Skip to main content

Home/ beyondwebct/ Group items tagged posts

Rss Feed Group items tagged

Barbara Lindsey

A Brief Interview with Michael Wesch (The Creator of That Wonderful Video...) - John Ba... - 0 views

  • The Web speeds up the process of rebuttal, reply, and revision and calls forth a different approach. The radically collaborative technologies emerging on the Web create the possibility for doing scholarship in the mode of conversation rather than argument, or to transform the argument as war metaphor into something that suggests collaboration rather than combat. Personally, I prefer the metaphor of the dance and that we are all here in this webscape dancing and playing around with ideas. The best dancers are those that find a way to “lose themselves” in the music – pushing the limits of the dance without fear of tripping or falling because they know that it is all part of the dance.
  • On the next 10-20 years and social networking ... I think this will greatly depend on the structure of those social networking tools and what kinds of communication are made possible with these tools. For example, on Facebook there are “walls” and “discussion groups.” Both of these sections are for human communication, but they are structured differently and therefore elicit different kinds of conversations. Furthermore, they are used in ways beyond how they were intended. Even now, as I am answering multiple questions with one long comment at the bottom of a blog post, the structure of the medium is in some way affecting how I am responding. On a forum I would address each question individually in separate threads. These seemingly minor differences are important because all human relationships are mediated by communication.
    • Barbara Lindsey
       
      "All human relationships are mediated by communication."
  • if there is a global village, it is not a very equitable one, and if there is a tragedy of our times, it may be that we are all interconnected but we fail to see it and take care of our relationships with others. For me, the ultimate promise of digital technology is that it might enable us to truly see one another once again and all the ways we are interconnected. It might help us create a truly global view that can spark the kind of empathy we need to create a better world for all of humankind.
  • ...2 more annotations...
  • First, everything including the environment, technology, economy, social structure, politics, religion, art and more are all interconnected. As I tried to illustrate in the video, this means that a change in one area (such as the way we communicate) can have a profound effect on everything else, including family, love, and our sense of being itself.
  • wanted to show people how digital technology has evolved and give them a sense of where it might be going and to give some momentum to the all-important conversation about the consequences of that on our global society.
  •  
    Michael Wesch explains the purpose of his video, The Machine is Us/ing Us
Barbara Lindsey

Tweeting the terror: How social media reacted to Mumbai - CNN.com - 0 views

  • One tweet from "Dupree" appeared to be coming from inside one of the hotels: "Mumbai terrorists are asking hotel reception for rooms of American citizens and holding them hostage on one floor." A group of Mumbai-based bloggers turned their Metroblog into a news wire service, while the blog MumbaiHelp offered to help users get through to their family and friends in the city, or to get information about them, and has had a number of successes. Flickr also proved a useful source of haunting images chronicling the aftermath of the attacks. Journalist Vinukumar Ranganathan's stream of photos were published by CNN and other major broadcasters. iReport.com: Are you there? Share your photos, videos and stories A Google Map showing the key locations and buildings with links to news stories and eyewitness accounts, and CNN's iReporters flooded the site with their videos and images of the terror attacks.
  • However, as is the case with such widespread dissemination of information, a vast number of the posts on Twitter amounted to unsubstantiated rumors and wild inaccuracies. For example, a rumor that the Indian government was asking tweeters to stop live updates to avoid compromising its security efforts was published and republished on the site.
  • As blogger Tim Mallon put it, "I started to see and (sic) ugly side to Twitter, far from being a crowd-sourced version of the news it was actually an incoherent, rumour-fueled mob operating in a mad echo chamber of tweets, re-tweets and re-re-tweets.
  • ...1 more annotation...
  • What is clear that although Twitter remains a useful tool for mobilizing efforts and gaining eyewitness accounts during a disaster, the sourcing of most of the news cannot be trusted. A quick trawl through the enormous numbers of tweets showed that most were sourced from mainstream media. Someone tweets a news headline, their friends see it and retweet, prompting an endless circle of recycled information
  •  
    Neha Viswanathan, a former regional editor for Southeast Asia and a volunteer at Global Voices, told CNN, "Even before I actually heard of it on the news I saw stuff about this on Twitter.
Karen Zook

Living Epic: Video Games in the Ancient World: Pedagogical practomime - 0 views

    • Karen Zook
       
      This is a great resource for a rundown of practomimetic instruction.
    • Barbara Lindsey
       
      Thanks, Karen! I think I am still going to need some help understanding parts of this post.
Barbara Lindsey

Twitter EDU - Daily-Ink & Pair-a-dimes un-post-ed - 0 views

  •  
    How to successfully dip your toe into using twitter as an educator
Barbara Lindsey

A Difference: Flickring Mind Maps ... making learning sticky - 0 views

  • If the school division didn't have a filter this project could have started more safely.
  • I expect a lot of deep learning to come out of this. This assignment is being marked for completion only; if it's done they get 100%, if not they get 0%
  • I characterize this as assessment for learning.
  • ...8 more annotations...
  • there must be a minimum of 5 public pictures in the account in order to start this review process.
  • If they are real pictures, the public photos in the account are added to the pool of pictures in flickr searches and RSS feeds.
  • In the course of looking for the pictures and creating the annotated hot spots they will be thinking about the material covered in a new way and strengthening the mental links to the concepts they have learned. I hope to make their learning sticky.
  • reating digital mind maps of the material we learned way back at the beginning of the semester.
  • At exam time they can review all the annotated pictures in the pool made by themselves and their classmates. They will be teaching and learning from each other.
  • They can use the pictures in projects, assignments and blog posts. I will also be able to use them the next time I teach the course to benefit the next group of students. They will be teaching people they have never met. They are also building a permanent resource collection.
  • They are talking to other students and teachers in the building about this. A buzz is growing. Can you imagine the conversations they are having at home? They are involving their families and friends in their learning.
  • As pictures began to come up in public searches on flickr for each of the unique course tags, I created a flickr badge (you'll have to "sign in" to follow that link) for each class. I put it in each blog's sidebar under the heading "Our Math Photo Gallery." The engine behind the badges is the RSS feed associated with each unique course tag. Flickr generates these RSS feeds automatically.
Barbara Lindsey

Toolbox or Trap? Course Management Systems and Pedagogy (EDUCAUSE Quarterly) | EDUCAUSE... - 0 views

  • Campuses have adopted these programs on a wide scale, yet few studies have looked at how the design and use of a CMS affects pedagogy, and instructors rarely discuss how a CMS affects their teaching.
    • Barbara Lindsey
       
      Discuss in class.
  • Decisions about which learning software to use on campus are often made by campus technologists and administrators rather than faculty.
    • Barbara Lindsey
       
      Not surprisingly, this also is the case at UCONN.
  • The construction of the course syllabus, a natural beginning point for most instructors, is a good example of how the software imposes limitations. When they first enter a CMS, new instructors see the default buttons of the course menu, which are based on type rather than purpose: Announcements, Course Content, Discussion, even Syllabus.
  • ...8 more annotations...
  • The default organization of the CMS forces them to think in terms of content types instead, breaking the natural structure of the semester.
  • In addition to a counterintuitive organizational scheme, integrated commercial systems have a built-in pedagogy, evident in the easiest-to-use, most accessible features. The focus on presentation (written documents to read), complemented by basic "discussion" input from students, is based on traditional lecture, review, and test pedagogy. This orientation is very different from the development of knowledge through a constructivist, learner-centered, or inquiry-based approach, which a number of faculty use successfully in the classroom.
  • But at the novice level, the system simply does not encourage such customization. To be able to modify the CMS to employ alternative teaching methods, instructors must have a well-developed sense of what is possible in the online environment before approaching the course design process—a perspective many do not have when they first start teaching online. When presented with a list of options, most people typically choose one option rather than question the list itself.
  • Most faculty do not use the web either extensively or intensively in their own work, and those who aren't "into technology" will quickly find themselves overwhelmed by a CMS.
  • Even after several years of working with a CMS, faculty requests for help tend to focus on what the technology can do rather than how their teaching and learning goals can be achieved.
    • Barbara Lindsey
       
      Important distinction.
  • An instructor seeking an easy way to post word-processed documents, enter grades, receive papers and assignments through a digital dropbox, and run a traditional threaded discussion board will tend to show great satisfaction with using a CMS.4 Those who tax the system more, and use the most complex features, show lower levels of satisfaction. In addition, after spending months creating material and quizzes in a proprietary system, faculty rightly panic at the idea of "moving everything" to another system. The big systems simply do not allow for easy export, and no one wants to do all that work over again. It is much easier to simply declare satisfaction with things the way they are.
  • There are, of course, alternatives to these hampering systems, and you don't have to be a programmer or Internet expert to use them.
  • Web 2.0 applications that encourage social construction of knowledge (Wikispaces, BubbleShare, Ning) are freely available and may provide more creative instructors with better options than any LMS currently available. Such programs make possible the creation of one's own mini-CMS, cobbled together out of programs that fit with the instructor's methodology. In these cases, pedagogy comes first—the tools can be used to build the courses we want to teach.
  •  
    Discuss this in class
Barbara Lindsey

Pontydysgu - Bridge to Learning » Blog Archive » Learners can use technologie... - 0 views

  • “First-year student Chris Avenir is fighting charges of academic misconduct for helping run an online chemistry study group via Facebook last term, where 146 classmates swapped tips on homework questions that counted for 10 per cent of their mark.
  • using Facebook to talk about schoolwork, when actually it’s no different than any study group working together on homework in a library,” said Neale.
  • if I post a question about physics homework on my friend’s wall (a Facebook bulletin board) and ask if anyone has any ideas how to approach this – and my prof sees this, am I cheating?” said Neale, who has used Facebook study groups herself.”
  • ...2 more annotations...
  • if this kind of help is cheating, then so is tutoring and all the mentoring programs the university runs and the discussions we do in tutorials.
  • every survey of employers suggests that the ability to work as part of a team is both one of the most sought after competencies and one which they feel is not being taught by the education system.
Barbara Lindsey

Dr. Mashup; or, Why Educators Should Learn to Stop Worrying and Love the Remix | EDUCAU... - 0 views

  • A classroom portal that presents automatically updated syndicated resources from the campus library, news sources, student events, weblogs, and podcasts and that was built quickly using free tools.
  • Increasingly, it's not just works of art that are appropriated and remixed but the functionalities of online applications as well.
  • mashups involve the reuse, or remixing, of works of art, of content, and/or of data for purposes that usually were not intended or even imagined by the original creators.
  • ...31 more annotations...
  • hat, exactly, constitutes a valid, original work? What are the implications for how we assess and reward creativity? Can a college or university tap the same sources of innovative talent and energy as Google or Flickr? What are the risks of permitting or opening up to this activity?
    • Barbara Lindsey
       
      Good discussion point
  • Remix is the reworking or adaptation of an existing work. The remix may be subtle, or it may completely redefine how the work comes across. It may add elements from other works, but generally efforts are focused on creating an alternate version of the original. A mashup, on the other hand, involves the combination of two or more works that may be very different from one another. In this article, I will apply these terms both to content remixes and mashups, which originated as a music form but now could describe the mixing of any number of digital media sources, and to data mashups, which combine the data and functionalities of two or more Web applications.
  • Harper's article "The Ecstasy of Influence," the novelist Jonathan Lethem imaginatively reviews the history of appropriation and recasts it as essential to the act of creation.3
  • Lethem's article is a must-read for anyone with an interest in the history of ideas, creativity, and intellectual property. It brilliantly synthesizes multiple disciplines and perspectives into a wonderfully readable and compelling argument. It is also, as the subtitle of his article acknowledges, "a plagiarism." Virtually every passage is a direct lift from another source, as the author explains in his "Key," which gives the source for every line he "stole, warped, and cobbled together." (He also revised "nearly every sentence" at least slightly.) Lethem's ideas noted in the paragraph above were appropriated from Siva Vaidhyanathan, Craig Baldwin, Richard Posner, and George L. Dillon.
  • Reading Walter Benjamin's highly influential 1936 essay "The Work of Art in the Age of Mechanical Reproduction,"4 it's clear that the profound effects of reproductive technology were obvious at that time. As Gould argued in 1964 (influenced by theorists such as Marshall McLuhan5), changes in how art is produced, distributed, and consumed in the electronic age have deep effects on the character of the art itself.
  • Yet the technology developments of the past century have clearly corresponded with a new attitude toward the "aura" associated with a work of invention and with more aggressive attitudes toward appropriation. It's no mere coincidence that the rise of modernist genres using collage techniques and more fragmented structures accompanied the emergence of photography and audio recording.
  • Educational technologists may wonder if "remix" or "content mashup" are just hipper-sounding versions of the learning objects vision that has absorbed so much energy from so many talented people—with mostly disappointing results.
  • The question is, why should a culture of remix take hold when the learning object economy never did?
  • when most learning object repositories were floundering, resource-sharing services such as del.icio.us and Flickr were enjoying phenomenal growth, with their user communities eagerly contributing heaps of useful metadata via simple folksonomy-oriented tagging systems.
  • the standards/practices relationship implicit in the learning objects model has been reversed. With only the noblest of intentions, proponents of learning objects (and I was one of them) went at the problem of promoting reuse by establishing an arduous and complex set of interoperability standards and then working to persuade others to adopt those standards. Educators were asked to take on complex and ill-defined tasks in exchange for an uncertain payoff. Not surprisingly, almost all of them passed.
  • Discoverable Resources
  • Educators might justifiably argue that their materials are more authoritative, reliable, and instructionally sound than those found on the wider Web, but those materials are effectively rendered invisible and inaccessible if they are locked inside course management systems.
  • It's a dirty but open secret that many courses in private environments use copyrighted third-party materials in a way that pushes the limits of fair use—third-party IP is a big reason why many courses cannot easily be made open.
  • The potential payoff for using open and discoverable resources, open and transparent licensing, and open and remixable formats is huge: more reuse means that more dynamic content is being produced more economically, even if the reuse happens only within an organization. And when remixing happens in a social context on the open web, people learn from each other's process.
  • Part of making a resource reusable involves making the right choices for file formats.
  • To facilitate the remixing of materials, educators may want to consider making the source files that were used to create a piece of multimedia available along with the finished result.
  • In addition to choosing the right file format and perhaps offering the original sources, another issue to consider when publishing content online is the critical question: "Is there an RSS feed available?" If so, conversion tools such as Feed2JS (http://www.feed2JS.org) allow for the republication of RSS-ified content in any HTML Web environment, including a course management system, simply by copying and pasting a few lines of JavaScript code. When an original source syndicated with RSS is updated, that update is automatically rendered anywhere it has been republished.
  • Jack Schofield
  • Guardian Unlimited
  • "An API provides an interface and a set of rules that make it much easier to extract data from a website. It's a bit like a record company releasing the vocals, guitars and drums as separate tracks, so you would not have to use digital processing to extract the parts you wanted."1
  • What's new about mashed-up application development? In a sense, the factors that have promoted this approach are the same ones that have changed so much else about Web culture in recent years. Essential hardware and software has gotten more powerful and for the most part cheaper, while access to high-speed connectivity and the enhanced quality of online applications like Google Docs have improved to the point that Tim O'Reilly and others can talk of "the emergent Internet operating system."15 The growth of user-centered technologies such as blogs have fostered a DIY ("do it yourself") culture that increasingly sees online interaction as something that can be personalized and adapted on the individual level. As described earlier, light syndication and service models such as RSS have made it easier and faster than ever to create simple integrations of diverse media types. David Berlind, executive editor of ZDNet, explains: "With mashups, fewer technical skills are needed to become a developer than ever. Not only that, the simplest ones can be done in 10 or 15 minutes. Before, you had to be a pretty decent code jockey with languages like C++ or Visual Basic to turn your creativity into innovation. With mashups, much the same way blogging systems put Web publishing into the hands of millions of ordinary non-technical people, the barrier to developing applications and turning creativity into innovation is so low that there's a vacuum into which an entire new class of developers will be sucked."16
  • The ability to "clone" other users' mashups is especially exciting: a newcomer does not need to spend time learning how to structure the data flows but can simply copy an existing framework that looks useful and then make minor modifications to customize the result.19
    • Barbara Lindsey
       
      This is the idea behind the MIT repository--remixing content to suit local needs.
  • As with content remixing, open access to materials is not just a matter of some charitable impulse to share knowledge with the world; it is a core requirement for participating in some of the most exciting and innovative activity on the Web.
  • "My Maps" functionality
  • For those still wondering what the value proposition is for offering an open API, Google's development process offers a compelling example of the potential rewards.
    • Barbara Lindsey
       
      Wikinomics
  • Elsewhere, it is difficult to point to significant activity suggesting that the mashup ethos is taking hold in academia the way it is on the wider Web.
  • Yet for the most part, the notion of the data mashup and the required openness is not even a consideration in discussions of technology strategy in higher educational institutions. "Data integration" across campus systems is something that is handled by highly skilled professionals at highly skilled prices.
  • Revealing how a more adventurous and inclusive online development strategy might look on campus, Raymond Yee recently posted a comprehensive proposal for his university (UC Berkeley), in which he outlined a "technology platform" not unlike the one employed by Amazon.com (http://aws.amazon.com/)—resources and access that would be invaluable for the institution's programmers as well as for outside interests to build complementary services.
  • All too often, college and university administrators react to this type of innovation with suspicion and outright hostility rather than cooperation.
  • those of us in higher education who observe the successful practices in the wider Web world have an obligation to consider and discuss how we might apply these lessons in our own contexts. We might ask if the content we presently lock down could be made public with a license specifying reasonable terms for reuse. When choosing a content management system, we might consider how well it supports RSS syndication. In an excellent article in the March/April 2007 issue of EDUCAUSE Review, Joanne Berg, Lori Berquam, and Kathy Christoph listed a number of campus activities that could benefit from engaging social networking technologies.26
  • What might happen if we allow our campus innovators to integrate their practices in these areas in the same way that social networking application developers are already integrating theirs? What is the mission-critical data we cannot expose, and what can we expose with minimal risk? And if the notion of making data public seems too radical a step, can APIs be exposed to selected audiences, such as on-campus developers or consortia partners?
Barbara Lindsey

Print: The Chronicle: 6/15/2007: The New Metrics of Scholarly Authority - 0 views

    • Barbara Lindsey
       
      Higher ed slow to respond.
  • Web 2.0 is all about responding to abundance, which is a shift of profound significance.
  • Chefs simply couldn't exist in a world of universal scarcity
  • ...33 more annotations...
  • a time when scholarship, and how we make it available, will be affected by information abundance just as powerfully as food preparation has been.
  • Scholarly communication before the Internet required the intermediation of publishers. The costliness of publishing became an invisible constraint that drove nearly all of our decisions. It became the scholar's job to be a selector and interpreter of difficult-to-find primary and secondary sources; it was the scholarly publisher's job to identify the best scholars with the best perspective and the best access to scarce resources.
    • Barbara Lindsey
       
      Comments?
  • Online scholarly publishing in Web 1.0 mimicked those fundamental conceptions. The presumption was that information scarcity still ruled. Most content was closed to nonsubscribers; exceedingly high subscription costs for specialty journals were retained; libraries continued to be the primary market; and the "authoritative" version was untouched by comments from the uninitiated. Authority was measured in the same way it was in the scarcity world of paper: by number of citations to or quotations from a book or article, the quality of journals in which an article was published, the institutional affiliation of the author, etc.
  • Google
  • Google
    • Barbara Lindsey
       
      Where critical analysis comes in
  • The challenge for all those sites pertains to abundance:
  • Such systems have not been framed to confer authority, but as they devise means to deal with predators, scum, and weirdos wanting to be a "friend," they are likely to expand into "trust," or "value," or "vouching for my friend" metrics — something close to authority — in the coming years.
  • ecently some more "authoritative" editors have been given authority to override whining ax grinders.
  • In many respects Boing Boing is an old-school edited resource. It doesn't incorporate feedback or comments, but rather is a publication constructed by five editor-writers
  • As the online environment matures, most social spaces in many disciplines will have their own "boingboings."
  • They differ from current models mostly by their feasible computability in a digital environment where all elements can be weighted and measured, and where digital interconnections provide computable context.
  • In the very near future, if we're talking about a universe of hundreds of billions of documents, there will routinely be thousands, if not tens of thousands, if not hundreds of thousands, of documents that are very similar to any new document published on the Web. If you are writing a scholarly article about the trope of smallpox in Shakespearean drama, how do you ensure you'll be read? By competing in computability. Encourage your friends and colleagues to link to your online document. Encourage online back-and-forth with interested readers. Encourage free access to much or all of your scholarly work. Record and digitally archive all your scholarly activities. Recognize others' works via links, quotes, and other online tips of the hat. Take advantage of institutional repositories, as well as open-access publishers. The list could go on.
  • the new authority metrics, instead of relying on scholarly publishers to establish the importance of material for them.
  • They need to play a role in deciding not just what material will be made available online, but also how the public will be allowed to interact with the material. That requires a whole new mind-set.
  • cholarly publishers
  • Many of the values of scholarship are not well served yet by the Web: contemplation, abstract synthesis, construction of argument.
  • Traditional models of authority will probably hold sway in the scholarly arena for 10 to 15 years, while we work out the ways in which scholarly engagement and significance can be measured in new kinds of participatory spaces.
  • if scholarly output is locked away behind fire walls, or on hard drives, or in print only, it risks becoming invisible to the automated Web crawlers, indexers, and authority-interpreters that are being developed. Scholarly invisibility is rarely the path to scholarly authority.
  • Web 1.0,
  • garbed new business and publishing models in 20th-century clothes.
  • fundamental presumption is one of endless information abundance.
  • Flickr, YouTube
  • micromarkets
  • multiple demographics
  • Abundance leads to immediate context and fact checking, which changes the "authority market" substantially. The ability to participate in most online experiencesvia comments, votes, or ratingsis now presumed, and when it's not available, it's missed.
  • Google interprets a link from Page A to Page B as a vote, by Page A, for Page B. But, Google looks at more than the sheer volume of votes, or links a page receives; for example, it also analyzes the page that casts the vote. Votes cast by pages that are themselves 'important' weigh more heavily and help to make other pages 'important,'"
  • It has its limits, but it also both confers and confirms authority because people tend to point to authoritative sources to bolster their own work.
  • That kind of democratization of authority is nearly unique to wikis that are group edited, since not observation, but active participation in improvement, is the authority metric.
  • user-generated authority, many of which are based on algorithmic analysis of participatory engagement. The emphasis in such models is often not on finding scarce value, but on weeding abundance
  • Authority 3.0 will probably include (the list is long, which itself is a sign of how sophisticated our new authority makers will have to be): Prestige of the publisher (if any). Prestige of peer prereviewers (if any). Prestige of commenters and other participants. Percentage of a document quoted in other documents. Raw links to the document. Valued links, in which the values of the linker and all his or her other links are also considered. Obvious attention: discussions in blogspace, comments in posts, reclarification, and continued discussion. Nature of the language in comments: positive, negative, interconnective, expanded, clarified, reinterpreted. Quality of the context: What else is on the site that holds the document, and what's its authority status? Percentage of phrases that are valued by a disciplinary community. Quality of author's institutional affiliation(s). Significance of author's other work. Amount of author's participation in other valued projects, as commenter, editor, etc. Reference network: the significance rating of all the texts the author has touched, viewed, read. Length of time a document has existed. Inclusion of a document in lists of "best of," in syllabi, indexes, and other human-selected distillations. Types of tags assigned to it, the terms used, the authority of the taggers, the authority of the tagging system.
  • Most technophile thinkers out there believe that Web 3.0 will be driven by artificial intelligences — automated computer-assisted systems that can make reasonable decisions on their own, to preselect, precluster, and prepare material based on established metrics, while also attending very closely to the user's individual actions, desires, and historic interests, and adapting to them.
  •  
    When the system of scholarly communications was dependent on the physical movement of information goods, we did business in an era of information scarcity. As we become dependent on the digital movement of information goods, we find ourselves entering an era of information abundance. In the process, we are witnessing a radical shift in how we establish authority, significance, and even scholarly validity. That has major implications for, in particular, the humanities and social sciences.
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

Podcast263: Technology Shopping Cart Podcast07 - iPhone Web Apps and Poll Eve... - 0 views

    • Barbara Lindsey
       
      How many rss options can you find on this post?
  •  
    Wes Fryer and Karen Montgomery podcast with links focused on mobile ed apps like poll everywhere. Part 2 of 3 part series
Barbara Lindsey

EC&I 831 - 1 views

  • The goals of this course follow. Participants will: better understand the historical role technology and media have played in educational & social change; become knowledgeable of social learning tools & FLOSS (Free/Libre and Open Source Software) as tools for teaching, facilitating learning, & designing educational environments; become familiar with the wealth of open educational resources (OERs), learning-related content, & media available for teaching & learning; become knowledgeable of relevant social learning theories and philosophies that respond to learning in the digital age; better understand the many social, educational, political, cultural, and administrative issues often associated with technology & media in education and society; become critical consumers and producers of digital media and information; and, build sustainable, personal learning environments and networks.
  • A significant portion of the course learning will happen outside of the scheduled, synchronous sessions. Participants will gain experience in social learning processes such as: writing reflective blog posts, commenting on participant blogs, reading and commenting on educational blogs from outside of the course, microblogging, reading and exploring other educational technology and learning-focused media, exploring social learning tools, and creating educational media.
  •  
    Couros Course on Social Media & Open Education "Open, Connected, Social" this course is open to credit and not-for-credit' students and features synchronous discussions via Elluminate and asynchronous work via microblogging, blogging, and the creation of digital content.
Barbara Lindsey

Web Site Allows Students to Rate Professors : NPR - 0 views

  • I even go so far as sending my students the link to my rating. That way they can do it and I'm making it easy for them to do. That's when the site becomes useful, because in the aggregate you can look at how that professor performed.
  • She sees negative comments as opportunities to improve her teaching. Most students post to the site unprompted by their teachers, and a lot of them go there to talk smack.
  • My mother could be rating me. My worst enemy could be rating me. I could be rating myself. My colleague with a grudge against me could be rating me. And that called into question the whole legitimacy of the site.
Barbara Lindsey

Google Profiles, Online Reputation Management, and Digital Footprints « Movin... - 0 views

  •  
    Data Privacy Day and Internet Safety for Kids « Technical and Marketing Communication: Content for a Convergent World
Celeste Arrieta

Wordle as a reading comprehension tool? - Middle School Portal - 1 views

  • I came across Wordle some time ago, thought it was pretty nifty, and then forgot about it. An article in the August 2009 issue of Learning & Leading with Technology ("Words in a Cloud" by Samantha Morra) made me reflect on the power of this fun tool. In the article, Morra describes using Wordle with her middle school students to visually analyze important documents, such as the Declaration of Independence. I began thinking about science and math class and wondered if the tool might help students identify the main concepts of a passage. However, I don't have access to any middle school textbooks to test this out!
  • If you want to use it as a pre-reading activity, copy and paste your text (or type a few paragraphs) into wordle to create the word cloud. The size of the words indicates the frequency of their use in the text. In essence, major concepts/terms will show up bigger than others. Have students create a prediction about the reading based on what appears in the word cloud.
  • If you want to use it as a post-reading activity, I have had students keep a running list of words that jump out at them while reading a particular passage (or you can give them a more specific purpose for selecting words). Then, they create their own word clouds. It's a nice formative assessment for teachers to see what students are noticing while reading (or NOT noticing...).
  • ...1 more annotation...
  • I have also asked students to write a beginning of the year letter to me about themselves. We then "wordle" the letter and print the graphic. I hang the graphics on the wall of the classrooms to show a snapshot of the different people in the class.
Celeste Arrieta

Consensus: Podcasting Has No 'Inherent' Pedagogic Value -- Campus Technology - 1 views

  • "Podcasting does not contain any inherent value. It is only valuable inasmuch as it helps the instructor and students reach their educational goals, by facilitating thoughtful, engaging learning activities that are designed to work in support of those goals."
    • Barbara Lindsey
       
      You are on a job interview. You've been asked if and how you would use podcasting with your students. How would you respond?
    • Inas Ayyoub
       
      As a language teacher , I would highly be interested in using podcasting with my students. The point here comes to not only ask students to download certain podcasts to repeat words and have an all time accessable materials to improve pronunciation and study vocabs. The ability to link what students listen to on the podcasts with post activities to be performed in the classroom that help them even go beyond what that podcast has to offer, is one key to do that. So, using podcasting hould be highly planned and integrated in a way that serves our desired outcomes that will lead at the end to empower students to create or add podcasts that serve that as well.
    • Barbara Lindsey
       
      Inas-this is a wonderful example of extending the learning outside the classroom and then bringing it back into the classroom to reinforce and advance students' competencies. If you were on an interview, you might want to give a specific example. Could you think of one?
    • Celeste Arrieta
       
      ...and how the tool is connected to the class goal so it can be meaningful for the learning experience. Personally, I used them frequently as "realia" sources to develop other activities.
    • Celeste Arrieta
       
      I can't find my sticky notes for this web site. I did it 3 times. If you can see any of them, please let me know. Thanks
  • ...1 more annotation...
  • "The answer to that question depends entirely on the educational context, including goals and appropriate learning activities, and on how the tool is implemented,"
    • Celeste Arrieta
       
      ...and how the tool is connected to the class goal so it can be meaningful for the learning experience. Personally, I used them frequently as "realia" sources to develop other activities.
Barbara Lindsey

Engaging Students with Interactive Technology-Special Guest: Adora Svitak - Classroom 2... - 0 views

  •  
    Session led by 12 year old Adora Svitak
Barbara Lindsey

Library of Congress to archive your tweets - CNN.com - 0 views

  • Examples of notable tweets the library cited Wednesday include the first-ever tweet from Twitter co-founder Jack Dorsey, the tweet on Barack Obama's account after he won the 2008 election and a pair of tweets from a photojournalist who was arrested in Egypt, then freed after a series of events stemming from his use of the micro-blogging site.
  • "And I think folks understand that whatever they post on Twitter is meant to be searchable. So I don't see a big issue here." Verdi said he would feel differently if the federal government seeks to identify users through their tweets or to match Twitter users with other information about citizens that is stored in federal databases.
« First ‹ Previous 81 - 100 of 125 Next › Last »
Showing 20 items per page