Skip to main content

Home/ beyondwebct/ Group items tagged office

Rss Feed Group items tagged

Barbara Lindsey

gladwell dot com - designs for working - 0 views

  • The task of the office, then, is to invite a particular kind of social interaction--the casual, nonthreatening encounter that makes it easy for relative strangers to talk to each other. Offices need the sort of social milieu that Jane Jacobs found on the sidewalks of the West Village. "It is possible in a city street neighborhood to know all kinds of people without unwelcome entanglements, without boredom, necessity for excuses, explanations, fears of giving offense, embarrassments respecting impositions or commitments, and all such paraphernalia of obligations which can accompany less limited relationships," Jacobs wrote. If you substitute "office" for "city street neighborhood," that sentence becomes the perfect statement of what the modern employer wants from the workplace.
    • Barbara Lindsey
       
      This reminds me of the strength of weak ties argument.
  • In the war-room study, the company moved the client, the programmers, and a manager into a dedicated conference room, and made them stay there until the project was done. Using the war room cut the software-development time by two-thirds, in part because there was far less time wasted on formal meetings or calls outside the building: the people who ought to have been bumping into each other were now sitting next to each other.
  • The agency is in a huge old warehouse, three stories high and the size of three football fields. It is informally known as Advertising City, and that's what it is: a kind of artfully constructed urban neighborhood. The floor is bisected by a central corridor called Main Street, and in the center of the room is an open space, with café tables and a stand of ficus trees, called Central Park. There's a basketball court, a game room, and a bar. Most of the employees are in snug workstations known as nests, and the nests are grouped together in neighborhoods that radiate from Main Street like Paris arrondissements. The top executives are situated in the middle of the room. The desk belonging to the chairman and creative director of the company looks out on Central Park. The offices of the chief financial officer and the media director abut the basketball court. Sprinkled throughout the building are meeting rooms and project areas and plenty of nooks where employees can closet themselves when they need to.
  • ...7 more annotations...
  • A vital community, in Jacobs's view, required more than the appropriate physical environment. It also required a certain kind of person, who could bind together the varied elements of street life.
  • What Stephenson's X-rays do best, though, is tell you who the public characters are. In every network, there are always one or two people who have connections to many more people than anyone else. Stephenson calls them "hubs," and on her charts lines radiate out from them like spokes on a wheel. (Bernie the candy-store owner, on Jacobs's Hudson Street, was a hub.) A few people are also what Stephenson calls "gatekeepers": they control access to critical people, and link together a strategic few disparate groups. Finally, if you analyze the graphs there are always people who seem to have lots of indirect links to other people--who are part of all sorts of networks without necessarily being in the center of them. Stephenson calls those people "pulsetakers." (In Silicon Valleyspeak, the person in a sea of cubicles who pops his or her head up over the partition every time something interesting is going on is called a prairie dog: prairie dogs are pulsetakers.)
  • she pointed to the lines connecting that department with other departments. "They're all coming into this one place," she said, and she showed how all the lines coming out of marketing converged on one senior executive. "There's very little path redundancy. In human systems, you need redundancy, you need communication across multiple paths."
  • What concerned Stephenson wasn't just the lack of redundancy but the fact that, in her lingo, many of the paths were "unconfirmed": they went only one way.
  • What you want to do is put people who don't trust each other near each other. Not necessarily next to each other, because they get too close. But close enough so that when you pop your head up, you get to see people, they are in your path, and all of a sudden you build an inviting space where they can hang out, kitchens and things like that. Maybe they need to take a hub in an innovation network and place the person with a pulsetaker in an expert network--to get that knowledge indirectly communicated to a lot of people."
  • it's clear that there are some very simple principles from the study of public characters which ought to drive the design process. "You want to place hubs at the center," Joyce Bromberg, the director of space planning, says. "These are the ones other people go to in order to get information. Give them an environment that allows access. But there are also going to be times that they need to have control--so give them a place where they can get away. Gatekeepers represent the fit between groups. They transmit ideas. They are brokers, so you might want to put them at the perimeter, and give them front porches"--areas adjoining the workspace where you might put little tables and chairs. "Maybe they could have swinging doors with white boards, to better transmit information. As for pulsetakers, they are the roamers. Rather than give them one fixed work location, you might give them a series of touchdown spots--where you want them to stop and talk. You want to enable their meandering."
  • The point of the new offices is to compel us to behave and socialize in ways that we otherwise would not--to overcome our initial inclination to be office suburbanites. But, in all the studies of the new workplaces, the reservations that employees have about a more social environment tend to diminish once they try it. Human behavior, after all, is shaped by context, but how it is shaped--and whether we'll be happy with the result--we can understand only with experience.
Barbara Lindsey

TSA: Privacy - 0 views

  • The officer who views the image is remotely located in a secure resolution room and never sees the passenger.
  • To further protect passenger privacy, millimeter wave technology blurs all facial features and backscatter technology has an algorithm applied to the entire image.
  • Advanced imaging technology cannot store, print, transmit or save the image, and the image is automatically deleted from the system after it is cleared by the remotely located security officer. Officers evaluating images are not permitted to take cameras, cell phones or photo-enabled devices into the resolution room.
  • ...2 more annotations...
  • TSA recently new software on all millimeter wave imaging technology machines – upgrades designed to enhance privacy by eliminating passenger-specific images and instead auto-detecting potential threats and indicating their location on a generic outline of a person.
  • For units that do not yet have the new software, TSA has taken all efforts to ensure passenger privacy. To that end, the officer who assists the passenger never sees the image the technology produces and the officer who views the image is remotely located in a secure resolution room and never sees the passenger. The two officers communicate via wireless headset.
Barbara Lindsey

C. M. Rubin: The Global Search for Education: More Technology, Please! - 0 views

  • One of the best examples I have seen of the flex model was in Morgan Hill, California. This is a district south of San Jose where about a third of its students are Hispanic and I believe over a third of its students are on free-and-reduced price lunch. The school is called the Silicon Valley Flex Academy - Grades 6 through 12. As you walk into the school there are a couple of huge open spaces on either side where every student has his/her own office. In this space, each student has his/her own computer. The students are encouraged to decorate their own space with things they like (in the same way an adult might decorate an office at work). There are break out classrooms around the perimeter of the building. Here teachers are getting the data on how the kids are doing. Teachers can pull students into these break-out classrooms in very small groups. The teacher is then able to focus on a student's individual issues. The teacher's job is totally different in this arrangement. The fascinating thing was how much ownership the students have over their learning. They all knew exactly what was expected of them the entire year. They knew exactly how they were doing at any point. Their job was to learn the material. If they could get the work done during the school day there was no homework. So it was up to the individual students to make those decisions.
  • The teachers I spoke to explained that they had been trained to do lesson planning, lectures to large groups of students and classroom management -- none of which they were now doing. They explained that the adjustment was difficult. Training has not been built into the formal teacher training system for programs like this, and few are really thinking about it at the moment. Now, the teacher is still doing teaching or tutoring when pulling students out into small groups for project-based work, but instead of this being determined by a pacing guide, this is now being determined by where the students are in their learning. What was so interesting was that in this model, teachers were able to do the tutoring and value enrichment work that teachers really like to do but don't always get time to do in a classroom. One of the challenges the teachers mentioned was staying on top of scheduling. How do you keep track when you have students at different places in the curriculum? Those were tough decisions for teachers to make and they were, as you say, learning on the job.
  • When students own their learning, they feel responsible for it and motivated to do it. What they also appreciated was that the teacher was no longer there to "punish them" or "grade them down". Instead the teacher was there to help them reach their goal. This is much more of an environment built around success and motivation versus failure.
  • ...1 more annotation...
  • I also think the assessment system that we have in place in schools is a problem for this learning system going forward. Assessment needs to be based on where each individual child started and then grew to and finally ended up in a particular year, versus a snapshot once a year view of an entire school.
  •  
    fall 2012 syllabus
Barbara Lindsey

iPads for College Classrooms? Not So Fast, Some Professors Say. - Technology - The Chro... - 3 views

  • But Mr. Steinhaus and other administrators soon realized that the iPad, with the slow finger-typing it requires, actually makes written course work more difficult, and that the devices wouldn't run all of the university's applications.
  • When the University of Notre Dame tested iPads in a management class, students said the finger-based interface on its glassy surface was not good for taking class notes and didn't allow them to mark up readings. For their online final exam, 39 of the 40 students put away their iPads in favor a laptop, because of concerns that the Apple tablet might not save their material.
  • iPads also foster collaboration. Students using them for group assignments in a math class at Pepperdine University were more in sync than were students in a section not using iPads. The iPad-equipped students worked at the same pace as one another and shared their screens to help one another solve tough problems, says Dana Hoover, assistant chief information officer for communications and planning.
  • ...4 more annotations...
  • At Reed College, having all the texts available in a political-science class on the iPad meant it was easier to refer to readings and pull in outside material for discussion, says Martin Ringle, the college's chief technology officer.
  • Course readings were converted to PDF's at Reed, which allowed students to mark them up using an application called iAnnotate, but Mr. Ringle acknowledges that this wouldn't work for all classes, because many texts can't easily be converted to PDF's, and many electronic textbooks don't allow annotation.
  • While Apple has promoted the iPad's ability to change learning, Ms. Simon says that as far as she knows, the company isn't working with leaders in the learning process: professors themselves.
  • but consumer decisions rather than educational ones will probably determine which tablets students purchase—and which ones colleges will support, he says.
    • Barbara Lindsey
       
      Should this concern us? Does this happen with technology in general?
Barbara Lindsey

Cheater Cheater by Michael Erard - The Morning News - 0 views

  • To me it meant that there were contradictions about what we did and what we said in our culture about who we looked up to and who we made pay for our sins. It also meant that authorship and authoring were far more complicated than could be taught—I myself was about to see this, live it.
  • Because she had a disciplinary file in the dean’s office, she decided against graduate school and didn’t take the GRE, though she was thinking about graduate school in business. More importantly, though, her self-image as a good girl had been crushed.
  • I told Haley a bit about how her plagiarism had affected me. How I took it personally, and trusted students a little less; I made sure that assignments were plagiarism-proof. But what she couldn’t know was how I became more confident in spotting an opportunity to instruct, and less interested in policing boundaries—which were, after all, mine to teach. She also couldn’t know that at one point, I’d considered designing a course that would focus on rewriting, rephrasing, riffing, and appropriation as real tools of the writer’s trade. It wouldn’t teach anything that would get anyone in trouble, but unlike other writing courses, it would be honest about where ideas and language come from: well, who knows where they come from, but not from angelic transmissions into our minds.
Barbara Lindsey

HIPAA Information For Consumers - 0 views

  • To make sure that your health information is protected in a way that does not interfere with your health care, your information can be used and shared:For your treatment and care coordinationTo pay doctors and hospitals for your health care and to help run their businessesWith your family, relatives, friends, or others you identify who are involved with your health care or your health care bills, unless you objectTo make sure doctors give good care and nursing homes are clean and safeTo protect the public's health, such as by reporting when the flu is in your areaTo make required reports to the police, such as reporting gunshot wounds
  • generally cannot
  • Examples of organizations that do not have to follow the Privacy and Security Rules include:life insurers,employers,workers compensation carriers,many schools and school districts,many state agencies like child protective service agencies,many law enforcement agencies,many municipal offices.
Barbara Lindsey

Minds on Fire: Open Education, the Long Tail, and Learning 2.0 (EDUCAUSE Review) | EDUC... - 0 views

  • But at the same time that the world has become flatter, it has also become “spikier”: the places that are globally competitive are those that have robust local ecosystems of resources supporting innovation and productiveness.2
  • various initiatives launched over the past few years have created a series of building blocks that could provide the means for transforming the ways in which we provide education and support learning. Much of this activity has been enabled and inspired by the growth and evolution of the Internet, which has created a global “platform” that has vastly expanded access to all sorts of resources, including formal and informal educational materials. The Internet has also fostered a new culture of sharing, one in which content is freely contributed and distributed with few restrictions or costs.
  • the most visible impact of the Internet on education to date has been the Open Educational Resources (OER) movement, which has provided free access to a wide range of courses and other educational materials to anyone who wants to use them. The movement began in 2001 when the William and Flora Hewlett and the Andrew W. Mellon foundations jointly funded MIT’s OpenCourseWare (OCW) initiative, which today provides open access to undergraduate- and graduate-level materials and modules from more than 1,700 courses (covering virtually all of MIT’s curriculum). MIT’s initiative has inspired hundreds of other colleges and universities in the United States and abroad to join the movement and contribute their own open educational resources.4 The Internet has also been used to provide students with direct access to high-quality (and therefore scarce and expensive) tools like telescopes, scanning electron microscopes, and supercomputer simulation models, allowing students to engage personally in research.
  • ...29 more annotations...
  • most profound impact of the Internet, an impact that has yet to be fully realized, is its ability to support and expand the various aspects of social learning. What do we mean by “social learning”? Perhaps the simplest way to explain this concept is to note that social learning is based on the premise that our understanding of content is socially constructed through conversations about that content and through grounded interactions, especially with others, around problems or actions. The focus is not so much on what we are learning but on how we are learning.5
  • This perspective shifts the focus of our attention from the content of a subject to the learning activities and human interactions around which that content is situated. This perspective also helps to explain the effectiveness of study groups. Students in these groups can ask questions to clarify areas of uncertainty or confusion, can improve their grasp of the material by hearing the answers to questions from fellow students, and perhaps most powerfully, can take on the role of teacher to help other group members benefit from their understanding (one of the best ways to learn something is, after all, to teach it to others).
  • This encourages the practice of what John Dewey called “productive inquiry”—that is, the process of seeking the knowledge when it is needed in order to carry out a particular situated task.
  • ecoming a trusted contributor to Wikipedia involves a process of legitimate peripheral participation that is similar to the process in open source software communities. Any reader can modify the text of an entry or contribute new entries. But only more experienced and more trusted individuals are invited to become “administrators” who have access to higher-level editing tools.8
  • by clicking on tabs that appear on every page, a user can easily review the history of any article as well as contributors’ ongoing discussion of and sometimes fierce debates around its content, which offer useful insights into the practices and standards of the community that is responsible for creating that entry in Wikipedia. (In some cases, Wikipedia articles start with initial contributions by passionate amateurs, followed by contributions from professional scholars/researchers who weigh in on the “final” versions. Here is where the contested part of the material becomes most usefully evident.) In this open environment, both the content and the process by which it is created are equally visible, thereby enabling a new kind of critical reading—almost a new form of literacy—that invites the reader to join in the consideration of what information is reliable and/or important.
  • But viewing learning as the process of joining a community of practice reverses this pattern and allows new students to engage in “learning to be” even as they are mastering the content of a field.
  • Mastering a field of knowledge involves not only “learning about” the subject matter but also “learning to be” a full participant in the field. This involves acquiring the practices and the norms of established practitioners in that field or acculturating into a community of practice.
  • Another interesting experiment in Second Life was the Harvard Law School and Harvard Extension School fall 2006 course called “CyberOne: Law in the Court of Public Opinion.” The course was offered at three levels of participation. First, students enrolled in Harvard Law School were able to attend the class in person. Second, non–law school students could enroll in the class through the Harvard Extension School and could attend lectures, participate in discussions, and interact with faculty members during their office hours within Second Life. And at the third level, any participant in Second Life could review the lectures and other course materials online at no cost. This experiment suggests one way that the social life of Internet-based virtual education can coexist with and extend traditional education.
  • Digital StudyHall (DSH), which is designed to improve education for students in schools in rural areas and urban slums in India. The project is described by its developers as “the educational equivalent of Netflix + YouTube + Kazaa.”11 Lectures from model teachers are recorded on video and are then physically distributed via DVD to schools that typically lack well-trained instructors (as well as Internet connections). While the lectures are being played on a monitor (which is often powered by a battery, since many participating schools also lack reliable electricity), a “mediator,” who could be a local teacher or simply a bright student, periodically pauses the video and encourages engagement among the students by asking questions or initiating discussions about the material they are watching.
  • John King, the associate provost of the University of Michigan
  • For the past few years, he points out, incoming students have been bringing along their online social networks, allowing them to stay in touch with their old friends and former classmates through tools like SMS, IM, Facebook, and MySpace. Through these continuing connections, the University of Michigan students can extend the discussions, debates, bull sessions, and study groups that naturally arise on campus to include their broader networks. Even though these extended connections were not developed to serve educational purposes, they amplify the impact that the university is having while also benefiting students on campus.14 If King is right, it makes sense for colleges and universities to consider how they can leverage these new connections through the variety of social software platforms that are being established for other reasons.
  • The project’s website includes reports of how students, under the guidance of professional astronomers, are using the Faulkes telescopes to make small but meaningful contributions to astronomy.
  • “This is not education in which people come in and lecture in a classroom. We’re helping students work with real data.”16
  • HOU invites students to request observations from professional observatories and provides them with image-processing software to visualize and analyze their data, encouraging interaction between the students and scientists
  • The site is intended to serve as “an open forum for worldwide discussions on the Decameron and related topics.” Both scholars and students are invited to submit their own contributions as well as to access the existing resources on the site. The site serves as an apprenticeship platform for students by allowing them to observe how scholars in the field argue with each other and also to publish their own contributions, which can be relatively small—an example of the “legitimate peripheral participation” that is characteristic of open source communities. This allows students to “learn to be,” in this instance by participating in the kind of rigorous argumentation that is generated around a particular form of deep scholarship. A community like this, in which students can acculturate into a particular scholarly practice, can be seen as a virtual “spike”: a highly specialized site that can serve as a global resource for its field.
  • I posted a list of links to all the student blogs and mentioned the list on my own blog. I also encouraged the students to start reading one another's writing. The difference in the writing that next week was startling. Each student wrote significantly more than they had previously. Each piece was more thoughtful. Students commented on each other's writing and interlinked their pieces to show related or contradicting thoughts. Then one of the student assignments was commented on and linked to from a very prominent blogger. Many people read the student blogs and subscribed to some of them. When these outside comments showed up, indicating that the students really were plugging into the international community's discourse, the quality of the writing improved again. The power of peer review had been brought to bear on the assignments.17
  • for any topic that a student is passionate about, there is likely to be an online niche community of practice of others who share that passion.
  • Finding and joining a community that ignites a student’s passion can set the stage for the student to acquire both deep knowledge about a subject (“learning about”) and the ability to participate in the practice of a field through productive inquiry and peer-based learning (“learning to be”). These communities are harbingers of the emergence of a new form of technology-enhanced learning—Learning 2.0—which goes beyond providing free access to traditional course materials and educational tools and creates a participatory architecture for supporting communities of learners.
  • We need to construct shared, distributed, reflective practicums in which experiences are collected, vetted, clustered, commented on, and tried out in new contexts.
  • An example of such a practicum is the online Teaching and Learning Commons (http://commons.carnegiefoundation.org/) launched earlier this year by the Carnegie Foundation for the Advancement of Teaching
  • The Commons is an open forum where instructors at all levels (and from around the world) can post their own examples and can participate in an ongoing conversation about effective teaching practices, as a means of supporting a process of “creating/using/re-mixing (or creating/sharing/using).”20
  • The original World Wide Web—the “Web 1.0” that emerged in the mid-1990s—vastly expanded access to information. The Open Educational Resources movement is an example of the impact that the Web 1.0 has had on education.
  • But the Web 2.0, which has emerged in just the past few years, is sparking an even more far-reaching revolution. Tools such as blogs, wikis, social networks, tagging systems, mashups, and content-sharing sites are examples of a new user-centric information infrastructure that emphasizes participation (e.g., creating, re-mixing) over presentation, that encourages focused conversation and short briefs (often written in a less technical, public vernacular) rather than traditional publication, and that facilitates innovative explorations, experimentations, and purposeful tinkerings that often form the basis of a situated understanding emerging from action, not passivity.
  • In the twentieth century, the dominant approach to education focused on helping students to build stocks of knowledge and cognitive skills that could be deployed later in appropriate situations. This approach to education worked well in a relatively stable, slowly changing world in which careers typically lasted a lifetime. But the twenty-first century is quite different.
  • We now need a new approach to learning—one characterized by a demand-pull rather than the traditional supply-push mode of building up an inventory of knowledge in students’ heads. Demand-pull learning shifts the focus to enabling participation in flows of action, where the focus is both on “learning to be” through enculturation into a practice as well as on collateral learning.
  • The demand-pull approach is based on providing students with access to rich (sometimes virtual) learning communities built around a practice. It is passion-based learning, motivated by the student either wanting to become a member of a particular community of practice or just wanting to learn about, make, or perform something. Often the learning that transpires is informal rather than formally conducted in a structured setting. Learning occurs in part through a form of reflective practicum, but in this case the reflection comes from being embedded in a community of practice that may be supported by both a physical and a virtual presence and by collaboration between newcomers and professional practitioners/scholars.
  • The building blocks provided by the OER movement, along with e-Science and e-Humanities and the resources of the Web 2.0, are creating the conditions for the emergence of new kinds of open participatory learning ecosystems23 that will support active, passion-based learning: Learning 2.0.
  • As a graduate student at UC-Berkeley in the late 1970s, Treisman worked on the poor performance of African-Americans and Latinos in undergraduate calculus classes. He discovered the problem was not these students’ lack of motivation or inadequate preparation but rather their approach to studying. In contrast to Asian students, who, Treisman found, naturally formed “academic communities” in which they studied and learned together, African-Americans tended to separate their academic and social lives and studied completely on their own. Treisman developed a program that engaged these students in workshop-style study groups in which they collaborated on solving particularly challenging calculus problems. The program was so successful that it was adopted by many other colleges. See Uri Treisman, “Studying Students Studying Calculus: A Look at the Lives of Minority Mathematics Students in College,” College Mathematics Journal, vol. 23, no. 5 (November 1992), pp. 362–72, http://math.sfsu.edu/hsu/workshops/treisman.html.
  • In the early 1970s, Stanford University Professor James Gibbons developed a similar technique, which he called Tutored Videotape Instruction (TVI). Like DSH, TVI was based on showing recorded classroom lectures to groups of students, accompanied by a “tutor” whose job was to stop the tape periodically and ask questions. Evaluations of TVI showed that students’ learning from TVI was as good as or better than in-classroom learning and that the weakest students academically learned more from participating in TVI instruction than from attending lectures in person. See J. F. Gibbons, W. R. Kincheloe, and S. K. Down, “Tutored Video-tape Instruction: A New Use of Electronics Media in Education,” Science, vol. 195 (1977), pp. 1136–49.
Barbara Lindsey

Convenience, Communications, and Control: How Students Use Technology | Resources | EDU... - 0 views

  • They are characterized as preferring teamwork, experiential activities, and the use of technology
  • Doing is more important than knowing, and learning is accomplished through trial and error as opposed to a logical and rule-based approach.2 Similarly, Paul Hagner found that these students not only possess the skills necessary to use these new communication forms, but there is an ever increasing expectation on their part that these new communication paths be used
  • Much of the work to date, while interesting and compelling, is intuitive and largely based on qualitative data and observation.
  • ...34 more annotations...
  • There is an inexorable trend among college students to universal ownership, mobility, and access to technology.
  • Students were asked about the applications they used on their electronic devices. They reported that they use technology first for educational purposes, followed by communication.
    • Barbara Lindsey
       
      All self-reported. Would have been powerful if could have actually tracked a representative sample and compared actual use with reported use.
  • presentation software was driven primarily by the requirements of the students' major and the curriculum.
  • Communications and entertainment are very much related to gender and age.
  • From student interviews, a picture emerged of student technology use driven by the demands of the major and the classes that students take. Seniors reported spending more time overall on a computer than do freshmen, and they reported greater use of a computer at a place of employment. Seniors spent more hours on the computer each week in support of their educational activities and also more time on more advanced applications—spreadsheets, presentations, and graphics.
  • Confirming what parents suspect, students with the lowest grade point averages (GPAs) spend significantly more time playing computer games; students with the highest GPAs spend more hours weekly using the computer in support of classroom activities. At the University of Minnesota, Crookston, students spent the most hours on the computer in support of classroom activities. This likely reflects the deliberate design of the curriculum to use a laptop extensively. In summary, the curriculum's technology requirements are major motivators for students to learn to use specialized software.
  • The interviews indicated that students are skilled with basic office suite applications but tend to know just enough technology functionality to accomplish their work; they have less in-depth application knowledge or problem solving skills.
  • According to McEuen, student technology skills can be likened to writing skills: Students come to college knowing how to write, but they are not developed writers. The analogy holds true for information technology, and McEuen suggested that colleges and universities approach information technology in the same way they approach writing.6
  • he major requires the development of higher-level skill sets with particular applications.
    • Barbara Lindsey
       
      Not really quantitative--self-reported data back by selected qualitative interviews
  • The comparative literature on student IT skill self-assessment suggests that students overrate their skills; freshmen overrate their skills more than seniors, and men overrate their skills more than women.7 Our data supports these conclusions. Judy Doherty, director of the Student Technologies Resource Group at Colgate University, remarked on student skill assessment, "Students state in their job applications that they are good if not very good, but when tested their skills are average to poor, and they need a lot of training."8
  • Mary Jane Smetanka of the Minneapolis–St. Paul Star Tribune reported that some students are so conditioned by punch-a-button problem solving on computers that they approach problems with a scattershot impulsiveness instead of methodically working them through. In turn, this leads to problem-solving difficulties.
  • We expected to find that the Net Generation student prefers classes that use technology. What we found instead is a bell curve with a preference for a moderate use of technology in the classroom (see Figure 1).
    • Barbara Lindsey
       
      More information needs to be given to find out why--may be tool and method not engaging.
  • It is not surprising that if technology is used well by the instructor, students will come to appreciate its benefits.
  • A student's major was also an important predictor of preferences for technology in the classroom (see Table 3), with engineering students having the highest preference for technology in the classroom (67.8 percent), followed by business students (64.3 percent).
  • Humanities 7.7% 47.9% 40.2
  • he highest scores were given to improved communications, followed by factors related to the management of classroom activities. Lower impact activities had to do with comprehension of classroom materials (complex concepts).
  • I spend more time engaged in course activities in those courses that require me to use technology.
  • The instructors' use of technology in my classes has increased my interest in the subject matter. 3.25 Classes that use information technology are more likely to focus on real-world tasks and examples.
  • Interestingly, students do not feel that use of information technology in classes greatly increases the amount of time engaged with course activities (3.22 mean).12 This is in direct contrast to faculty perceptions reported in an earlier study, where 65 percent of faculty reported they perceived that students spend more time engaged with course materials
  • Only 12.7 percent said the most valuable benefit was improved learning; 3.7 percent perceived no benefit whatsoever. Note that students could only select one response, so more than 12.7 percent may have felt learning was improved, but it was not ranked highest. These findings compare favorably with a study done by Douglas Havelka at the University of Miami in Oxford, Ohio, who identified the top six benefits of the current implementation of IT as improving work efficiency, affecting the way people behave, improving communications, making life more convenient, saving time, and improving learning ability.14
    • Barbara Lindsey
       
      Would have been good to know exactly what kinds of technologies were meant here.
  • Our data suggest that we are at best at the cusp of technologies being employed to improve learning.
  • The interactive features least used by faculty were the features that students indicated contributed the most to their learning.
  • he students in this study called our attention to performance by noting an uneven diffusion of innovation using this technology. This may be due, in part, to faculty or student skill. It may also be due to a lack of institutional recognition of innovation, especially as the successful use of course management systems affects or does not affect faculty tenure, promotion, and merit decisions
  • we found that many of the students most skilled in the use of technology had mixed feelings about technology in the classroom.
  • What we found was that many necessary skills had to be learned at the college or university and that the motivation for doing so was very much tied to the requirements of the curriculum. Similarly, the students in our survey had not gained the necessary skills to use technology in support of academic work outside the classroom. We found a significant need for further training in the use of information technology in support of learning and problem-solving skills.
  • Course management systems were used most by both faculty and students for communication of information and administrative activities and much less in support of learning.
  • In 1997, Michael Hooker proclaimed, "higher education is on the brink of a revolution." Hooker went on to note that two of the greatest challenges our institutions face are those of "harnessing the power of digital technology and responding to the information revolution."18 Hooker and many others, however, did not anticipate the likelihood that higher education's learning revolution would be a journey of a thousand miles rather than a discrete event. Indeed, a study of learning's last great revolution—the invention of moveable type—reveals, too, a revolution conducted over centuries leading to the emergence of a publishing industry, intellectual property rights law, the augmentation of customized lectures with textbooks, and so forth.
  • Both the ECAR study on faculty use of course management systems and this study of student experiences with information technology concluded that, while information technology is indeed making important inroads into classroom and learning activities, to date the effects are largely in the convenience of postsecondary teaching and learning and do not yet constitute a "learning revolution." This should not surprise us. The invention of moveable type enhanced, nearly immediately, access to published information and reduced the time needed to produce new publications. This invention did not itself change literacy levels, teaching styles, learning styles, or other key markers of a learning revolution. These changes, while catalyzed by the new technology, depended on slower social changes to institutions. I believe that is what we are witnessing in higher education today.
  • The institutions chosen represent a nonrepresentative mix of the different types of higher education institution in the United States, in terms of Carnegie class as well as location, source of funding, and levels of technology emphasis. Note, however, that we consider our findings to be instructive rather than conclusive of student experiences at different types of Carnegie institutions.
  • Qualitative data were collected by means of focus groups and individual interviews. We interviewed undergraduate students, administrators, and individuals identified as experts in the field of student technology use in the classroom. Student focus groups and interviews of administrators were conducted at six of the thirteen schools participating in the study.
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

ESU professor suspended for comments made on Facebook page | PoconoRecord.com - 0 views

  • these comments are actually published material that can be preserved, spread beyond the intended audience and interpreted in ways users never intended.
  • An East Stroudsburg University sociology professor has been suspended for venting her workplace frustration on her Facebook page.
  • Gadsden, who only recently started her Facebook account, has 32 "friends," including friends, relatives and colleagues. She said she has no students among her Facebook friends. She was unsure how her messages wound up at ESU's provost's office.
  • ...1 more annotation...
  • The Facebook incident also points out how our off-hand musings cannot be considered private in the age of social networking,
suzanne ondrus

Social Media in Africa, Part 2: Mobile Innovations - ReadWriteWeb - 1 views

  • social media technology conference PICNIC2008
  • conference featured prolific social entrepreneurs and technology developers from around the world who offered insight into various projects from the African continent.
  • Africa is unique in that it seems to have bypassed the same era of community infrastructure building that has occurred in developed nations around the world.
  • ...8 more annotations...
  • most of the technologies that currently permeate Africa aren't terrestrial. There are very few telephone lines, but mobile penetration is higher than any other region in the world.
  • Instead, internet connectivity is distributed nearly entirely by satellite.
  • The developers who are coming up with solutions in the continent, the ones who are writing software or hacking hardware, are creating for some of the harshest environments and use-cases in the world. If it works in Africa, it will work anywhere."
    • suzanne ondrus
       
      The word "developers" could also be "capitalists." Again, I don't see why cell phones are so expensive in Benin & Burkina Faso!!
  • Perhaps this thought is what motivated Google to invest in O3B Networks earlier this month. O3B Networks is an ambitious attempt to bring three billion people in the developing world (mainly in parts of Asia and Africa) online by launching sixteen inexpensive, low-orbit satellites. The potential benefits for Google are obvious. This is three billion new internet users, who will more than likely use Google to search, and who will potentially click-through Adsense links and use other Google products. An indicator that Google may be anticipating as much is their move into Africa last year. They've since opened offices and hired people in both South Africa and Kenya with plans to eventually operate out of all sub-Saharan African countries.
  • At the end of 2007 there were over 280 million mobile phone subscribers in Africa, representing a penetration rate of 30.4% Africa has become the fastest growing mobile market in the world with mobile penetration in the region ranging from 30% to 100% from country to country. Fastest growing markets are in Nigeria, South Africa and Egypt
  • The Democratic Republic of Congo, population 60 million, has 10,000 fixed telephones but more than a million mobile phone subscribers. In Chad, the fifth-least developed country, mobile phone usage jumped from 10,000 to 200,000 in three years.
  • Micro-payments and Mobile Banking
  • Mobile News Reporting
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

Virtual and Artificial, but 58,000 Want Course - NYTimes.com - 0 views

  • The rapid increase in the availability of high-bandwidth Internet service, coupled with a wide array of interactive software, has touched off a new wave of experimentation in education.
  • Dr. Widom said she had recorded her video lectures during the summer and would use classroom sessions to work with smaller groups of students on projects that might be competitive and to bring in people from the industry to give special lectures. Unlike the A.I. course, this one will compare online students with one another and not with the Stanford students.
  • In place of office hours, they will use the Google moderator service, software that will allow students to vote on the best questions for the professors to respond to in an online chat and possibly video format. They are considering ways to personalize the exams to minimize cheating.
  • ...1 more annotation...
  • “The idea that you could put up open content at all was risky 10 years ago, and we decided to be very conservative,” he said. “Now the question is how do you move into something that is more interactive and collaborative, and we will see lots and lots of models over the next four or five years.”
Barbara Lindsey

When college students reinvent the world - CSMonitor.com - 0 views

  • He saw students pouring energy into memorizing bits of information that he knew they’d later forget. So he structured the rest of the syllabus around creating the simulation. Now he gets rid of about 40 percent of the rules of the game each semester so that students have to come up with new rules to determine how the interactions will play out. “The most learning happens there,” he says.
  • World Sim materials go up on a class “wiki,” a collection of Web pages that professor and students edit. Building new-media literacy is one of Wesch’s goals. Very few students arrive at his class knowing how to use digital tools such as wikis.
  • “There’s nothing more important than loving your students,” Wesch says, his office full of props from the simulation. “Before I lecture I start getting nervous ... so I meditate on this idea of ‘Love your students.’“It completely displaces all of that anxiety, because you recognize, it’s not about me, it’s about them.”
1 - 20 of 20
Showing 20 items per page