Skip to main content

Home/ beyondwebct/ Group items tagged messaging

Rss Feed Group items tagged

Barbara Lindsey

Cell phone novels come of age › Japan Today: Japan News and Discussion - 0 views

  • “Teenage girls began messaging with pagers in the early ’90s,” says Mizuko Ito, a research scientist who studies cell phone use among Japanese youth. “Because of this, Japan was the first country to have widespread mobile communications, even before mobile phones became affordable and popular.” Ito sees in the rise of cell phone novels a high degree of media and gadget literacy, a cultural willingness to experiment with new technologies, and a desire for private space and intimate communication.
  • The way it works is this: novels are posted by members of cell phone community sites to be downloaded for free and read on other cell phones. Reading often takes place in crowded trains during long commutes. The works are published in 70-word installments, or abbreviated chapters that are the ideal length to be read between shorter train stops. This means that, despite small cell phone screens, lots of white space is left for ease of reading. Multiple short lines of compressed sentences, mostly composed of fragmentary dialogue, are strung together with lots of cell phone-only symbols. The resulting works are emotional, fast-paced and highly visual, with an impact not unlike manga.
  • Following Starts, other publishers like Goma and Asuki Media Works moved in to cherry pick cell phone novel sites online and put out the next big hit. The number of cell phone novels in print began skyrocketing in 2006, when 22 books hit the shelves; the following year, there were 98. Even a no-name author with a cell phone novel publishing deal enjoyed a first run of between 50,000 and 100,000 copies.
  • ...1 more annotation...
  • Indeed, cell phone novels do not go through the editorial selection process; they first become popular with readers and then are published based on their ability to please a crowd. This rawness is at once their appeal and a major hurdle keeping the emergent genre from maturing.
Barbara Lindsey

14. Case Study: Latin America « - 0 views

  • Honduras was not the only example of how Twitter is been used to change the fate of politics. On July 5, 2009, Mexico had its legislative elections and a hashtag -#votonulo-[Figure 5] was created. The purpose was to request that Mexicans vote “NO VOTE”. According the CNN en Español this made a difference on the way that Mexican people voted that day.  About 6% of the Mexican population voted “NO VOTE” in a country with a population of more than 109M this means about 6.5M. In metropolitan areas like Mexico City with almost 20M people [12] and Guadalajara with almost 5M people [11] the “NO VOTE” reached 11% (2.7M). This event has never happened in Mexico before, according to CNN en Español, Twitter played an important role in it. [13,14]
  • Mobil technology has reached critical mass in Latin America, therefore, this may facilitates the growth of Twitter in this part of the world, as its platform can be access by text message. For example, Argentina has a mobile penetration of 98.7%, followed by Chile which has an 80.4% and Mexico and Brazil with over 70%. [3]
  • It is important to know that in Latin America the first exposure to internet comes from the mobile technology
  •  
    How Twitter is used in Latin America
Barbara Lindsey

From Knowledgable to Knowledge-able: Learning in New Media Environments | Academic Commons - 1 views

  • The message of Wikipedia is not “trust authority” but “explore authority.” Authorized information is not beyond discussion on Wikipedia, information is authorized through discussion, and this discussion is available for the world to see and even participate in. This culture of discussion and participation is now available on any website with the emerging “second layer” of the web through applications like Diigo which allow you to add notes and tags to any website anywhere.
    • Barbara Lindsey
       
      This is key to understanding Wikipedia.
Barbara Lindsey

Microsoft, Google eye Arabic web growth potential | Reuters - 0 views

  • "One of our biggest missions is to enable Arabic users to find the right tools to enrich Arabic content," Ghonim said. "It would be great to see more e-commerce in the region, more publishers, more news sites. We are committed to help them."
  • Ghonim said Arabic speakers have historically engaged in poorly organized and difficult to archive forums, citing a message board used by 400,000 teachers in Saudi Arabia.Both Google and Microsoft place Arabic in their top ten languages in need of prioritized attention.
  • "The next few million Egyptian internet users will be people who don't really speak English," Ghonim said.
  • ...2 more annotations...
  • "Think of the guy running a very small one-stop shop in (Nile delta industrial city) Mahalla," Ghonim said. "You should facilitate for him a complete experience in Arabic, from the way he registers his domain to finding a hosting company to communicating to his customers."
  • Mundie said the Arab world was well-placed to skip PC-dominated use and go straight to mobile internet.
Barbara Lindsey

We can't let educators off the hook | Dangerously Irrelevant - 0 views

  • Successful technology integration only produces amplified results when in its integration agency is given to the learner, when it becomes a tool to help learners learn, not teachers teach.
  • I would also like to add that that old belief about teaching and learning has been around for a very long time now and part of that belief, the part about the teacher possessing the knowledge and imparting it to kids, is in direct threat when faced with technology. A teacher who has been taught to believe that they are needed for the knowledge they have and that that knowledge gives them authority in the classroom is threatened by technology. That threat needs to be approached lightly. If one speaks the truth too harshly the faithful will simply label them a blasphemer and ignore the truth in their message.
  • et me start by saying that I consider teaching among the most important professions on earth, but just as doctors need to be current on medical technology, teachers MUST be current on information and communication technologies. Those are the tools of the trade.
  • ...14 more annotations...
  • but why don’t teachers understand this? To figure this out we need to understand this philosophically and historically. Doctors, in the mid-19th Century resisted technologies as most teachers do now. Lister and Pasteur were “so far ahead of the curve they weren’t on the same road” when they suggested sterilization. Doctors of the time, seeing themselves as “healers” could not comprehend that they were killing half of their patients by resisting the technologies of the time – the belief system inherent in the identity model of the profession actually prevented them from being what they perceived themselves to be.
  • Part of this is because we teach neither history nor philosophy. We do not share with teachers why Socrates opposed literacy, or what Gutenberg destroyed. We do not allow them to understand the essential humanness of technology, or to understand technology in Heidegger’s terms – the art of manipulating the world for our benefit.
  • Now I don’t know what Glogster is, but I do know that every technology gives and takes. The book disabled hundreds of millions and wiped out hundreds of languages. It also spread learning and allowed both the novel and eventually journalism to appear. And I know that our students must have the philosophical grounding in what technology is, how to learn it, and how to use it, that so many of our current teachers lack. After all, the classroom is filled with technology – chairs and desks (1835 via William Alcott), chalkboards (1840 via William Alcott), Time schedules (1845 via Henry Barnard), Books (1840s, mostly Henry Barnard), testing (1910, the Carnegie Commission), even ballpoint pens – that highly controversial 1950s invention of Marcel Bich. And all of those technologies have benefits and real limits.
  • I’m not really focused on, nor do I think Scott is focused on, “administrative technologies” but on “educational technologies.” A gradebook – I might argue, is no more an “educational technology” than a file cabinet is.
  • What I think we are discussing is transformational technologies. Technologies whereuse alters the learning process.
  • I need to say two things: First, and I think this is a big part of Scott’s target here, every school administrator, every policy maker, and every tech director making “blocking decisions,” needs to wake up and take responsibility for keeping our current century away from education.
  • But – in the end – a big part of this remains “taking responsibility for your own learning.” The first free seminars in these systems which I offered were presented in 1998, and at that point there was already a massive research base for what Scott is saying here. The laws regarding technology access in terms of students with disabilities (and those with “504″ plans) were placed on the books in 1995. IBM was promoting speech recognition and text-to-speech in 1996, and Lynne Anderson-Inman was already proving the value of “digital texts” and “digital notebooks” and digitally linked note-taking in the mid-1990s.
  • Jerrid, Troy, and everyone… The issue is this - In order to be lifelong learners it is essential to understand and know how to function with the information and communications technologies of our world, and to know how to adapt when those technologies change. In order to be human successes we also must understand how to communicate what we know, how to collaborate, and how to distribute information. This is why Socrates drilled his students on memory. In pre-literate Greece, that was the essential tool. This is why we taught “reading” (meaning decoding ink-on-paper alphabetic texts) in school, and why we taught writing with pens and pencils, and why we introduced students to libraries. In the Gutenberg era these were the essential tools.
  • But, when kids are writing, I want them to (among other things) be able to communicate with Grandma even if Grandma lives thousands of miles away, even if Grandma is blind, even if Grandma speaks another language. And if they are reading, I don’t want them limited to the 2,000 “age appropriate” books and 1975 World Book Encyclopedia in the local public library.
  • Newspaper readership, yes a minority, but a rapidly changing environment http://pewresearch.org/pubs/1133/decline-print-newspapers-increased-online-news with (in 2009) only 25% of Americans getting news from print daily.
  • The change is occurring across the “print world” – Amazon, 19 July 2010: “Over the past three months, for every 100 hardcover books Amazon.com has sold, it has sold 143 Kindle books. Over the past month, for every 100 hardcover books Amazon.com has sold, it has sold 180 Kindle books.
  • The lack of real history of education courses is what leaves so many teachers completely unaware of why schools do what they do, and leaves them confused about what the tools of education are.
  • Every day that I present for educators, I have a greater appreciate for how distorted the view is as seen through the eyes of a typical EduBlogger. In fact, the majority of the voices in the EdTech Community are so far ahead of the curve that it doesn’t even seem like their on the same road anymore. Most educators have never listened to a podcast, much less created one. They’ve never edited a wiki, much less started one of their own. So how on earth could they be expected to have a rational conversation about the impact new technologies are having on the skill sets our students need? Simply put, they can’t. The majority of the voices many of us listen to on a regular basis… actually represent just a tiny fraction of the educators out there. We’re the minority, the outsiders, the ones who talk using strange terms involving words with far too many missing vowels.
  • You can’t ‘firmly believe in life-long learning’ and simultaneously not be clued in to the largest transformation in learning that ever has occurred in human history. Those two don’t co-exist. Being a ‘life-long learner’ is not ignoring what’s going on around you; you don’t get to claim the title of ‘effective educator’ if you do this.
  •  
    Successful technology integration only produces amplified results when in its integration agency is given to the learner, when it becomes a tool to help learners learn, not teachers teach.
Barbara Lindsey

Japanese Teenagers Teach Us Something About Being In Two Places At Once : 13.7: Cosmos ... - 0 views

  • First, face-to-face conversation is a dynamic interaction between two people. Talking is a kind of turn-taking, and turn-taking is a rhythm that organizes how and when things unfold. When people talk, they modify their postures and tempos so that they correspond. (There is fascinating research on this sort of "coordination dynamics" by, among others, J.A. Scott Kelso and colleagues.) And moreover, they tend jointly to pay attention to what is going on around them. One upshot of this is that when you are talking with someone, you actually experience that they are listening. Talking, in this sense, is like dancing. You can tell whether someone is dancing with you or whether they have detached and lost interest.
  • It is often very difficult to establish this sort dynamic engagement or coupling to someone over a cell phone. The connection is often just not good enough for that. One has the experience of speaking, but one lacks the corresponding experience of being heard. You literally lack the feedback — the coordinated breathing, the modulations of tones of voice, etc — that signals the other’s focus on you. And so you shout.
  • When a cell-phone connection is excellent, you and your remote partner to start up a dance together. But crucially, you dance to music that only you and your partner hear. That is, you succeed in establishing the kind of dynamic integration and entrainment that is typical of face-to-face conversation. And that has the effect of transporting you right out of your physical environment into one that you share with your conversation partner. And this in turn has the effect of guaranteeing that your tone of voice and volume will be inappropriate for your actual physical conditions
  • ...2 more annotations...
  • This use of language to signal presence is important. In particular, it sheds light on the transformations that are occurring as new technological practices such as cell phone use and social networking sites, etc, get embedded in our lives.
  • Anthropologists looking at the matter were surprised to discover that the kids rarely send informative or detailed messages. As a general rule, they are not telling each other anything. Rather, they are just letting each other know that they are “there,” that they are online, in reach. Texting for the kids is a way of “pinging” each other. They bounce pings back and forth and so signal their presence for each other.
  •  
    This is especially for Carsten!
Barbara Lindsey

My School, Meet MySpace: Social Networking at School | Edutopia - 0 views

  • Months before the newly hired teachers at Philadelphia's Science Leadership Academy (SLA) started their jobs, they began the consuming work of creating the high school of their dreams -- without meeting face to face. They articulated a vision, planned curriculum, designed assessment rubrics, debated discipline policies, and even hammered out daily schedules using the sort of networking tools -- messaging, file swapping, idea sharing, and blogging -- kids love on sites such as MySpace.
  • hen, weeks before the first day of school, the incoming students jumped onboard -- or, more precisely, onto the Science Leadership Academy Web site -- to meet, talk with their teachers, and share their hopes for their education. So began a conversation that still perks along 24/7 in SLA classrooms and cyberspace. It's a bold experiment to redefine learning spaces, the roles and relationships of teachers and students, and the mission of the modern high school.
  • When I hear people say it's our job to create the twenty-first-century workforce, it scares the hell out of me," says Chris Lehmann, SLA's founding principal. "Our job is to create twenty-first-century citizens. We need workers, yes, but we also need scholars, activists, parents -- compassionate, engaged people. We're not reinventing schools to create a new version of a trade school. We're reinventing schools to help kids be adaptable in a world that is changing at a blinding rate."
  • ...11 more annotations...
  • It's the spirit of science rather than hardcore curriculum that permeates SLA. "In science education, inquiry-based learning is the foothold," Lehmann says. "We asked, 'What does it mean to build a school where everything is based on the core values of science: inquiry, research, collaboration, presentation, and reflection?'"
  • It means the first-year curriculum is built around essential questions: Who am I? What influences my identity? How do I interact with my world? In addition to science, math, and engineering, core courses include African American history, Spanish, English, and a basic how-to class in technology that also covers Internet safety and the ethical use of information and software. Classes focus less on facts to be memorized and more on skills and knowledge for students to master independently and incorporate into their lives. Students rarely take tests; they write reflections and do "culminating" projects. Learning doesn't merely cross disciplines -- it shatters outdated departmental divisions. Recently, for instance, kids studied atomic weights in biochemistry (itself a homegrown interdisciplinary course), did mole calculations in algebra, and created Dalton models (diagrams that illustrate molecular structures) in art.
  • This is Dewey for the digital age, old-fashioned progressive education with a technological twist.
  • computers and networking are central to learning at, and shaping the culture of, SLA. "
  • he zest to experiment -- and the determination to use technology to run a school not better, but altogether differently -- began with Lehmann and the teachers last spring when they planned SLA online. Their use of Moodle, an open source course-management system, proved so easy and inspired such productive collaboration that Lehmann adopted it as the school's platform. It's rare to see a dog-eared textbook or pad of paper at SLA; everybody works on iBooks. Students do research on the Internet, post assignments on class Moodle sites, and share information through forums, chat, bookmarks, and new software they seem to discover every day.
  • Teachers continue to use Moodle to plan, dream, and learn, to log attendance and student performance, and to talk about everything -- from the student who shows up each morning without a winter coat to cool new software for tagging research sources. There's also a schoolwide forum called SLA Talk, a combination bulletin board, assembly, PA system, and rap session.
  • Web technology, of course, can do more than get people talking with those they see every day; people can communicate with anyone anywhere. Students at SLA are learning how to use social-networking tools to forge intellectual connections.
  • In October, Lehmann noticed that students were sorting themselves by race in the lunchroom and some clubs. He felt disturbed and started a passionate thread on self-segregation.
  • "Having the conversation changed the way kids looked at themselves," he says.
  • "What I like best about this school is the sense of community," says student Hannah Feldman. "You're not just here to learn, even though you do learn a lot. It's more like a second home."
  • As part of the study of memoirs, for example, Alexa Dunn's English class read Funny in Farsi, Firoozeh Dumas's account of growing up Iranian in the United States -- yes, the students do read books -- and talked with the author in California via Skype. The students also wrote their own memoirs and uploaded them to SLA's network for the teacher and class to read and edit. Then, digital arts teacher Marcie Hull showed the students GarageBand, which they used to turn their memoirs into podcasts. These they posted on the education social-networking site EduSpaces (formerly Elgg); they also posted blogs about the memoirs.
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

ESU professor suspended for comments made on Facebook page | PoconoRecord.com - 0 views

  • these comments are actually published material that can be preserved, spread beyond the intended audience and interpreted in ways users never intended.
  • An East Stroudsburg University sociology professor has been suspended for venting her workplace frustration on her Facebook page.
  • Gadsden, who only recently started her Facebook account, has 32 "friends," including friends, relatives and colleagues. She said she has no students among her Facebook friends. She was unsure how her messages wound up at ESU's provost's office.
  • ...1 more annotation...
  • The Facebook incident also points out how our off-hand musings cannot be considered private in the age of social networking,
Barbara Lindsey

academhack » Blog Archive » A Model for Teaching College Writing - 0 views

  • most rhetoric courses focus strictly on writing, and they limit assignments to the classroom environment – practices that devalue other rhetorical mediums, and the purpose of rhetoric itself.
  • A website containing copies of their larger papers coincided with the blog. This made the assignments more communal in nature and reinforced that writing is meant to be shared.
  • Creating work in a vacuum delegitimizes it. When the goal of your course is to teach students to persuade, and you don’t include what is now the most influential tool for disseminating your argument, you are crippling your students.
  • ...4 more annotations...
  • Rhetoric is more than just learning a standard structure for an argument. Students should be asking themselves: “How does what we write and what we think change when we know that in ten minutes we can create a blog and broadcast to the world? How does this change how we see and portray ourselves?” These are the deeper rhetorical questions students need to grapple with. It is this focus that will make them stronger readers, writers, and citizens.
  • We tell students that pictures are a viable means of persuasion, and then we as them to write about it. This hardly reinforces the message. So I thought: “Why not have the students work with the mediums they study, including film?”
  • I think the class was a success. It taught the students to work with a variety of mediums and to always consider their work as something to share. It is this final point that the entire course hinged on: community. The blog, the group film – everything the students – did was about engaging the world, establishing a presence, and utilizing the tools that the rest of the world is operating with, rather than limiting them to traditional print-based technology.
  • She was given a course with a group of students who she was told, were struggling with writing and needed, “more structure.” As a response Barbara did the smart thing, and actually gave the students more freedom and control over their education.
    • Barbara Lindsey
       
      What do you think about this approach?
Barbara Lindsey

Teaching in Social and Technological Networks « Connectivism - 0 views

  • Students are not confined to interacting with only the ideas of a researcher or theorist. Instead, a student can interact directly with researchers through Twitter, blogs, Facebook, and listservs. The largely unitary voice of the traditional teacher is fragmented by the limitless conversation opportunities available in networks. When learners have control of the tools of conversation, they also control the conversations in which they choose to engage.
  • Traditional courses provide a coherent view of a subject. This view is shaped by “learning outcomes” (or objectives).
  • This cozy comfortable world of outcomes-instruction-assessment alignment exists only in education. In all other areas of life, ambiguity, uncertainty, and unkowns reign.
  • ...21 more annotations...
  • However, in order for education to work within the larger structure of integrated societal systems, clear outcomes are still needed.
  • How can we achieve learning targets when the educator is no longer able to control the actions of learners?
  • I’ve come to view teaching as a critical and needed activity in the chaotic and ambiguous information climate created by networks. In the future, however, the role of the teacher, the educator, will be dramatically different from the current norm. Views of teaching, of learner roles, of literacies, of expertise, of control, and of pedagogy are knotted together. Untying one requires untying the entire model.
  • Most likely, a teacher will be one of the more prominent nodes in a learner’s network. Thoughts, ideas, or messages that the teacher amplifies will generally have a greater probability of being seen by course participants.
  • A curatorial teacher acknowledges the autonomy of learners, yet understands the frustration of exploring unknown territories without a map. A curator is an expert learner. Instead of dispensing knowledge, he creates spaces in which knowledge can be created, explored, and connected.
  • The curator, in a learning context, arranges key elements of a subject in such a manner that learners will “bump into” them throughout the course. Instead of explicitly stating “you must know this”, the curator includes critical course concepts in her dialogue with learners, her comments on blog posts, her in-class discussions, and in her personal reflections. As learners grow their own networks of understanding, frequent encounters with conceptual artifacts shared by the teacher will begin to resonate.
    • Barbara Lindsey
       
      Can you see this as a viable possibility?
  • When I first started learning about the internet (pre-web days), I felt like I had stepped into a alternate realm with its own norms of behaviour and conduct. Bulletin boards and chat rooms presented a challenging mix of navigating social protocols while developing technical skills. By engaging with these conversation spaces – and forming a few tentative connections with others – I was able to find a precarious foothold in the online medium.
  • Today’s social web is no different – we find our way through active exploration. Designers can aid the wayfinding process through consistency of design and functionality across various tools, but ultimately, it is the responsibility of the individual to click/fail/recoup and continue.
  • Social structures are filters. As a learner grows (and prunes) her personal networks, she also develops an effective means to filter abundance. The network becomes a cognitive agent in this instance – helping the learner to make sense of complex subject areas by relying not only on her own reading and resource exploration, but by permitting her social network to filter resources and draw attention to important topics. In order for these networks to work effectively, learners must be conscious of the need for diversity and should include nodes that offer critical or antagonistic perspectives on all topic areas. Sensemaking in complex environments is a social process.
  • Imagine a course where the fragmented conversations and content are analyzed (monitored) through a similar service. Instead of creating a structure of the course in advance of the students starting (the current model), course structure emerges through numerous fragmented interactions. “Intelligence” is applied after the content and interactions start, not before. This is basically what Google did for the web – instead of fully defined and meta-described resources in a database, organized according to subject areas (i.e. Yahoo at the time), intelligence was applied at the point of search. Aggregation should do the same – reveal the content and conversation structure of the course as it unfolds, rather than defining it in advance.
    • Barbara Lindsey
       
      This would really change how courses are currently taught. How would current course, program, departmental, school-wide assessments, evaluations react?
  • Educators often have years or decades of experience in a field. As such, they are familiar with many of the concepts, pitfalls, confusions, and distractions that learners are likely to encounter. As should be evident by now, the educator is an important agent in networked learning. Instead of being the sole or dominant filter of information, he now shares this task with other methods and individuals.
  • Filtering can be done in explicit ways – such as selecting readings around course topics – or in less obvious ways – such as writing summary blog posts around topics. Learning is an eliminative process. By determining what doesn’t belong, a learner develops and focuses his understanding of a topic. The teacher assists in the process by providing one stream of filtered information. The student is then faced with making nuanced selections based on the multiple information streams he encounters. The singular filter of the teacher has morphed into numerous information streams, each filtered according to different perspectives and world views.
  • During CCK08/09, one of Stephen’s statements that resonated with many learners centers on modelling as a teaching practice: “To teach is to model and to demonstrate. To learn is to practice and to reflect.”
  • Apprenticeship learning models are among the most effective in attending to the full breadth of learning. Apprenticeship is concerned with more than cognition and knowledge (to know about) – it also addresses the process of becoming a carpenter, plumber, or physician.
  • Without an online identity, you can’t connect with others – to know and be known. I don’t think I’m overstating the importance of have a presence in order to participate in networks. To teach well in networks – to weave a narrative of coherence with learners – requires a point of presence.
  • In CCK08/09, we used The Daily, the connectivism blog, elearnspace, OLDaily, Twitter, Facebook, Ning, Second Life, and numerous other tools to connect with learners. Persistent presence in the learning network is needed for the teacher to amplify, curate, aggregate, and filter content and to model critical thinking and cognitive attributes that reflect the needs of a discipline.
  • We’re
  • We’re still early in many of these trends. Many questions remain unanswered about privacy, ethics in networks, and assessment. My view is that change in education needs to be systemic and substantial. Education is concerned with content and conversations. The tools for controlling both content and conversation have shifted from the educator to the learner. We require a system that acknowledges this reality.
  • Aggregation had so much potential. And yet has delivered relatively little over the last decade.
  • Perhaps we need to spend more time in information abundant environments before we turn to aggregation as a means of making sense of the landscape.
  • I’d like a learning system that functions along the lines of RescueTime – actively monitoring what I’m doing – but then offers suggestions of what I should (or could) be doing additionally. Or a system that is aware of my email exchanges over the last several years and can provide relevant information based on the development of my thinking and work.
    • Barbara Lindsey
       
      Would you welcome this kind of feedback on your private exchanges?
Barbara Lindsey

Web 2.0 Storytelling: Emergence of a New Genre (EDUCAUSE Review) | EDUCAUSE - 2 views

  • A story is told by one person or by a creative team to an audience that is usually quiet, even receptive. Or at least that’s what a story used to be, and that’s how a story used to be told. Today, with digital networks and social media, this pattern is changing. Stories now are open-ended, branching, hyperlinked, cross-media, participatory, exploratory, and unpredictable. And they are told in new ways: Web 2.0 storytelling picks up these new types of stories and runs with them, accelerating the pace of creation and participation while revealing new directions for narratives to flow.
    • Barbara Lindsey
       
      Do you agree with this statement?
    • loisramirez
       
      I also agree with the statement. A story in this age can take a life of it's own (or many, depending one the variations created), it allows a constant input by others and consequently the evolution of the text and the author as well.
  • To further define the term, we should begin by explaining what we mean by its first part: Web 2.0. Tim O'Reilly coined Web 2.0 in 2004,1 but the label remains difficult to acceptably define. For our present discussion, we will identify two essential features that are useful in distinguishing Web 2.0 projects and platforms from the rest of the web: microcontent and social media.2
  • creating a website through Web 2.0 tools is a radically different matter compared with the days of HTML hand-coding and of moving files with FTP clients.
  • ...44 more annotations...
  • out of those manifold ways of writing and showing have emerged new practices for telling stories.
  • Web 2.0 platforms are often structured to be organized around people rather than the traditional computer hierarchies of directory trees.
    • loisramirez
       
      I think this is a very important feature, since the web is not as static anymore and more people friendly, we as users feel more encourage to collaborate and create our own content.
  • Websites designed in the 1990s and later offered few connecting points for individuals, generally speaking, other than perhaps a guestbook or a link to an e-mail address. But Web 2.0 tools are built to combine microcontent from different users with a shared interest:
  • If readers closely examine a Web 2.0 project, they will find that it is often touched by multiple people, whether in the content creation or via associated comments or discussion areas. If they participate actively, by contributing content, we have what many call social media.
  • But Web 2.0's lowered bar to content creation, combined with increased social connectivity, ramps up the ease and number of such conversations, which are able to extend outside the bounds of a single environment.
    • Barbara Lindsey
       
      Does the definition of Web 2.0 given in this article help you to better understand your experiences thus far in this course?
  • Another influential factor of Web 2.0 is findability: the use of comprehensive search tools that help story creators (and readers) quickly locate related micocontent with just a few keywords typed into a search field.
  • Social bookmarking and content tagging
  • the "art of conveying events in words, images, and sounds often by improvisation or embellishment."4 Annette Simmons sees the storyteller’s empathy and sensory detail as crucial to "the unique capability to tap into a complex situation we have all experienced and which we all recognize."5
    • loisramirez
       
      I also agree with this comment, something as simple as a keyword can trigger a memory and bring back information that we have learned.
  • Web 2.0 stories are often broader: they can represent history, fantasy, a presentation, a puzzle, a message, or something that blurs the boundaries of reality and fiction.
  • On one level, web users experienced a great deal of digital narratives created in non-web venues but published in HTML, such as embedded audio clips, streaming video, and animation through the Flash plug-in. On another level, they experienced stories using web pages as hypertext lexia, chunks of content connected by hyperlinks.
  • While HTML narratives continued to be produced, digital storytelling by video also began, drawing on groundbreaking video projects from the 1970s.
  • By the time of the emergence of blogs and YouTube as cultural media outlets, Tim O'Reilly's naming of Web 2.0, and the advent of social media, storytelling with digital tools had been at work for nearly a generation.
  • Starting from our definitions, we should expect Web 2.0 storytelling to consist of Web 2.0 practices.
  • In each of these cases, the relative ease of creating web content enabled social connections around and to story materials.
  • Web 2.0 creators have many options about the paths to set before their users. Web 2.0 storytelling can be fully hypertextual in its multilinearity. At any time, the audience can go out of the bounds of the story to research information (e.g., checking names in Google searches or looking for background information in Wikipedia).
  • User-generated content is a key element of Web 2.0 and can often enter into these stories. A reader can add content into story platforms directly: editing a wiki page, commenting on a post, replying in a Twitter feed, posting a video response in YouTube. Those interactions fold into the experience of the overall story from the perspective of subsequent readers.
  • On a less complex level, consider the 9th Btn Y & L War Diaries blog project, which posts diary entries from a World War I veteran. A June 2008 post (http://yldiaries.blogspot.com/2008_06_01_archive.html) contains a full wartime document, but the set of comments from others (seven, as of this writing) offer foreshadowing, explication of terms, and context.
    • Barbara Lindsey
       
      Consider how these new media create rich dissertation and research opportunities.
  • As with the rest of Web 2.0, it is up to readers and viewers to analyze and interpret such content and usually to do so collaboratively.
  • At times, this distributed art form can range beyond the immediate control of a creator.
  • Creators can stage content from different sites.
  • Other forms leverage the Web 2.0 strategies of aggregating large amounts of microcontent and creatively selecting patterns out of an almost unfathomable volume of information.
  • The Twitter content form (140-character microstories) permits stories to be told in serialized portions spread over time.
    • loisramirez
       
      It is also a great way to practice not only creative writing but due to the 140 character limitation; this is a new challenge for a writer, how to say a lot in a just a few words.
  • It also poses several challenges: to what extent can we fragment (or ‘microchunk,’ in the latest parlance) literature before it becomes incoherent? How many media can literature be forced into—if, indeed, there is any limit?"
  • Facebook application that remixes photos drawn from Flickr (based on tags) with a set of texts that generate a dynamic graphic novel.
  • movie trailer recuts
  • At a different—perhaps meta—level, the boundaries of Web 2.0 stories are not necessarily clear. A story's boundaries are clear when it is self-contained, say in a DVD or XBox360 game. But can we know for sure that all the followers of a story's Twitter feed, for example, are people who are not involved directly in the project? Turning this question around, how do we know that we've taken the right measure of just how far a story goes, when we could be missing one character's blog or a setting description carefully maintained by the author on Wikipedia?
  • The Beast was described by its developer, Sean Stewart: “We would tell a story that was not bound by communication platform: it would come at you over the web, by email, via fax and phone and billboard and TV and newspaper, SMS and skywriting and smoke signals too if we could figure out how.
  • instead of telling a story, we would present the evidence of that story, and let the players tell it to themselves.”15
    • Barbara Lindsey
       
      How might your students who come to your courses with these kinds of experiences impact the way you present your content?
  • In addition, the project served as an illustrative example of the fact that no one can know about all of the possible web tools that are available.
    • Barbara Lindsey
       
      How might we address this conundrum?
  • web video storytelling, primarily through YouTube
  • Web 2.0 storytelling offers two main applications for colleges and universities: as composition platform and as curricular object.
  • Students can use blogs as character studies.
  • The reader is driven to read more, not only within the rest of that post but also across the other sites of the story: the archive of posts so far, the MySpace page, the resources copied and pointed to. Perhaps the reader ranges beyond the site, to the rest of the research world—maybe he or she even composes a response in some Web 2.0 venue.
  • Yet the blog form, which accentuates this narrative, is accessible to anyone with a browser. Examples like Project 1968 offer ready models for aspiring writers to learn from. Even though the purpose of Project 1968 is not immediately tied to a class, it is a fine example for all sorts of curricular instances, from history to political science, creative writing to gender studies, sociology to economics.
  • it’s worth remembering that using Web 2.0 storytelling is partly a matter of scale. Some projects can be Web 2.0 stories, while others integrate Web 2.0 storytelling practices.
  • Lecturers are familiar with telling stories as examples, as a way to get a subject across. They end discussions with a challenging question and create characters to embody parts of content (political actors, scientists, composite types). Imagine applying those habits to a class Twitter feed or Facebook group.
  • For narrative studies, Web 2.0 stories offer an unusual blend of formal features, from the blurry boundaries around each story to questions of chronology.
  • An epistolary novel, trial documents, a lab experiment, or a soldier's diaries—for example, WW1: Experiences of an English Soldier (http://wwar1.blogspot.com/)—come to life in this new format.
  • epigrams are well suited to being republished or published by microblogging tools, which focus the reader’s attention on these compressed phases. An example is the posting of Oscar Wilde’s Phrases and Philosophies for the Use of the Young (1894), on Twitter (http://twitter.com/oscarwilde). Other compressed forms of writing can be microblogged also, such as Félix Fénéon's Novels in Three Lines (1906), also on Twitter (http://twitter.com/novelsin3lines). As Dan Visel observed of the latter project: “Fénéon . . . was secretly a master of miniaturized text. . . . Fénéon's hypercompression lends itself to Twitter. In a book, these pieces don't quite have space to breathe; they're crowded by each other, and it's more difficult for the reader to savor them individually. As Twitter posts, they're perfectly self-contained, as they would have been when they appeared as feuilleton.”21
  • A publicly shared Web 2.0 story, created by students for a class, afterward becomes something that other students can explore. Put another way, this learning tool can produce materials that subsequently will be available as learning objects.
  • We expect to see new forms develop from older ones as this narrative world grows—even e-mail might become a new storytelling tool.22 Moreover, these storytelling strategies could be supplanted completely by some semantic platform currently under development. Large-scale gaming might become a more popular engine for content creation. And mobile devices could make microcontent the preferred way to experience digital stories.
  • perhaps the best approach for educators is simply to give Web 2.0 storytelling a try and see what happens. We invite you to jump down the rabbit hole. Add a photo to Flickr and use that as a writing prompt. Flesh out a character in Twitter. Follow a drama unfolding on YouTube. See how a wiki supports the gradual development of a setting. Then share with all of us what you have learned about this new way of telling, and listening to, stories.
  • The interwoven characters, relationships, settings, and scenes that result are the stuff of stories, regardless of how closely mapped onto reality they might be; this also distinguishes a Web 2.0 story from other blogging forms, such as political or project sites (except as satire or criticism!).
  • in sharp contrast to the singular flow of digital storytelling. In the latter form, authors create linear narratives, bound to the clear, unitary, and unidirectional timeline of the video format and the traditional story arc. Web 2.0 narratives can follow that timeline, and podcasts in particular must do so. But they can also link in multiple directions.
  •  
    By Bryan Alexander and Alan Levine
Barbara Lindsey

Technology: The Wrong Questions and the Right Questions | Education | Change.org - 0 views

  • we have to create engagement which works educationally for more than 25% of students, precisely because we have to work against the dominant culture - "math is hard," "history is stupid," "languages are un-necessary." And we need to do that using the efficiencies of contemporary technologies.
  • So tech, in my view, increases factual knowledge. It also allows a constant check of that knowledge. Math facts may stay fairly stable, but not the nations of Europe. Biological knowledge, chemical knowledge, changes constantly. We obviously need both, but a memorizer is not a person with a trustable education. A "finder" may be.
  • the best thing we will have done for our children (and future generations) is to have fully engaged them in empowered learning, building relationships and thinking creatively - and right now technology is one of the tools that facilitates that kind of education, so we need to use it! http://www.iwasthinking.ca/2008/10/09/its-not-about-the-technology/
  • ...7 more annotations...
  • i.e. I remember it only until I've finished the test) transforms to internalized (and useful) memorization only when the information is RELEVANT to my life! That's why kids can remember Pokemon points and Blues Clues songs yet struggle with their times tables or history dates! Yes, we need to agree on what content is foundational - AND we need to learn to teach it to (or learn it with) our children in ways that are meaningful to THEM, not just to us!
  • I used to teach in an urban alternative school where many of my students were gang members.  These students were not successful in school though they did get an education.  I am sorry to say that the majority of their education did not come from school teachers nor was it an education sanctioned by the school district.  I also through the years have been involved in many online communities of interest.  Learning occurs there all the time.  Not all members of these communities were successful in school but within these communities were successful in becoming educated about certain things.  There is high quality education occurring in many places that we don't consider school:  boy and girl scouts, workplaces, church youth groups, 4H, Little League, gangs, internet chat rooms, YouTube, blogs, libraries, family interaction, etc.  In fact, the most relevant learnin for most people happens in one of hese other places of education and not in schools. 
  • If the goal for schools is to become the most relevant and useful place for education we need to harness the rhetorical draw of the gang, the personal significance of the family, the intrinsic nature of clubs and organizations like the Scouts and 4H, the relevance and applicability of the work place, and the openness of social media.  The only way to do this is to personalize the learning experience for each student.  This means that content will be as different from person to person as is the approach to teaching that content.
  • Students who behave, and learn, most like their teachers do the best in classrooms. Teachers see this reflection as proof of their own competence - "The best students are just like me." And thus all who are "different" in any way - race, class, ability, temperament, preferences - are left out of the success story.
  • Mobile phones, computers everywhere, hypertext, social networking, collaborative cognition (from Wikipedia on up), Google, text-messaging, Twitter, audiobooks, digital texts, text-to-speech, speech recognition, flexible formatting - these are not "add ons" to the world of education, they are the world of education. This is how humans in this century talk, read, communicate, learn. And learning to use these technologies effectively, efficiently, and intelligently must be at the heart of our educational strategies. These technologies do something else - by creating a flexibility and set of choices unprecedented in human communication - they "enable" a vast part of the population which earlier media forms disabled.
  • Back in Socrates' time it was all about the information you could remember. With this system very, very few could become "educated." In the ‘Gutenberg era' it was all about how many books you could read and how fast you could decode alphabetical text; this let a few more reach that ‘educated' status - about 35% if you trust all those standardized tests to measure "proficiency." But now it is all about how you learn to find information, how you build your professional and personal networks, how you learn, how to learn - because learning must be continuous. None of this eliminates the need for a base of knowledge - the ability to search, to ask questions, requires a knowledge base, but it dramatically alters both how that knowledge base is developed, and what you need to do with it. This paradigm opens up the ranks of the "educated" in ways inconceivable previously.
  • We must abandon the one-way classroom communication system, be it the lecture or use of the "clicker," and teach with conversation and through modeling learning itself. We must lose the idea that "attention" means students staring at a teacher, or that "attendance" means being in the room, and understand all the differing ways humans learn best. We must stop separating subjects rigidly and adopt the contemporary notion of following knowledge where it leads us.
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

Saturday, March 5 - MAALLT 2011 - 0 views

  •  
    maallt1
Barbara Lindsey

Link by Link - Don't Buy That Textbook, Download It Free - NYTimes.com - 1 views

  • “It is a two-way process,” he wrote in an e-mail message. “I, for one, have experienced difficulty during my formal study years with the best of textbooks around.” He said the new system “gives me opportunity to respond to the editing needs all the time.”
  •  
    page 2
‹ Previous 21 - 40 of 40
Showing 20 items per page