Skip to main content

Home/ beyondwebct/ Group items tagged ruling

Rss Feed Group items tagged

Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

Education Week: Districts Embracing Online Credit-Recovery Options - 0 views

  •  
    Interest in online credit-recovery courses continues to surge, prompting some policy experts and educators to consider whether traditional rules requiring students to spend a certain number of hours in the classroom, rather than simply demonstrate their proficiency in the subject matter, are increasingly outdated.
Barbara Lindsey

10 Rules of Teaching in this Century -- Campus Technology - 0 views

  • the knowledge developed during the course does not pre-exist the course. Second, since the knowledge of the course does not exist before the course (because you and the students develop the knowledge during the course), your chief challenge is to manage the process of knowledge discovery.
  • Now, because learning resources and opportunities are infinite, make the move: Donโ€™t just tell students the key knowledge in your field, but help them discover it through problem-based active learning. Change your curriculum from a list of what you will say to a list of essential problems (or questions) that students will address, with your guidance, throughout the semester.
  • It may well be better to re-state learning outcomes in terms of essential problems and the research associated with those essential problems, and build rubrics based on the problems within a problem-based learning structure.
  • ...3 more annotations...
  • Move most assessment activity away from testing and toward evaluation of student evidence of learning.
  • In the new paradigm of active and varied learning, testing is less appropriate but assessing student evidence is more appropriate.
  • You, as a faculty member, must be as adept as your students in using Web-based applications, and there is no better way to learn the new breed of applications than to use them yourself for important professional purposes.
  •  
    Talks about how we now can really walk the walk and have a learner-centered environment and the technologies nec. to support that.
Barbara Lindsey

Education Week: Science Grows on Acquiring New Language - 0 views

  • For example, when babies born to native-English-speaking parents played three times a week during that window with a native-Mandarin-speaking tutor, at 12 months, they had progressed in their ability to recognize both English and Mandarin sounds, rather than starting to retrench in the non-native language. By contrast, children exposed only to audio or video recordings of native speakers showed no change in their language trajectory. Brain-imaging of the same children backed up the results of test-based measures of language specialization.
  • The research may not immediately translate into a new language arts curriculum, but it has already deepened the evidence for something most educators believe instinctively: Social engagement, particularly with speakers of multiple languages, is critical to language learning.
  • โ€œThe key to that series of studies is exposure and live interactions with native speakers,โ€ Ms. Lebedeva said. โ€œThe interactions need to be naturalistic: eye contact, gestures, exaggerated phonemes.โ€
  • ...2 more annotations...
  • โ€œHuman brains are wired to learn best in social interactions, whether that learning is about language or problem-solving or emotion,โ€ Ms. Lebedeva said, โ€œbut language is such a ubiquitous human behavior that studying it gives us an example of how more general learning takes place.โ€
  • at the science-oriented Ultimate Block Party held in New York City this month, children of different backgrounds played games in which they were required to sort toys either by shape or color, based on a rule indicated by changing flashcards. A child sorting blue and yellow ducks and trucks by shape, say, might suddenly have to switch to sorting them by color. The field games exemplified research findings that bilingual children have greater cognitive flexibility than monolingual children. That is, they can adapt better than monolingual children to changes in rulesโ€”What criteria do I use to sort?โ€”and close out mental distractionsโ€”It doesnโ€™t matter that some blue items are ducks and some are trucks.
  •  
    researchers long thought the window for learning a new language shrinks rapidly after age 7 and closes almost entirely after puberty. Yet interdisciplinary research conducted over the past five years at the University of Washington, Pennsylvania State University, and other colleges suggest that the time frame may be more flexible than first thought and that students who learn additional languages become more adaptable in other types of learning, too.
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. โ€ข The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. โ€ข These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pagesโ€”a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real timeโ€”plans for a summer vacation, the likelihood of repaying a loanโ€”and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about itโ€ฆ. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

When college students reinvent the world - CSMonitor.com - 0 views

  • He saw students pouring energy into memorizing bits of information that he knew theyโ€™d later forget. So he structured the rest of the syllabus around creating the simulation. Now he gets rid of about 40 percent of the rules of the game each semester so that students have to come up with new rules to determine how the interactions will play out. โ€œThe most learning happens there,โ€ he says.
  • World Sim materials go up on a class โ€œwiki,โ€ a collection of Web pages that professor and students edit. Building new-media literacy is one of Weschโ€™s goals. Very few students arrive at his class knowing how to use digital tools such as wikis.
  • โ€œThereโ€™s nothing more important than loving your students,โ€ Wesch says, his office full of props from the simulation. โ€œBefore I lecture I start getting nervous ... so I meditate on this idea of โ€˜Love your students.โ€™โ€œIt completely displaces all of that anxiety, because you recognize, itโ€™s not about me, itโ€™s about them.โ€
Barbara Lindsey

How to Outsmart Tracking Cookies on the Web - WSJ.com - 0 views

  • To have the most privacy options, upgrade to the latest version of the browser you use.
  • All popular browsers let users view and delete cookies installed on their computer.
  • Once you've deleted cookies, you can limit the installation of new ones.
  • ...6 more annotations...
  • Internet Explorer lets you set rules for blocking cookies based on the policies of the cookie-placer.
  • No major browsers let you track or block beacons without installing extra software known as "plug-ins," as described under advanced steps.
  • All major browsers offer a "private browsing" mode to limit cookies. Chrome calls it "Incognito." Internet Explorer calls it "InPrivate Browsing," but this option is available only in the latest version, IE8.
  • It deletes cookies each time you close the browser or turn off private browsing, effectively hiding your history.
  • "Flash Cookies"
  • Flash is the most common way to show video online. As with regular cookies, Flash cookies can be useful for remembering preferences, such as volume settings for videos. But marketers also can use Flash cookies to track what you do online.
    • Barbara Lindsey
       
      So every time you see a flash video (YouTube is an example) you are being tracked.
Barbara Lindsey

When college students reinvent the world - CSMonitor.com - 0 views

  • Cultural anthropology professor Michael Wesch came up with โ€œWorld Simโ€ to push students to stop asking, โ€œWhatโ€™s going to be on the test?โ€ and to contemplate bigger questions: Why are some people poor and some rich? How does the world work?
  • The goal, he says, is to create an environment where students can expand their capacity for empathizing with and loving those who are different from them.
  • Professor Wesch sets up the simulation by giving each culture a certain amount of power in the beginning โ€“ symbolized by playing cards. Then, based on a complex set of rules the class has devised together, students go through each round of the game โ€“ striking alliances, trading cards, and sometimes starting โ€œwarsโ€ over resources.
  • ...2 more annotations...
  • โ€œWhen you learn by doing โ€“ like in the World Sim โ€“ you can come across these profound discoveries that you just couldnโ€™t get in a lecture,โ€ says Nick Timmons, another teaching assistant.
    • Barbara Lindsey
       
      Your thoughts?
  • A number of his Midwestern classmates say the course has given them an understanding of cultural differences and globalization โ€“ insights they expect to carry into career fields such as healthcare, engineering, and social work.
Barbara Lindsey

Japanese Teenagers Teach Us Something About Being In Two Places At Once : 13.7: Cosmos ... - 0 views

  • First, face-to-face conversation is a dynamic interaction between two people. Talking is a kind of turn-taking, and turn-taking is a rhythm that organizes how and when things unfold. When people talk, they modify their postures and tempos so that they correspond. (There is fascinating research on this sort of "coordination dynamics" by, among others, J.A. Scott Kelso and colleagues.) And moreover, they tend jointly to pay attention to what is going on around them. One upshot of this is that when you are talking with someone, you actually experience that they are listening. Talking, in this sense, is like dancing. You can tell whether someone is dancing with you or whether they have detached and lost interest.
  • It is often very difficult to establish this sort dynamic engagement or coupling to someone over a cell phone. The connection is often just not good enough for that. One has the experience of speaking, but one lacks the corresponding experience of being heard. You literally lack the feedback โ€” the coordinated breathing, the modulations of tones of voice, etc โ€” that signals the otherโ€™s focus on you. And so you shout.
  • When a cell-phone connection is excellent, you and your remote partner to start up a dance together. But crucially, you dance to music that only you and your partner hear. That is, you succeed in establishing the kind of dynamic integration and entrainment that is typical of face-to-face conversation. And that has the effect of transporting you right out of your physical environment into one that you share with your conversation partner. And this in turn has the effect of guaranteeing that your tone of voice and volume will be inappropriate for your actual physical conditions
  • ...2 more annotations...
  • This use of language to signal presence is important. In particular, it sheds light on the transformations that are occurring as new technological practices such as cell phone use and social networking sites, etc, get embedded in our lives.
  • Anthropologists looking at the matter were surprised to discover that the kids rarely send informative or detailed messages. As a general rule, they are not telling each other anything. Rather, they are just letting each other know that they are โ€œthere,โ€ that they are online, in reach. Texting for the kids is a way of โ€œpingingโ€ each other. They bounce pings back and forth and so signal their presence for each other.
  •  
    This is especially for Carsten!
Barbara Lindsey

HIPAA Information For Consumers - 0 views

  • To make sure that your health information is protected in a way that does not interfere with your health care, your information can be used and shared:For your treatment and care coordinationTo pay doctors and hospitals for your health care and to help run their businessesWith your family, relatives, friends, or others you identify who are involved with your health care or your health care bills, unless you objectTo make sure doctors give good care and nursing homes are clean and safeTo protect the public's health, such as by reporting when the flu is in your areaTo make required reports to the police, such as reporting gunshot wounds
  • generally cannot
  • Examples of organizations that do not have to follow the Privacy and Security Rules include:life insurers,employers,workers compensation carriers,many schools and school districts,many state agencies like child protective service agencies,many law enforcement agencies,many municipal offices.
Barbara Lindsey

Dr. Mashup; or, Why Educators Should Learn to Stop Worrying and Love the Remix | EDUCAU... - 0 views

  • A classroom portal that presents automatically updated syndicated resources from the campus library, news sources, student events, weblogs, and podcasts and that was built quickly using free tools.
  • Increasingly, it's not just works of art that are appropriated and remixed but the functionalities of online applications as well.
  • mashups involve the reuse, or remixing, of works of art, of content, and/or of data for purposes that usually were not intended or even imagined by the original creators.
  • ...31 more annotations...
  • hat, exactly, constitutes a valid, original work? What are the implications for how we assess and reward creativity? Can a college or university tap the same sources of innovative talent and energy as Google or Flickr? What are the risks of permitting or opening up to this activity?
    • Barbara Lindsey
       
      Good discussion point
  • Remix is the reworking or adaptation of an existing work. The remix may be subtle, or it may completely redefine how the work comes across. It may add elements from other works, but generally efforts are focused on creating an alternate version of the original. A mashup, on the other hand, involves the combination of two or more works that may be very different from one another. In this article, I will apply these terms both to content remixes and mashups, which originated as a music form but now could describe the mixing of any number of digital media sources, and to data mashups, which combine the data and functionalities of two or more Web applications.
  • Harper's article "The Ecstasy of Influence," the novelist Jonathan Lethem imaginatively reviews the history of appropriation and recasts it as essential to the act of creation.3
  • Lethem's article is a must-read for anyone with an interest in the history of ideas, creativity, and intellectual property. It brilliantly synthesizes multiple disciplines and perspectives into a wonderfully readable and compelling argument. It is also, as the subtitle of his article acknowledges, "a plagiarism." Virtually every passage is a direct lift from another source, as the author explains in his "Key," which gives the source for every line he "stole, warped, and cobbled together." (He also revised "nearly every sentence" at least slightly.) Lethem's ideas noted in the paragraph above were appropriated from Siva Vaidhyanathan, Craig Baldwin, Richard Posner, and George L. Dillon.
  • Reading Walter Benjamin's highly influential 1936 essay "The Work of Art in the Age of Mechanical Reproduction,"4 it's clear that the profound effects of reproductive technology were obvious at that time. As Gould argued in 1964 (influenced by theorists such as Marshall McLuhan5), changes in how art is produced, distributed, and consumed in the electronic age have deep effects on the character of the art itself.
  • Yet the technology developments of the past century have clearly corresponded with a new attitude toward the "aura" associated with a work of invention and with more aggressive attitudes toward appropriation. It's no mere coincidence that the rise of modernist genres using collage techniques and more fragmented structures accompanied the emergence of photography and audio recording.
  • Educational technologists may wonder if "remix" or "content mashup" are just hipper-sounding versions of the learning objects vision that has absorbed so much energy from so many talented peopleโ€”with mostly disappointing results.
  • The question is, why should a culture of remix take hold when the learning object economy never did?
  • when most learning object repositories were floundering, resource-sharing services such as del.icio.us and Flickr were enjoying phenomenal growth, with their user communities eagerly contributing heaps of useful metadata via simple folksonomy-oriented tagging systems.
  • the standards/practices relationship implicit in the learning objects model has been reversed. With only the noblest of intentions, proponents of learning objects (and I was one of them) went at the problem of promoting reuse by establishing an arduous and complex set of interoperability standards and then working to persuade others to adopt those standards. Educators were asked to take on complex and ill-defined tasks in exchange for an uncertain payoff. Not surprisingly, almost all of them passed.
  • Discoverable Resources
  • Educators might justifiably argue that their materials are more authoritative, reliable, and instructionally sound than those found on the wider Web, but those materials are effectively rendered invisible and inaccessible if they are locked inside course management systems.
  • It's a dirty but open secret that many courses in private environments use copyrighted third-party materials in a way that pushes the limits of fair useโ€”third-party IP is a big reason why many courses cannot easily be made open.
  • The potential payoff for using open and discoverable resources, open and transparent licensing, and open and remixable formats is huge: more reuse means that more dynamic content is being produced more economically, even if the reuse happens only within an organization. And when remixing happens in a social context on the open web, people learn from each other's process.
  • Part of making a resource reusable involves making the right choices for file formats.
  • To facilitate the remixing of materials, educators may want to consider making the source files that were used to create a piece of multimedia available along with the finished result.
  • In addition to choosing the right file format and perhaps offering the original sources, another issue to consider when publishing content online is the critical question: "Is there an RSS feed available?" If so, conversion tools such as Feed2JS (http://www.feed2JS.org) allow for the republication of RSS-ified content in any HTML Web environment, including a course management system, simply by copying and pasting a few lines of JavaScript code. When an original source syndicated with RSS is updated, that update is automatically rendered anywhere it has been republished.
  • Jack Schofield
  • Guardian Unlimited
  • "An API provides an interface and a set of rules that make it much easier to extract data from a website. It's a bit like a record company releasing the vocals, guitars and drums as separate tracks, so you would not have to use digital processing to extract the parts you wanted."1
  • What's new about mashed-up application development? In a sense, the factors that have promoted this approach are the same ones that have changed so much else about Web culture in recent years. Essential hardware and software has gotten more powerful and for the most part cheaper, while access to high-speed connectivity and the enhanced quality of online applications like Google Docs have improved to the point that Tim O'Reilly and others can talk of "the emergent Internet operating system."15 The growth of user-centered technologies such as blogs have fostered a DIY ("do it yourself") culture that increasingly sees online interaction as something that can be personalized and adapted on the individual level. As described earlier, light syndication and service models such as RSS have made it easier and faster than ever to create simple integrations of diverse media types. David Berlind, executive editor of ZDNet, explains: "With mashups, fewer technical skills are needed to become a developer than ever. Not only that, the simplest ones can be done in 10 or 15 minutes. Before, you had to be a pretty decent code jockey with languages like C++ or Visual Basic to turn your creativity into innovation. With mashups, much the same way blogging systems put Web publishing into the hands of millions of ordinary non-technical people, the barrier to developing applications and turning creativity into innovation is so low that there's a vacuum into which an entire new class of developers will be sucked."16
  • The ability to "clone" other users' mashups is especially exciting: a newcomer does not need to spend time learning how to structure the data flows but can simply copy an existing framework that looks useful and then make minor modifications to customize the result.19
    • Barbara Lindsey
       
      This is the idea behind the MIT repository--remixing content to suit local needs.
  • As with content remixing, open access to materials is not just a matter of some charitable impulse to share knowledge with the world; it is a core requirement for participating in some of the most exciting and innovative activity on the Web.
  • "My Maps" functionality
  • For those still wondering what the value proposition is for offering an open API, Google's development process offers a compelling example of the potential rewards.
    • Barbara Lindsey
       
      Wikinomics
  • Elsewhere, it is difficult to point to significant activity suggesting that the mashup ethos is taking hold in academia the way it is on the wider Web.
  • Yet for the most part, the notion of the data mashup and the required openness is not even a consideration in discussions of technology strategy in higher educational institutions. "Data integration" across campus systems is something that is handled by highly skilled professionals at highly skilled prices.
  • Revealing how a more adventurous and inclusive online development strategy might look on campus, Raymond Yee recently posted a comprehensive proposal for his university (UC Berkeley), in which he outlined a "technology platform" not unlike the one employed by Amazon.com (http://aws.amazon.com/)โ€”resources and access that would be invaluable for the institution's programmers as well as for outside interests to build complementary services.
  • All too often, college and university administrators react to this type of innovation with suspicion and outright hostility rather than cooperation.
  • those of us in higher education who observe the successful practices in the wider Web world have an obligation to consider and discuss how we might apply these lessons in our own contexts. We might ask if the content we presently lock down could be made public with a license specifying reasonable terms for reuse. When choosing a content management system, we might consider how well it supports RSS syndication. In an excellent article in the March/April 2007 issue of EDUCAUSE Review, Joanne Berg, Lori Berquam, and Kathy Christoph listed a number of campus activities that could benefit from engaging social networking technologies.26
  • What might happen if we allow our campus innovators to integrate their practices in these areas in the same way that social networking application developers are already integrating theirs? What is the mission-critical data we cannot expose, and what can we expose with minimal risk? And if the notion of making data public seems too radical a step, can APIs be exposed to selected audiences, such as on-campus developers or consortia partners?
Barbara Lindsey

Convenience, Communications, and Control: How Students Use Technology | Resources | EDU... - 0 views

  • They are characterized as preferring teamwork, experiential activities, and the use of technology
  • Doing is more important than knowing, and learning is accomplished through trial and error as opposed to a logical and rule-based approach.2 Similarly, Paul Hagner found that these students not only possess the skills necessary to use these new communication forms, but there is an ever increasing expectation on their part that these new communication paths be used
  • Much of the work to date, while interesting and compelling, is intuitive and largely based on qualitative data and observation.
  • ...34 more annotations...
  • There is an inexorable trend among college students to universal ownership, mobility, and access to technology.
  • Students were asked about the applications they used on their electronic devices. They reported that they use technology first for educational purposes, followed by communication.
    • Barbara Lindsey
       
      All self-reported. Would have been powerful if could have actually tracked a representative sample and compared actual use with reported use.
  • presentation software was driven primarily by the requirements of the students' major and the curriculum.
  • Communications and entertainment are very much related to gender and age.
  • From student interviews, a picture emerged of student technology use driven by the demands of the major and the classes that students take. Seniors reported spending more time overall on a computer than do freshmen, and they reported greater use of a computer at a place of employment. Seniors spent more hours on the computer each week in support of their educational activities and also more time on more advanced applicationsโ€”spreadsheets, presentations, and graphics.
  • Confirming what parents suspect, students with the lowest grade point averages (GPAs) spend significantly more time playing computer games; students with the highest GPAs spend more hours weekly using the computer in support of classroom activities. At the University of Minnesota, Crookston, students spent the most hours on the computer in support of classroom activities. This likely reflects the deliberate design of the curriculum to use a laptop extensively. In summary, the curriculum's technology requirements are major motivators for students to learn to use specialized software.
  • The interviews indicated that students are skilled with basic office suite applications but tend to know just enough technology functionality to accomplish their work; they have less in-depth application knowledge or problem solving skills.
  • According to McEuen, student technology skills can be likened to writing skills: Students come to college knowing how to write, but they are not developed writers. The analogy holds true for information technology, and McEuen suggested that colleges and universities approach information technology in the same way they approach writing.6
  • he major requires the development of higher-level skill sets with particular applications.
    • Barbara Lindsey
       
      Not really quantitative--self-reported data back by selected qualitative interviews
  • The comparative literature on student IT skill self-assessment suggests that students overrate their skills; freshmen overrate their skills more than seniors, and men overrate their skills more than women.7 Our data supports these conclusions. Judy Doherty, director of the Student Technologies Resource Group at Colgate University, remarked on student skill assessment, "Students state in their job applications that they are good if not very good, but when tested their skills are average to poor, and they need a lot of training."8
  • Mary Jane Smetanka of the Minneapolisโ€“St. Paul Star Tribune reported that some students are so conditioned by punch-a-button problem solving on computers that they approach problems with a scattershot impulsiveness instead of methodically working them through. In turn, this leads to problem-solving difficulties.
  • We expected to find that the Net Generation student prefers classes that use technology. What we found instead is a bell curve with a preference for a moderate use of technology in the classroom (see Figure 1).
    • Barbara Lindsey
       
      More information needs to be given to find out why--may be tool and method not engaging.
  • It is not surprising that if technology is used well by the instructor, students will come to appreciate its benefits.
  • A student's major was also an important predictor of preferences for technology in the classroom (see Table 3), with engineering students having the highest preference for technology in the classroom (67.8 percent), followed by business students (64.3 percent).
  • Humanities 7.7% 47.9% 40.2
  • he highest scores were given to improved communications, followed by factors related to the management of classroom activities. Lower impact activities had to do with comprehension of classroom materials (complex concepts).
  • I spend more time engaged in course activities in those courses that require me to use technology.
  • The instructors' use of technology in my classes has increased my interest in the subject matter. 3.25 Classes that use information technology are more likely to focus on real-world tasks and examples.
  • Interestingly, students do not feel that use of information technology in classes greatly increases the amount of time engaged with course activities (3.22 mean).12 This is in direct contrast to faculty perceptions reported in an earlier study, where 65 percent of faculty reported they perceived that students spend more time engaged with course materials
  • Only 12.7 percent said the most valuable benefit was improved learning; 3.7 percent perceived no benefit whatsoever. Note that students could only select one response, so more than 12.7 percent may have felt learning was improved, but it was not ranked highest. These findings compare favorably with a study done by Douglas Havelka at the University of Miami in Oxford, Ohio, who identified the top six benefits of the current implementation of IT as improving work efficiency, affecting the way people behave, improving communications, making life more convenient, saving time, and improving learning ability.14
    • Barbara Lindsey
       
      Would have been good to know exactly what kinds of technologies were meant here.
  • Our data suggest that we are at best at the cusp of technologies being employed to improve learning.
  • The interactive features least used by faculty were the features that students indicated contributed the most to their learning.
  • he students in this study called our attention to performance by noting an uneven diffusion of innovation using this technology. This may be due, in part, to faculty or student skill. It may also be due to a lack of institutional recognition of innovation, especially as the successful use of course management systems affects or does not affect faculty tenure, promotion, and merit decisions
  • we found that many of the students most skilled in the use of technology had mixed feelings about technology in the classroom.
  • What we found was that many necessary skills had to be learned at the college or university and that the motivation for doing so was very much tied to the requirements of the curriculum. Similarly, the students in our survey had not gained the necessary skills to use technology in support of academic work outside the classroom. We found a significant need for further training in the use of information technology in support of learning and problem-solving skills.
  • Course management systems were used most by both faculty and students for communication of information and administrative activities and much less in support of learning.
  • In 1997, Michael Hooker proclaimed, "higher education is on the brink of a revolution." Hooker went on to note that two of the greatest challenges our institutions face are those of "harnessing the power of digital technology and responding to the information revolution."18 Hooker and many others, however, did not anticipate the likelihood that higher education's learning revolution would be a journey of a thousand miles rather than a discrete event. Indeed, a study of learning's last great revolutionโ€”the invention of moveable typeโ€”reveals, too, a revolution conducted over centuries leading to the emergence of a publishing industry, intellectual property rights law, the augmentation of customized lectures with textbooks, and so forth.
  • Both the ECAR study on faculty use of course management systems and this study of student experiences with information technology concluded that, while information technology is indeed making important inroads into classroom and learning activities, to date the effects are largely in the convenience of postsecondary teaching and learning and do not yet constitute a "learning revolution." This should not surprise us. The invention of moveable type enhanced, nearly immediately, access to published information and reduced the time needed to produce new publications. This invention did not itself change literacy levels, teaching styles, learning styles, or other key markers of a learning revolution. These changes, while catalyzed by the new technology, depended on slower social changes to institutions. I believe that is what we are witnessing in higher education today.
  • The institutions chosen represent a nonrepresentative mix of the different types of higher education institution in the United States, in terms of Carnegie class as well as location, source of funding, and levels of technology emphasis. Note, however, that we consider our findings to be instructive rather than conclusive of student experiences at different types of Carnegie institutions.
  • Qualitative data were collected by means of focus groups and individual interviews. We interviewed undergraduate students, administrators, and individuals identified as experts in the field of student technology use in the classroom. Student focus groups and interviews of administrators were conducted at six of the thirteen schools participating in the study.
Barbara Lindsey

Print: The Chronicle: 6/15/2007: The New Metrics of Scholarly Authority - 0 views

    • Barbara Lindsey
       
      Higher ed slow to respond.
  • Web 2.0 is all about responding to abundance, which is a shift of profound significance.
  • Chefs simply couldn't exist in a world of universal scarcity
  • ...33 more annotations...
  • a time when scholarship, and how we make it available, will be affected by information abundance just as powerfully as food preparation has been.
  • Scholarly communication before the Internet required the intermediation of publishers. The costliness of publishing became an invisible constraint that drove nearly all of our decisions. It became the scholar's job to be a selector and interpreter of difficult-to-find primary and secondary sources; it was the scholarly publisher's job to identify the best scholars with the best perspective and the best access to scarce resources.
    • Barbara Lindsey
       
      Comments?
  • Online scholarly publishing in Web 1.0 mimicked those fundamental conceptions. The presumption was that information scarcity still ruled. Most content was closed to nonsubscribers; exceedingly high subscription costs for specialty journals were retained; libraries continued to be the primary market; and the "authoritative" version was untouched by comments from the uninitiated. Authority was measured in the same way it was in the scarcity world of paper: by number of citations to or quotations from a book or article, the quality of journals in which an article was published, the institutional affiliation of the author, etc.
  • Google
  • Google
    • Barbara Lindsey
       
      Where critical analysis comes in
  • The challenge for all those sites pertains to abundance:
  • Such systems have not been framed to confer authority, but as they devise means to deal with predators, scum, and weirdos wanting to be a "friend," they are likely to expand into "trust," or "value," or "vouching for my friend" metrics โ€” something close to authority โ€” in the coming years.
  • ecently some more "authoritative" editors have been given authority to override whining ax grinders.
  • In many respects Boing Boing is an old-school edited resource. It doesn't incorporate feedback or comments, but rather is a publication constructed by five editor-writers
  • As the online environment matures, most social spaces in many disciplines will have their own "boingboings."
  • They differ from current models mostly by their feasible computability in a digital environment where all elements can be weighted and measured, and where digital interconnections provide computable context.
  • In the very near future, if we're talking about a universe of hundreds of billions of documents, there will routinely be thousands, if not tens of thousands, if not hundreds of thousands, of documents that are very similar to any new document published on the Web. If you are writing a scholarly article about the trope of smallpox in Shakespearean drama, how do you ensure you'll be read? By competing in computability. Encourage your friends and colleagues to link to your online document. Encourage online back-and-forth with interested readers. Encourage free access to much or all of your scholarly work. Record and digitally archive all your scholarly activities. Recognize others' works via links, quotes, and other online tips of the hat. Take advantage of institutional repositories, as well as open-access publishers. The list could go on.
  • the new authority metrics, instead of relying on scholarly publishers to establish the importance of material for them.
  • They need to play a role in deciding not just what material will be made available online, but also how the public will be allowed to interact with the material. That requires a whole new mind-set.
  • cholarly publishers
  • Many of the values of scholarship are not well served yet by the Web: contemplation, abstract synthesis, construction of argument.
  • Traditional models of authority will probably hold sway in the scholarly arena for 10 to 15 years, while we work out the ways in which scholarly engagement and significance can be measured in new kinds of participatory spaces.
  • if scholarly output is locked away behind fire walls, or on hard drives, or in print only, it risks becoming invisible to the automated Web crawlers, indexers, and authority-interpreters that are being developed. Scholarly invisibility is rarely the path to scholarly authority.
  • Web 1.0,
  • garbed new business and publishing models in 20th-century clothes.
  • fundamental presumption is one of endless information abundance.
  • Flickr, YouTube
  • micromarkets
  • multiple demographics
  • Abundance leads to immediate context and fact checking, which changes the "authority market" substantially. The ability to participate in most online experiencesvia comments, votes, or ratingsis now presumed, and when it's not available, it's missed.
  • Google interprets a link from Page A to Page B as a vote, by Page A, for Page B. But, Google looks at more than the sheer volume of votes, or links a page receives; for example, it also analyzes the page that casts the vote. Votes cast by pages that are themselves 'important' weigh more heavily and help to make other pages 'important,'"
  • It has its limits, but it also both confers and confirms authority because people tend to point to authoritative sources to bolster their own work.
  • That kind of democratization of authority is nearly unique to wikis that are group edited, since not observation, but active participation in improvement, is the authority metric.
  • user-generated authority, many of which are based on algorithmic analysis of participatory engagement. The emphasis in such models is often not on finding scarce value, but on weeding abundance
  • Authority 3.0 will probably include (the list is long, which itself is a sign of how sophisticated our new authority makers will have to be): Prestige of the publisher (if any). Prestige of peer prereviewers (if any). Prestige of commenters and other participants. Percentage of a document quoted in other documents. Raw links to the document. Valued links, in which the values of the linker and all his or her other links are also considered. Obvious attention: discussions in blogspace, comments in posts, reclarification, and continued discussion. Nature of the language in comments: positive, negative, interconnective, expanded, clarified, reinterpreted. Quality of the context: What else is on the site that holds the document, and what's its authority status? Percentage of phrases that are valued by a disciplinary community. Quality of author's institutional affiliation(s). Significance of author's other work. Amount of author's participation in other valued projects, as commenter, editor, etc. Reference network: the significance rating of all the texts the author has touched, viewed, read. Length of time a document has existed. Inclusion of a document in lists of "best of," in syllabi, indexes, and other human-selected distillations. Types of tags assigned to it, the terms used, the authority of the taggers, the authority of the tagging system.
  • Most technophile thinkers out there believe that Web 3.0 will be driven by artificial intelligences โ€” automated computer-assisted systems that can make reasonable decisions on their own, to preselect, precluster, and prepare material based on established metrics, while also attending very closely to the user's individual actions, desires, and historic interests, and adapting to them.
  •  
    When the system of scholarly communications was dependent on the physical movement of information goods, we did business in an era of information scarcity. As we become dependent on the digital movement of information goods, we find ourselves entering an era of information abundance. In the process, we are witnessing a radical shift in how we establish authority, significance, and even scholarly validity. That has major implications for, in particular, the humanities and social sciences.
Barbara Lindsey

Connectivism & Connective Knowledge ยป Narratives of coherence - 0 views

  • Grand narratives โ€“ such as provide us with a large umbrella that we can use to make sense of the world โ€“ have been besieged over the last several decades. Grand narratives in the form of newspapers, newscasts, and books are now augmented by blogs and YouTube videos.
  • an attempt to provide or create some type of a narrative โ€“ namely, a narrative of coherence.
  • In a traditional course, the educator hacks the trails to complex information landscapes. The educatorโ€™s bias influences what is included and excluded.
  • ...7 more annotations...
  • While it is obvious that information shaping approaches such as we find in newspapers and books are fading in prominence, we still need some type of framework to make sense of it all.
  • We all face information abundance. We all face the reality that we will always be missing some key pieces of information.
  • A common concern voiced by many of the active participants: how do we assimilate/makesense of this information?!? Thereโ€™s just too much of it.
  • Part of the solution is to rely on oneโ€™s learning network to filter out nonsense and to draw attention to key ideas. This is particularly effective when we can โ€œplug inโ€ to a network with high levels of diversity and with people we quickly begin to trust.
  • dealing with the concept of self-construal, and the differences that exist among cultures and individuals who are predominantly independent or interdependent. According to those studies, one of these differences is precisely the sense of belonging that you mention. Interdependent self-construals feel more strongly about it than independent self-construals (you can see a more detailed explanation on this and other differences, along with a short literature review in Walker, Deng & Dieser 2005.)
  • four years ago, I conducted a survey among English and Spanish speaking Wikipedians, and the results regarding their motivation to participate in the Wikipedia project were worthy of note: โ€œFor Spanish Wikipedia contributors, the sense of building and being part of a large community pays off for the less-rewarding moments of their life as Wikipedians. This is obvious not only by analyzing the answers submitted by the survey respondents but also by taking a look at the large amount of hits that personal pages have in the Spanish version of Wikipedia. English Wikipedia contributors, on the other side, also acknowledge the joys of being part of a community, but, for the most part, they seem more interested in the administrative aspects of Wikipedia, such as creating rules and guidelines, enforcing them and providing for a smooth work with the administrators.โ€ Other differences based on the type of self-construal are very common on our daily interactions on the network.
  • I find my network actually adds to my growing โ€œto readโ€ pile, Iโ€™ve read really good stuff because I have seen one or more of my Twitter contacts mentioning an item. I fear more technology will just highlight even more great material.
  •  
    Grand narratives - such as provide us with a large umbrella that we can use to make sense of the world - have been besieged over the last several decades. Grand narratives in the form of newspapers, newscasts, and books are now augmented by blogs and YouTube videos. As discussed in a previous post, one of our key challenges in this course is to find a way to bring together the numerous ideas and viewpoints in a way that makes sense for participants.
Barbara Lindsey

50 Ways to Use Wikis for a More Collaborative and Interactive Classroom | Smart Teaching - 0 views

  • Make it a class project to collaboratively write a reference book that others can use.
  • sk students to create study guides for a specific part of the unit youโ€™re
  • Get your class to create a glossary of terms they use and learn about in new units, adding definitions and images.
  • ...7 more annotations...
  • Encourage students to submit words that they had trouble with, along with a dictionary entry
  • Let your students share their collective information so that everyone gets a better understanding of the subject.
  • Make it a class project to create an FAQ for your classroom that will help new students and those that will come in years later.
  • Encourage students to draft rules and policies for the classroom.
  • Using a wiki platform, students donโ€™t have to worry about web design, so they can focus on content instead.
  • Save links, documents, and quotes related to units or your classroom as a whole
  • Work with other teachers to create lesson plans and track studentsโ€™ success.
1 - 20 of 25 Next ›
Showing 20 items per page