engaging students in the construction of knowledge for the sake of addressing the challenges faced by a complex, global society.
  • institutional structures and practices to resolve technical problems that faculty invariably encounter are very limited or are not the type of aid needed. Such lack of support limits the amount of time faculty can spend on what they do best—building a compelling curriculum and integrating technology for more powerful learning.
  • integrating study abroad into courses back on the home campus;
  • Faculty concerns perhaps center less on being "replaceable" and more on worrying that the teaching and learning enterprise will be reduced to students gathering information that can be easily downloaded, causing them to rely too heavily on technology instead of intellect.
    • Barbara Lindsey
       
      Mentioned frequently by our group members.
  • First, traditional age students overwhelmingly prefer face-to-face contact with faculty to mediated communication. Second, technology used in the service of learning will require more—not less—sophistication on the part of students as they engage in processes of integration, translation, audience analysis, and critical judgment.
  • Faculty with expertise in one or more subjects, who have been exposed to what we know about how people learn, can determine how to enhance this learning through the use of technology. But simply understanding how to use technology will not provide the integration needed to reach the desired learning outcomes.
    • Barbara Lindsey
       
      Last sentence here most important.
  • There is a need for integrating technology that is in the service of learning throughout the curriculum. More intentional use of technology to capture what students know and are able to integrate in their learning is needed.
Barbara Lindsey

Digitally Speaking / Social Bookmarking and Annotating - 0 views

  • intellectual philanthropy and collective intelligence
  • While these early interactions are simplistic processes that by themselves aren't enough to drive meaningful change in teaching and learning, they are essential because they provide team members with low risk opportunities to interact with one another around the topics, materials and instructional practices that should form the foundation of classroom learning experiences.
  • A tagging language is nothing more than a set of categories that all members of a group agree to use when bookmarking websites for shared projects.
  • ...6 more annotations...
  • In Shirky's terms, teams that embrace social bookmarking decrease the "cost" of  group transactions.  No longer do members resist sharing because it's too time consuming or difficult to be valuable. Instead, with a little bit of thought and careful planning, groups can make sharing resources---a key process that all learning teams have to learn to manage---remarkably easy and instant.
  • Imagine the collective power of an army of readers engaged in ongoing conversation about provocative ideas, challenging one another's thought, publicly debating, and polishing personal beliefs.  Imagine the cultural understandings that could develop between readers from opposite sides of the earth sharing thought together.  Imagine the potential for brainstorming global solutions, for holding government agencies accountable, or for gathering feedback from disparate stakeholder groups when reading moves from a "fundamentally private activity" to a "community event."
  • Understanding that there are times when users want their shared reading experiences to be more focused, however, Diigo makes it possible to keep highlights and annotations private or available to members of predetermined and self-selected groups.  For professional learning teams exploring instructional practices or for student research groups exploring content for classroom projects, this provides a measure of targeted exploration between likeminded thinkers.
  • Diigo takes the idea of collective exploration of content one step further by providing groups with the opportunity to create shared discussion forums
  • Many of today's teachers make a critical mistake when introducing digital tools by assuming that armed with a username and a password, students will automatically find meaningful ways to learn together.  The results can be disastrous.  Motivation wanes when groups using new services fail to meet reasonable standards of performance.  "Why did I bother to plug my students in for this project?" teachers wonder.  "They could have done better work with a piece of paper and a pencil!"
  • With shared annotation services like Diigo, powerful learning depends on much more than understanding the technical details behind adding highlights and comments for other members of a group to see.  Instead, powerful learning depends on the quality of the conversation that develops around the content being studied together.  That means teachers must systematically introduce students to a set of collaborative dialogue behaviors that can be easily implemented online.
Barbara Lindsey

Will Your College Be Covered in Virtual Graffiti? - Technology - The Chronicle of Highe... - 2 views

  • It's a lot easier to get ahead of the curve and to guide people into some of these technologies, as opposed to after the fact going back and trying to correct" their behavior, says the interactive-media manager.
  • Universities are still figuring out how to deal with Facebook and Twitter and other interactive programs which, like much of what's called Web 2.0, are largely out of their control. Now they'll have to wrestle with the power and pitfalls of an even more in-your-face social-media tool.
  • The University of Texas at Dallas is taking a different approach. Lately the 16,000-student state university has become a laboratory for what happens when students and professors go wild with unofficial tagging.
  • ...4 more annotations...
  • If you're scratching your head wondering what this has to do with education, here's Mr. Terry's answer: The technology will, he says, transform disciplines.
  • Perry Hewitt, digital-communications director at Harvard, says privacy is a serious issue. She also points out that similar sky-is-falling predictions were raised when the answering machine was introduced.
  • Mr. Terry's students will present a smartphone application they have built, called Placethings, which lets you tie pictures, video, and audio to locations and map that multimedia trail into a narrative.
  • Gartner, a technology-research company, forecasts that by 2013 mobile phones will pass personal computers as the most common way people worldwide get access to the Internet. But the practice of cellphone users' tying content to place is so new that you can really believe only one prediction with much confidence. Which is this: As location tagging goes more mainstream in the next few years, today's efforts will look trivial.
  •  
    Thx to @academicdave
Celeste Arrieta

Bloom's Taxonomy - 0 views

  • Bloom identified six cognitive levels: knowledge, comprehension, application, analysis, synthesis, and evaluation, with sophistication growing from basic knowledge-recall skills to the highest level, evaluation.
  • Originally developed as a method of classifying educational goals for student performance evaluation,
  • three major domains of learning: cognitive, affective, and psychomotor
  • ...14 more annotations...
  • the affective domain covered “changes in interest, attitudes, and values, and the development of appreciations and adequate adjustment”;
  • The cognitive domain covered “the recall or recognition of knowledge and the development of intellectual abilities and skills”
  • psychomotor domain encompassed “the manipulative or motor-skill area
  • Bloom
  • applies only to acquiring knowledge in the cognitive domain
  • involves intellectual skill development.
  • The original Bloom’s Taxonomy contained six developmental categories: knowledge, comprehension, application, analysis, synthesis, and evaluation. The first step in the taxonomy focused on knowledge acquisition and at this level, students recall, memorize, list, and repeat information. In the second tier, students classify, describe, discuss, identify, and explain information. Next, students demonstrate, interpret, and write about what they’ve learned and solve problems. In the subsequent step, students compare, contrast, distinguish, and examine what they’ve learned with other information, and they have the opportunity to question and test this knowledge. Then students argue, defend, support, and evaluate their opinion on this information. Finally, in the original model of Bloom’s Taxonomy, students create a new project, product, or point of view
    • Celeste Arrieta
       
      specific activities
    • Celeste Arrieta
       
      definitions - developmental categories
  • factual, conceptual, procedural, and metacognitive.3 This newer taxonomy also moves the evaluation stage down a level and the highest element becomes “creating
  • types of knowledge
  • intellectual skills and behavior important to learning
  • interactive activity
  • across grade levels and content areas
  •  
    I hope you can see my highlightings
Barbara Lindsey

Cognitive Surplus: The Great Spare-Time Revolution | Magazine - 0 views

  • Somehow, watching television became a part-time job for every citizen in the developed world. But once we stop thinking of all that time as individual minutes to be whiled away and start thinking of it as a social asset that can be harnessed, it all looks very different. The buildup of this free time among the world’s educated population—maybe a trillion hours per year—is a new resource. It’s what I refer to as the cognitive surplus.
  • Shirky:
  • Pink: A surplus that post-TV media—blogs, wikis, and Twitter—can tap for other, often more valuable, uses.
  • ...8 more annotations...
  • he very nature of these new technologies fosters social connection—creating, contributing, sharing. When someone buys a TV, the number of consumers goes up by one, but the number of producers stays the same. When someone buys a computer or mobile phone, the number of consumers and producers both increase by one. This lets ordinary citizens, who’ve previously been locked out, pool their free time for activities they like and care about. So instead of that free time seeping away in front of the television set, the cognitive surplus is going to be poured into everything from goofy enterprises like lolcats, where people stick captions on cat photos, to serious political activities like Ushahidi.com, where people report human rights abuses.
  • All the time that people devote to Wikipedia—which that guy considered weird and wasteful—is really a tiny portion of our worldwide cognitive surplus. It’s less than one-tenth of 1 percent of the total.
  • Our third drive—our intrinsic motivation—can be even more powerful.
  • Shirky: Right—because television crowded out other forms of social engagement. Look, behavior is motivation filtered through opportunity. So if you see people behaving in new ways, like with Wikipedia and whatnot, it’s very unlikely that their motivations have changed, because human nature doesn’t change that quickly. It’s quite likely that the opportunities have changed.
  • When we lacked the ability to efficiently connect and collaborate with each other, that intrinsic motivation often didn’t surface. So we assumed that productive, public activities revolved around extrinsic motivation and external rewards. And we assumed that all rewards were substitutable for all other rewards. So I can pay you more or I can praise you or I can put a Lucite brick on your desk and it all works the same way.
  • When Deci took people who enjoyed solving complicated puzzles for fun and began paying them if they did the puzzles, they no longer wanted to play with those puzzles during their free time. And the science is overwhelming that for creative, conceptual tasks, those if-then rewards rarely work and often do harm.
  • Pink: Yes, often these outside motivators can give us less of what we want and more of what we don’t want. Think about that study of Israeli day care centers, which we both write about. When day care centers fined parents for being late to pick up their kids, the result was that more parents ended up coming late. People no longer felt a social obligation to behave well. Shirky: If you assume bad faith from the average participant, you’ll probably get it. In social media, the design principle that has worked remarkably well is to treat good faith as the normal case and to regard defections from that as essentially a special case to be solved.
  • Shirky: Well, organizations that are founded to solve problems end up committed to the preservation of the problems. So Trentway-Wagar, an Ontario-based bus company, sues PickupPal, an online ride-sharing service, because T-W isn’t committed to solving transportation problems. It’s committed to solving transportation problems with buses. In the media world, Britannica is now committed to making reference works that can’t easily be referred to, and the music industry is now distributing music that can’t easily be shared because new ways of distributing music undermine the old business model.
    • Barbara Lindsey
       
      Does the same hold true for education?
  •  
    Pink and Shirky talk about the shift in technology-enabled human interaction.
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

Repressing the Internet, Western-Style - WSJ.com - 0 views

  • Technology has empowered all sides in this skirmish: the rioters, the vigilantes, the government and even the ordinary citizens eager to help. But it has empowered all of them to different degrees.
  • After the recent massacre in Norway, many European politicians voiced their concern that anonymous anti-immigrant comments on the Web were inciting extremism. They are now debating ways to limit online anonymity.
  • latest facial-recognition technology, go through the footage captured by their numerous closed-circuit TV cameras and study chat transcripts and geolocation data, they are likely to identify many of the culprits.
  • ...2 more annotations...
  • Egyptian secret police can purchase Western technology that allows them to eavesdrop on the Skype calls of dissidents,
  • Western politicians have proposed new tools for examining Web traffic and changes in the basic architecture of the Internet to simplify surveillance. What they fail to see is that such measures can also affect the fate of dissidents in places like China and Iran. Likewise, how European politicians handle online anonymity will influence the policies of sites like Facebook, which, in turn, will affect the political behavior of those who use social media in the Middle East.
  •  
    fall 2011 syllabus
Barbara Lindsey

Hyperpolitics (American Style) | the human network - 0 views

  • They matter not at all. The mob, now mobilized, will do as it pleases. Obama can lead by example, can encourage or scold as occasion warrants, but he can not control. Not with all the King’s horses and all the King’s men.
  • Only a decade ago the network was all hardware and raw potential, but we are learning fast, and this learning is pervasive. Behaviors, once slowly copied from generation to generation, then, still slowly, from location to location, now ‘hyperdistribute’ themselves via the Human Network. We all learn from each other with every text we send, and each new insight becomes part of the new software of a new civilization.
    • Barbara Lindsey
       
      Similar to what Michael Wesch says in his videos
  • We may have had great hardware, but it took a long, long time for humans to develop software which made full use of it.
  • ...2 more annotations...
  • when Gutenberg (borrowing from the Chinese) perfected moveable type, he led the way to another and even broader form of cultural sharing; literacy became widespread in the aftermath of the printing press, and savants throughout the Europe published their insights, sharing their own expertise, producing the Enlightenment and igniting the Scientific Revolution. Peer-review, although portrayed today as a conservative force, initially acted as a radical intellectual accelerant, a mental hormone which again amplified the engines of human culture, leading directly to the Industrial Age.
  • Sociability has always been the cornerstone to human effectiveness. Being social has always been the best way to get ahead.
  •  
    Mark Pesce's talk
1 - 15 of 15
Showing 20 items per page