Skip to main content

Home/ beyondwebct/ Group items tagged scanning

Rss Feed Group items tagged

Chenwen Hong

11 More U.S. Airports Get Body Scanners | Threat Level | Wired.com - 0 views

  •  
    the issue of privacy versus security regarding body scanning
  •  
    This is the issue of privacy versus security that we discussed on Friday.
Barbara Lindsey

ASCD Express 5.18 - Cell Phones Allow Anytime Learning - 0 views

  • She is currently writing a book tentatively titled Cases for Using Students' Cell Phones in Education: A Practical Guide to Using Cell Phones in K–12 Schools, which looks at 11 U.S. and 5 international case studies of teachers integrating students' own cell phones into instruction.
  • One of Larry Cuban's (Teachers and Machines, Oversold and Underused) theories about why ed technology often fails in schools is that we use this top-down approach where administrators or tech coordinators introduce the technologies to the teachers, and they in turn try to introduce and teach it to the students. It's a very foreign concept for the students, as well as the teachers. And often what happens is maybe a handful of teachers end up using this very expensive technology, and students don't have any access to it outside of school. Cuban recommends a much more bottom-up approach to ed technology. Rather than making specialized software and hardware just for school learning, students and society introduce the technologies that schools should be integrating into learning.
  • People who know the history of ed technology know that it hasn't been that successful, long-term, with sustaining learning because it's often attached to a tool that students don't have access to outside of school.
  • ...3 more annotations...
  • For many schools, the hardest part is making it acceptable to turn to technologies that aren't traditionally used in schools. It's a culture that has to be cultivated at the school itself. In the book I'm working on now, many of the teachers in the case studies I discuss approached their administrators with something they'd been using with success outside of school, and their administrators were open to trying it out within school. Kipp Rogers at Passages Middle School in Newport News, Va., has done a phenomenal job modeling that approach and valuing not only his teachers, but also his students, who are involved in planning, as well.
  • Q: From what you've seen in the field, what's the most interesting instructional use of mobile devices happening now? Keren-Kolb: Definitely what's going on in Australia. Teachers are using QR (two-dimensional bar codes) for activities and learning. In the United States, about 60 percent of the phones can do this, but in most other countries, it's almost universal. So, in some Australian schools, this means [that] students come in on the first day of class and their entire syllabus is on a bar code they scan directly into their phone—same thing with some books and homework assignments. They'll scan a code for their homework, and it'll link to video tutorials and activities. So, moving away from textbooks and moving toward paperless learning that's much more interactive. I think that's exciting—how much information you can attach to that little bar code, and use it to extend learning.
  • When students can use whatever tools are around them, obviously, testing changes. It's not just about a right or wrong answer—it's about inquiry, collaboration, and the higher-order thinking skills we want students to do.
Barbara Lindsey

FRONTLINE: digital nation: henry jenkins response to mark bauerlein | PBS - 0 views

  • let me say another word or two about our friend, the student who thinks he can read Romeo and Juliet in 10 minutes. It seems to me that he has a lot in common with educational policy makers who think that the experience of reading the book can be reduced to a small number of items on a standardized test. Both have an instrumental understanding of reading and learning which sees learning as a product and has not respect for the process of really engaging deeply with the literary experience. In many ways, the student's attitude is a byproduct of the current structure of education as much as it is a byproduct of the instant gratification promised by digital culture. As someone who has been involved in the last year with a project which seeks to model ways we can teach Moby-Dick in contemporary schools, I can tell you the resistance we've gotten from some teachers comes at both levels. Yes, some teachers don't think their students have the attention span to deal with a novel of this length and complexity but many more simply say that they don't think they have time to teach a novel of such richness if they are going to stay on track and review all of the content they are supposed to cover under the new national standards. Both push back against a depth of experience and the student may simply trying to act efficiently to give the teachers what they want on the test. As someone who loves literature, both sides of this equation break my heart.
  • what the gamers are doing in the Korean Bong is better described as intense concentration, entering a state of flow, rather than multitasking per se. A growing body of work has stressed the kinds of active problem solving which surrounds the play of certain kinds of games, the collaboration which occurs through certain forms of participatory culture, etc. as other ways of engaging with the online world. To me, there's something reductive about continuing to return to issues of multitasking when depicting Katie Salen's game school for example. Katie's approach is not about turning students lose on the computer; it is about teaching them to look at the world as a complex system and developing skills as designers. In my White Paper for MacArthur, I identify multitasking as a skill -- but I don't mean by this what young people think they are doing when they talk about multitasking. I mean the ability to manage attention -- sometimes concentrating on a single text or problem, sometimes scanning the environment to form a hazier understanding of the bigger picture, much as a driver needs to keep their eyes on the road in front of them but also needs to scan the rear view mirror. I think schools have a role to play in helping young people sharpen their understanding of which mode of engagement is appropriate for different tasks and contexts.
  • The goal shouldn't be to decide if computers are good or bad. Our goal should be to identify what a more constructive relationship to this technology might look like and to insure that those skills and practices get transmitted to a broader segment of the population.
  • ...1 more annotation...
  • I also think that they should report the diverse range of cultural practices which emerged from the Digital Youth team's large scale ethnography of teen's on-line lives and the kinds of practices which seem to support robust informal learning outside the classroom. Unfortunately, this research ended up on the cutting room floor. Some of it is on the web. None of it is in the program.
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

What we learned from 5 million books | Video on TED.com - 0 views

    • Barbara Lindsey
       
      From YouTube version of this talk: "[Google's digtized books] are very practical and extremely awesome." Erez Lieberman Aiden and Jean-Baptiste Michel from Harvard University use the 15 million books scanned and digitized by Google to show how a visual and quantitative analysis of text can provide insights about fields as diverse as lexicography, the evolution of grammar, collective memory, the adoption of technology, the pursuit of fame, censorship, and historical epidemiology.
  • ELA: There are more sobering notes among the n-grams. For instance, here's the trajectory of Marc Chagall, an artist born in 1887. And this looks like the normal trajectory of a famous person. He gets more and more and more famous, except if you look in German. If you look in German, you see something completely bizarre, something you pretty much never see, which is he becomes extremely famous and then all of a sudden plummets, going through a nadir between 1933 and 1945, before rebounding afterward. And of course, what we're seeing is the fact Marc Chagall was a Jewish artist in Nazi Germany. Now these signals are actually so strong that we don't need to know that someone was censored. We can actually figure it out using really basic signal processing. Here's a simple way to do it. Well, a reasonable expectation is that somebody's fame in a given period of time should be roughly the average of their fame before and their fame after. So that's sort of what we expect. And we compare that to the fame that we observe. And we just divide one by the other to produce something we call a suppression index. If the suppression index is very, very, very small, then you very well might be being suppressed. If it's very large, maybe you're benefiting from propaganda.
  • Now when Google digitizes a book, they put it into a really nice format. Now we've got the data, plus we have metadata. We have information about things like where was it published, who was the author, when was it published. And what we do is go through all of those records and exclude everything that's not the highest quality data. What we're left with is a collection of five million books, 500 billion words, a string of characters a thousand times longer than the human genome -- a text which, when written out, would stretch from here to the Moon and back 10 times over -- a veritable shard of our cultural genome.
  • ...4 more annotations...
  • we're going to release statistics about the books. So take for instance "A gleam of happiness." It's four words; we call that a four-gram. We're going to tell you how many times a particular four-gram appeared in books in 1801, 1802, 1803, all the way up to 2008. That gives us a time series of how frequently this particular sentence was used over time. We do that for all the words and phrases that appear in those books, and that gives us a big table of two billion lines that tell us about the way culture has been changing.
  • You might also want to have a look at this particular n-gram, and that's to tell Nietzsche that God is not dead, although you might agree that he might need a better publicist.
  • JM: Now you can actually look at the distribution of suppression indexes over whole populations. So for instance, here -- this suppression index is for 5,000 people picked in English books where there's no known suppression -- it would be like this, basically tightly centered on one. What you expect is basically what you observe. This is distribution as seen in Germany -- very different, it's shifted to the left. People talked about it twice less as it should have been. But much more importantly, the distribution is much wider. There are many people who end up on the far left on this distribution who are talked about 10 times fewer than they should have been. But then also many people on the far right who seem to benefit from propaganda. This picture is the hallmark of censorship in the book record.
  • ELA: So culturomics is what we call this method. It's kind of like genomics. Except genomics is a lens on biology through the window of the sequence of bases in the human genome. Culturomics is similar. It's the application of massive-scale data collection analysis to the study of human culture. Here, instead of through the lens of a genome, through the lens of digitized pieces of the historical record. The great thing about culturomics is that everyone can do it. Why can everyone do it? Everyone can do it because three guys, Jon Orwant, Matt Gray and Will Brockman over at Google, saw the prototype of the Ngram Viewer, and they said, "This is so fun. We have to make this available for people." So in two weeks flat -- the two weeks before our paper came out -- they coded up a version of the Ngram Viewer for the general public. And so you too can type in any word or phrase that you're interested in and see its n-gram immediately -- also browse examples of all the various books in which your n-gram appears.
  •  
    fall 2012 syllabus
Barbara Lindsey

YouTube - Black & White and Scanned All Over - 0 views

  •  
    How one school is using QR Codes in a school district
Barbara Lindsey

Minds on Fire: Open Education, the Long Tail, and Learning 2.0 (EDUCAUSE Review) | EDUC... - 0 views

  • But at the same time that the world has become flatter, it has also become “spikier”: the places that are globally competitive are those that have robust local ecosystems of resources supporting innovation and productiveness.2
  • various initiatives launched over the past few years have created a series of building blocks that could provide the means for transforming the ways in which we provide education and support learning. Much of this activity has been enabled and inspired by the growth and evolution of the Internet, which has created a global “platform” that has vastly expanded access to all sorts of resources, including formal and informal educational materials. The Internet has also fostered a new culture of sharing, one in which content is freely contributed and distributed with few restrictions or costs.
  • the most visible impact of the Internet on education to date has been the Open Educational Resources (OER) movement, which has provided free access to a wide range of courses and other educational materials to anyone who wants to use them. The movement began in 2001 when the William and Flora Hewlett and the Andrew W. Mellon foundations jointly funded MIT’s OpenCourseWare (OCW) initiative, which today provides open access to undergraduate- and graduate-level materials and modules from more than 1,700 courses (covering virtually all of MIT’s curriculum). MIT’s initiative has inspired hundreds of other colleges and universities in the United States and abroad to join the movement and contribute their own open educational resources.4 The Internet has also been used to provide students with direct access to high-quality (and therefore scarce and expensive) tools like telescopes, scanning electron microscopes, and supercomputer simulation models, allowing students to engage personally in research.
  • ...29 more annotations...
  • most profound impact of the Internet, an impact that has yet to be fully realized, is its ability to support and expand the various aspects of social learning. What do we mean by “social learning”? Perhaps the simplest way to explain this concept is to note that social learning is based on the premise that our understanding of content is socially constructed through conversations about that content and through grounded interactions, especially with others, around problems or actions. The focus is not so much on what we are learning but on how we are learning.5
  • This perspective shifts the focus of our attention from the content of a subject to the learning activities and human interactions around which that content is situated. This perspective also helps to explain the effectiveness of study groups. Students in these groups can ask questions to clarify areas of uncertainty or confusion, can improve their grasp of the material by hearing the answers to questions from fellow students, and perhaps most powerfully, can take on the role of teacher to help other group members benefit from their understanding (one of the best ways to learn something is, after all, to teach it to others).
  • This encourages the practice of what John Dewey called “productive inquiry”—that is, the process of seeking the knowledge when it is needed in order to carry out a particular situated task.
  • ecoming a trusted contributor to Wikipedia involves a process of legitimate peripheral participation that is similar to the process in open source software communities. Any reader can modify the text of an entry or contribute new entries. But only more experienced and more trusted individuals are invited to become “administrators” who have access to higher-level editing tools.8
  • by clicking on tabs that appear on every page, a user can easily review the history of any article as well as contributors’ ongoing discussion of and sometimes fierce debates around its content, which offer useful insights into the practices and standards of the community that is responsible for creating that entry in Wikipedia. (In some cases, Wikipedia articles start with initial contributions by passionate amateurs, followed by contributions from professional scholars/researchers who weigh in on the “final” versions. Here is where the contested part of the material becomes most usefully evident.) In this open environment, both the content and the process by which it is created are equally visible, thereby enabling a new kind of critical reading—almost a new form of literacy—that invites the reader to join in the consideration of what information is reliable and/or important.
  • But viewing learning as the process of joining a community of practice reverses this pattern and allows new students to engage in “learning to be” even as they are mastering the content of a field.
  • Mastering a field of knowledge involves not only “learning about” the subject matter but also “learning to be” a full participant in the field. This involves acquiring the practices and the norms of established practitioners in that field or acculturating into a community of practice.
  • Another interesting experiment in Second Life was the Harvard Law School and Harvard Extension School fall 2006 course called “CyberOne: Law in the Court of Public Opinion.” The course was offered at three levels of participation. First, students enrolled in Harvard Law School were able to attend the class in person. Second, non–law school students could enroll in the class through the Harvard Extension School and could attend lectures, participate in discussions, and interact with faculty members during their office hours within Second Life. And at the third level, any participant in Second Life could review the lectures and other course materials online at no cost. This experiment suggests one way that the social life of Internet-based virtual education can coexist with and extend traditional education.
  • Digital StudyHall (DSH), which is designed to improve education for students in schools in rural areas and urban slums in India. The project is described by its developers as “the educational equivalent of Netflix + YouTube + Kazaa.”11 Lectures from model teachers are recorded on video and are then physically distributed via DVD to schools that typically lack well-trained instructors (as well as Internet connections). While the lectures are being played on a monitor (which is often powered by a battery, since many participating schools also lack reliable electricity), a “mediator,” who could be a local teacher or simply a bright student, periodically pauses the video and encourages engagement among the students by asking questions or initiating discussions about the material they are watching.
  • John King, the associate provost of the University of Michigan
  • For the past few years, he points out, incoming students have been bringing along their online social networks, allowing them to stay in touch with their old friends and former classmates through tools like SMS, IM, Facebook, and MySpace. Through these continuing connections, the University of Michigan students can extend the discussions, debates, bull sessions, and study groups that naturally arise on campus to include their broader networks. Even though these extended connections were not developed to serve educational purposes, they amplify the impact that the university is having while also benefiting students on campus.14 If King is right, it makes sense for colleges and universities to consider how they can leverage these new connections through the variety of social software platforms that are being established for other reasons.
  • The project’s website includes reports of how students, under the guidance of professional astronomers, are using the Faulkes telescopes to make small but meaningful contributions to astronomy.
  • “This is not education in which people come in and lecture in a classroom. We’re helping students work with real data.”16
  • HOU invites students to request observations from professional observatories and provides them with image-processing software to visualize and analyze their data, encouraging interaction between the students and scientists
  • The site is intended to serve as “an open forum for worldwide discussions on the Decameron and related topics.” Both scholars and students are invited to submit their own contributions as well as to access the existing resources on the site. The site serves as an apprenticeship platform for students by allowing them to observe how scholars in the field argue with each other and also to publish their own contributions, which can be relatively small—an example of the “legitimate peripheral participation” that is characteristic of open source communities. This allows students to “learn to be,” in this instance by participating in the kind of rigorous argumentation that is generated around a particular form of deep scholarship. A community like this, in which students can acculturate into a particular scholarly practice, can be seen as a virtual “spike”: a highly specialized site that can serve as a global resource for its field.
  • I posted a list of links to all the student blogs and mentioned the list on my own blog. I also encouraged the students to start reading one another's writing. The difference in the writing that next week was startling. Each student wrote significantly more than they had previously. Each piece was more thoughtful. Students commented on each other's writing and interlinked their pieces to show related or contradicting thoughts. Then one of the student assignments was commented on and linked to from a very prominent blogger. Many people read the student blogs and subscribed to some of them. When these outside comments showed up, indicating that the students really were plugging into the international community's discourse, the quality of the writing improved again. The power of peer review had been brought to bear on the assignments.17
  • for any topic that a student is passionate about, there is likely to be an online niche community of practice of others who share that passion.
  • Finding and joining a community that ignites a student’s passion can set the stage for the student to acquire both deep knowledge about a subject (“learning about”) and the ability to participate in the practice of a field through productive inquiry and peer-based learning (“learning to be”). These communities are harbingers of the emergence of a new form of technology-enhanced learning—Learning 2.0—which goes beyond providing free access to traditional course materials and educational tools and creates a participatory architecture for supporting communities of learners.
  • We need to construct shared, distributed, reflective practicums in which experiences are collected, vetted, clustered, commented on, and tried out in new contexts.
  • An example of such a practicum is the online Teaching and Learning Commons (http://commons.carnegiefoundation.org/) launched earlier this year by the Carnegie Foundation for the Advancement of Teaching
  • The Commons is an open forum where instructors at all levels (and from around the world) can post their own examples and can participate in an ongoing conversation about effective teaching practices, as a means of supporting a process of “creating/using/re-mixing (or creating/sharing/using).”20
  • The original World Wide Web—the “Web 1.0” that emerged in the mid-1990s—vastly expanded access to information. The Open Educational Resources movement is an example of the impact that the Web 1.0 has had on education.
  • But the Web 2.0, which has emerged in just the past few years, is sparking an even more far-reaching revolution. Tools such as blogs, wikis, social networks, tagging systems, mashups, and content-sharing sites are examples of a new user-centric information infrastructure that emphasizes participation (e.g., creating, re-mixing) over presentation, that encourages focused conversation and short briefs (often written in a less technical, public vernacular) rather than traditional publication, and that facilitates innovative explorations, experimentations, and purposeful tinkerings that often form the basis of a situated understanding emerging from action, not passivity.
  • In the twentieth century, the dominant approach to education focused on helping students to build stocks of knowledge and cognitive skills that could be deployed later in appropriate situations. This approach to education worked well in a relatively stable, slowly changing world in which careers typically lasted a lifetime. But the twenty-first century is quite different.
  • We now need a new approach to learning—one characterized by a demand-pull rather than the traditional supply-push mode of building up an inventory of knowledge in students’ heads. Demand-pull learning shifts the focus to enabling participation in flows of action, where the focus is both on “learning to be” through enculturation into a practice as well as on collateral learning.
  • The demand-pull approach is based on providing students with access to rich (sometimes virtual) learning communities built around a practice. It is passion-based learning, motivated by the student either wanting to become a member of a particular community of practice or just wanting to learn about, make, or perform something. Often the learning that transpires is informal rather than formally conducted in a structured setting. Learning occurs in part through a form of reflective practicum, but in this case the reflection comes from being embedded in a community of practice that may be supported by both a physical and a virtual presence and by collaboration between newcomers and professional practitioners/scholars.
  • The building blocks provided by the OER movement, along with e-Science and e-Humanities and the resources of the Web 2.0, are creating the conditions for the emergence of new kinds of open participatory learning ecosystems23 that will support active, passion-based learning: Learning 2.0.
  • As a graduate student at UC-Berkeley in the late 1970s, Treisman worked on the poor performance of African-Americans and Latinos in undergraduate calculus classes. He discovered the problem was not these students’ lack of motivation or inadequate preparation but rather their approach to studying. In contrast to Asian students, who, Treisman found, naturally formed “academic communities” in which they studied and learned together, African-Americans tended to separate their academic and social lives and studied completely on their own. Treisman developed a program that engaged these students in workshop-style study groups in which they collaborated on solving particularly challenging calculus problems. The program was so successful that it was adopted by many other colleges. See Uri Treisman, “Studying Students Studying Calculus: A Look at the Lives of Minority Mathematics Students in College,” College Mathematics Journal, vol. 23, no. 5 (November 1992), pp. 362–72, http://math.sfsu.edu/hsu/workshops/treisman.html.
  • In the early 1970s, Stanford University Professor James Gibbons developed a similar technique, which he called Tutored Videotape Instruction (TVI). Like DSH, TVI was based on showing recorded classroom lectures to groups of students, accompanied by a “tutor” whose job was to stop the tape periodically and ask questions. Evaluations of TVI showed that students’ learning from TVI was as good as or better than in-classroom learning and that the weakest students academically learned more from participating in TVI instruction than from attending lectures in person. See J. F. Gibbons, W. R. Kincheloe, and S. K. Down, “Tutored Video-tape Instruction: A New Use of Electronics Media in Education,” Science, vol. 195 (1977), pp. 1136–49.
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Chenwen Hong

Chenwen Hong's Groups | Diigo - Groups - 0 views

  •  
    The issue of body scanner
  •  
    This is the issue of body scanning we discussed on Friday
1 - 9 of 9
Showing 20 items per page