Skip to main content

Home/ beyondwebct/ Group items tagged use

Rss Feed Group items tagged

Barbara Lindsey

danah boyd | apophenia » "Real Names" Policies Are an Abuse of Power - 0 views

  • The people who most heavily rely on pseudonyms in online spaces are those who are most marginalized by systems of power. “Real names” policies aren’t empowering; they’re an authoritarian assertion of power over vulnerable people. T
  • what many folks failed to notice is that countless black and Latino youth signed up to Facebook using handles. Most people don’t notice what black and Latino youth do online. Likewise, people from outside of the US started signing up to Facebook and using alternate names. Again, no one noticed because names transliterated from Arabic or Malaysian or containing phrases in Portuguese weren’t particularly visible to the real name enforcers. Real names are by no means universal on Facebook, but it’s the importance of real names is a myth that Facebook likes to shill out. And, for the most part, privileged white Americans use their real name on Facebook. So it “looks” right.
  • privileged people
  • ...4 more annotations...
  • If companies like Facebook and Google are actually committed to the safety of its users, they need to take these complaints seriously. Not everyone is safer by giving out their real name. Quite the opposite; many people are far LESS safe when they are identifiable. And those who are least safe are often those who are most vulnerable.
  • Likewise, the issue of reputation must be turned on its head when thinking about marginalized people. Folks point to the issue of people using pseudonyms to obscure their identity and, in theory, “protect” their reputation.
  • The assumption baked into this is that the observer is qualified to actually assess someone’s reputation. All too often, and especially with marginalized people, the observer takes someone out of context and judges them inappropriately based on what they get online.
  • There is no universal context, no matter how many times geeks want to tell you that you can be one person to everyone at every point. But just because people are doing what it takes to be appropriate in different contexts, to protect their safety, and to make certain that they are not judged out of context, doesn’t mean that everyone is a huckster. Rather, people are responsibly and reasonably responding to the structural conditions of these new media. And there’s nothing acceptable about those who are most privileged and powerful telling those who aren’t that it’s OK for their safety to be undermined. And you don’t guarantee safety by stopping people from using pseudonyms, but you do undermine people’s safety by doing so.
Barbara Lindsey

How Teenagers Are Using Technology in Their Social Lives (REPORT PDF)| The Committed Sa... - 0 views

  • I'm tempted to be skeptical because the information is from Ericsson ConsumerLab, a division of the mobile technology giant Ericsson - a company that has a vested interest in promoting the use of technology by teenagers. But some results may not be all that surprising, such as a decrease in the use of home phones and an increase in the use of mobile devices such as smart phones. Or that teens and adults use technology differently. Well, duh... spend any time with a teenager on a regular basis and that's obvious. It's also not news that video chatting is on the rise, but it may at the very least confirm perceptions and some opinions.
Barbara Lindsey

Using Open Content To Drive Educational Change | FunnyMonkey - 0 views

  • The differences between open content and traditional textbooks only begin with the production and distribution of the text. When we look at the types of teaching, learning, and assessment that become more accessible when using open content, we can start to get a clearer picture of the pedagogical rationale that makes remixable and reusable content a better choice than a traditional textbook.
  • generally, when a text is being used within a course, the structure of the text creates the structure of the course.
  • The text becomes a point of reference for the ongoing work in the class.
    • Barbara Lindsey
       
      Is this necessarily a problem?
  • ...1 more annotation...
  • most teachers who use a textbook deviate from it. Most teachers plan lessons and curriculum that go beyond where the text ends, or that address deficiencies in the text. These lessons and activities form a shadow text that help drive quality classrooms. Yet, within the world of the traditional textbook, these improvements or options never make it back into the textbook. Many of these innovative practices never get shared with colleagues in the same building.
    • Barbara Lindsey
       
      Interesting point!
Barbara Lindsey

American Express - Hong Kong - Personal Information Collection Statement - 0 views

  • When you give us information about you we are collecting it in order to review your application for products and services this applies to both existing and potentially new customers. We will use information for operation of your account, provision of products and services and for marketing purposes. Please note that if you do not provide the information required in the mandatory fields we may be unable to process your request. Security
  • In all other cases we will not disclose customer information unless we have previously informed the customer, have been authorized by the customer, or are required to do so by law or other regulatory authority. In particular, when a court order or subpoena requires us to disclose information, we notify the customer promptly to provide an opportunity to exercise his or her legal rights. The only exceptions to this policy are when court order or law prohibits us from notifying the customer, or in cases in which fraud and/or criminal activity is suspected. Further, we will not use medical information for marketing purposes or to provide credit.
  • Please do keep in mind that if you take advantage of an offer from an American Express business partner and become their customer, they may independently wish to send offers to you. In this case, you will need to inform them separately if you do not wish to receive future offers from them.
  • ...1 more annotation...
  • We do share information about you within the American Express Group of Companies so we can provide you with products and services and bring you information about other American Express products and services. All American Express Companies comply with The American Express Privacy Principles.  
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

Remix Culture -- Videos -- Center for Social Media - 0 views

  •  
    Just under 4 minute video designed to prompt discussion about fair use of copyrighted works. Linked to their Code of Best Practice in Fair Use for Online Video
Barbara Lindsey

50 Ways to Use Wikis for a More Collaborative and Interactive Classroom | Smart Teaching - 0 views

  • Make it a class project to collaboratively write a reference book that others can use.
  • sk students to create study guides for a specific part of the unit you’re
  • Get your class to create a glossary of terms they use and learn about in new units, adding definitions and images.
  • ...7 more annotations...
  • Encourage students to submit words that they had trouble with, along with a dictionary entry
  • Let your students share their collective information so that everyone gets a better understanding of the subject.
  • Make it a class project to create an FAQ for your classroom that will help new students and those that will come in years later.
  • Encourage students to draft rules and policies for the classroom.
  • Using a wiki platform, students don’t have to worry about web design, so they can focus on content instead.
  • Save links, documents, and quotes related to units or your classroom as a whole
  • Work with other teachers to create lesson plans and track students’ success.
Celeste Arrieta

Consensus: Podcasting Has No 'Inherent' Pedagogic Value -- Campus Technology - 1 views

  • "Podcasting does not contain any inherent value. It is only valuable inasmuch as it helps the instructor and students reach their educational goals, by facilitating thoughtful, engaging learning activities that are designed to work in support of those goals."
    • Barbara Lindsey
       
      You are on a job interview. You've been asked if and how you would use podcasting with your students. How would you respond?
    • Inas Ayyoub
       
      As a language teacher , I would highly be interested in using podcasting with my students. The point here comes to not only ask students to download certain podcasts to repeat words and have an all time accessable materials to improve pronunciation and study vocabs. The ability to link what students listen to on the podcasts with post activities to be performed in the classroom that help them even go beyond what that podcast has to offer, is one key to do that. So, using podcasting hould be highly planned and integrated in a way that serves our desired outcomes that will lead at the end to empower students to create or add podcasts that serve that as well.
    • Barbara Lindsey
       
      Inas-this is a wonderful example of extending the learning outside the classroom and then bringing it back into the classroom to reinforce and advance students' competencies. If you were on an interview, you might want to give a specific example. Could you think of one?
    • Celeste Arrieta
       
      ...and how the tool is connected to the class goal so it can be meaningful for the learning experience. Personally, I used them frequently as "realia" sources to develop other activities.
    • Celeste Arrieta
       
      I can't find my sticky notes for this web site. I did it 3 times. If you can see any of them, please let me know. Thanks
  • ...1 more annotation...
  • "The answer to that question depends entirely on the educational context, including goals and appropriate learning activities, and on how the tool is implemented,"
    • Celeste Arrieta
       
      ...and how the tool is connected to the class goal so it can be meaningful for the learning experience. Personally, I used them frequently as "realia" sources to develop other activities.
Barbara Lindsey

Higher Education Reimagined With Online Courseware - Education Life - NYTimes.com - 0 views

  • M.I.T. officials like to tell about an unsolicited comment they received one day about the online course “Introduction to Solid State Chemistry.” “I learned a LOT from these lectures and the other course material,” the comment said. “Thank you for having it online.” The officials did a double take. It was from Bill Gates. (Really.)
  • But just 9 percent of those who use M.I.T. OpenCourseWare are educators. Forty-two percent are students enrolled at other institutions, while another 43 percent are independent learners like Mr. Gates. Yale, which began putting free courses online just four years ago, is seeing similar proportions: 25 percent are students, a majority of them enrolled at Yale or prospective students; just 6 percent are educators; and 69 percent are independent learners.
  • Professor Shankar is working on his second semester of recorded videos, and says that the experience has improved his teaching.
  • ...14 more annotations...
  • So Professor Shankar has begun inserting links to specific portions of Professor Lewin’s course, and, “since any mistake would affect larger numbers of students listening online,” he says, he thinks harder about every topic he teaches in the classroom.
  • His intense, animated ruminations — the title of his course is “Death” — have brought fan mail from Mexico, Iraq, Korea and China. Several months ago, he got a response from somebody suffering from a brain injury and who was using the lectures to exercise his mind. “I don’t think anyone knows what this will do to education 15 years from now,” Professor Kagan says. “But even if it does nothing more than that, that’s enough.”
  • The backers of free courseware acknowledge the benefit of self-enrichment. Still, they say they expect open education not only to expand access to information but also to lead to success in higher education, particularly among low-income students and those who are first in their family to go to college.
  • Carnegie Mellon’s Open Learning Initiative is working with teams of faculty members, researchers on learning and software engineers to develop e-courses designed to improve the educational experience.
  • Carnegie Mellon is working with community colleges to build four more courses, with the three-year goal of 25 percent more students passing when the class is bolstered by the online instruction.
  • The intended user is the beginning college student, whom Dr. Smith describes as “someone with limited prior knowledge in a college subject and with little or no experience in successfully directing his or her own learning.”
  • . “We now have the technology that enables us to go back to what we all know is the best educational experience: personalized, interactive engagement,” Dr. Smith says.
  • That won’t happen, and in the terms-of-use section of Open Yale Courses, the university makes that clear. Besides not granting degrees or certificates, open courses do not offer direct access to faculty. They, in other words, are strictly “for those who wish to learn,” as the Web site says. “Its purpose is not to duplicate a Yale education.”
  • Open courseware is a classic example of disruptive technology, which, loosely defined, is an innovation that comes along one day to change a product or service, often standing an industry on its head. Craigslist did this to newspapers by posting classified ads for free. And the music industry got blindsided when iTunes started unbundling songs from albums and selling them for 99 cents apiece.
  • Mr. Schonfeld sees still more potential in “unbundling” the four elements of educating: design of a course, delivery of that course, delivery of credit and delivery of a degree. “Traditionally, they’ve all lived in the same institutional setting.” Must all four continue to live together, or can one or more be outsourced?
  • P2PU’s mission isn’t to develop a model and stick with it. It is to “experiment and iterate,” says Ms. Paharia, the former executive director of Creative Commons. She likes to talk about signals, a concept borrowed from economics. “Having a degree is a signal,” she says. “It’s a signal to employers that you’ve passed a certain bar.” Here’s the radical part: Ms. Paharia doesn’t think degrees are necessary. P2PU is working to come up with alternative signals that indicate to potential employers that an individual is a good thinker and has the skills he or she claims to have — maybe a written report or an online portfolio.
  • David Wiley, associate professor of instructional psychology and technology at Brigham Young University, is an adviser to P2PU. For the past several years, he has been referring to “the disaggregation of higher education,” the breaking apart of university functions. Dr. Wiley says that models like P2PU address an important component missing from open courseware: human support. That is, when you have a question, whom can you ask? “No one gets all the way through a textbook without a dozen questions,” he says. “Who’s the T.A.? Where’s your study group?” “If you go to M.I.T. OpenCourseWare, there’s no way to find out who else is studying the same material and ask them for help,” he says. At P2PU, a “course organizer” leads the discussion but “you are working together with others, so when you have a question you can ask any of your peers. The core idea of P2PU is putting people together around these open courses.”
  • Mr. Reshef’s plan is to “take anyone, anyone whatsoever,” as long as they can pass an English orientation course and a course in basic computer skills, and have a high school diploma or equivalent. The nonprofit venture has accepted, and enrolled, 380 of 3,000 applicants, and is trying to raise funds through microphilanthropy — “$80 will send one student to UoPeople for a term” — through social networking.
  • Mr. Reshef has used $1 million of his own money to start the University of the People, which taps open courses that other universities have put online and relies on student interaction to guide learning; students even grade one another’s papers.
Barbara Lindsey

Scholar 2.0: Public Intellectualism Meets the Open Web - 1 views

  • for the most part, knowledge created by academics is placed mostly in outlets that can be accessed only by “the knowledge elite.”
  • I have become so used to publishing directly to the Web that I felt shackled by the constraints of the print medium.
  • open access and peer-review are NOT mutually exclusive
  • ...12 more annotations...
  • you write something really important, sign over your rights to a for-profit publisher and then that publisher charges YOUR university (and potentially other subscribers; individual or organizational) a fee to carry that journal. In other words, you are giving your knowledge to a company so they can sell it back to your university
  • Hypertext is the (not so) new endnote/footnote.
  • Most print journals STILL cannot handle color graphics. With incredible advances in data visualization technology, there must be a move to publishing to the Web directly.
  • As a result of her use of various forms of social media, Ravitch has (amazingly) positioned herself as the leading voice of the counter-narrative to the dominant educational policy agenda.
  • motivated by sharing with others, a blog allows scholars to disseminate content and express opinions to larger audiences than more traditional outlets. Second, needing room for creativity and self-reflection, the blog is a tool for practicing writing and for keeping up-to-date and remembering; it is a space to house early articulations of one’s ideas. Finally, valuing connections, the participants used their blogs for interacting and creating relationships with others.
  • A recent post about charter schools on Dr. Baker's blog includes 25 comments which, together, comprise a great argument between Bruce, Stuart Buck and Kevin Welner. That conversation happened "in public," not at some exclusive conference or behind some paywall. How can you read that conversation and not recognize the value of blogs as spaces for scholarly communication?
  • there is a real need for content-area experts who can serve as curators.
  • One could certainly argue that content curation is not a new kind of authorship. Editing books or journals is about content curation and has traditionally "counted" as authorship for tenure and promotion purposes. However, at the risk of sounding repetitive, our tools for content creation are new.
  • Social bookmarking tools are also incredibly simple to use and ideal for curating content. Diigo and Delicious are the two most widely adopted free social bookmarking services. Users can "bookmark" sites, aggregate them using tags, and then share their collections publicly.
  • unlike content curation in a print medium, that collection is dynamic (I can add or delete at any time) and interactive (visitors can comment on any of the items in the collection and start a conversation of sorts). I believe this to be a truly modern and increasingly important form of scholarly activity. 
  • There are other forms of modern scholarly activity that are well-worth considering, including webinars and podcasting.
  • Gideon Burton, Assistant Professor of English at Brigham Young University, who writes: I don't want to be complicit in sustaining a knowledge economy that rewards its participants when they invest in burying and restricting knowledge. This is why Open Access is more than a new model for scholarly publishing, it is the only ethical move available to scholars who take their own work seriously enough to believe its value lies in how well it engages many publics and not just a few peers (para. 7).
  •  
    For BWCT 2011 syllabus
Barbara Lindsey

Learning Reimagined: Participatory, Peer, Global, Online | DMLcentral - 1 views

  • I have found that in both my traditional physical classrooms and online environments, the chances of successful outcomes are multiplied when every person in the group makes a commitment to active participation in helping others learn.
  • When a sufficient number of people jump in and start contributing and building on one another's contributions, it becomes clear to all that it's not just about the teacher's performance and the student's ability to complete assignments. It's about our joint effort to make the whole of our encounter more valuable than just the sum of our individual learning.
  • I type roles on the whiteboard and show how to use the whiteboard tools to enter, format and move around elements. Roles include searchers, chat summarizers, session summarizers, mindmap leaders, session bloggers. I ask co-learners to write their own names on the whiteboard next to the roles they want to take, show them how to create break-out rooms to coordinate their collaborations, and ask the summarizers to feed their output to the bloggers, who take responsibility for posting a reflective summary of the session later
    • Barbara Lindsey
       
      How about we try this out in our online sessions?
  • ...8 more annotations...
  • It's confusing at first, but it is also flowing.
  • Yes, we're a collective intelligence, which is exhilarating, but we're a toddler collective intelligence, stumbling around learning to walk and trying to figure out where we're going at the same time. A number of new skills are required in short order. Information and communication flow through multiple simultaneous channels. The enterprise is challenging - that's part of the exercise. Taking my direction from George Siemens' ideas about networked learning ("we emphasize that early course experiences tend to be overwhelming and chaotic") I assure co-learners early and often that we can relax, accept and even embrace the chaos, and regard our networked attempts to make sense of it as the scaffold for our co-learning. 
  • Instead of seeking to put every fact in its place in an existing well-ordered taxonomy, why not seek to learn together by asking questions about what puzzles us, then organizing our discussions and mining them for knowledge?
  • Sometimes, I get into predicaments and don't know how to quit a webtour or place people in breakout rooms. So I calmly start exploring possible solutions, talking about it as I try to recover. While doing so, I also talk about the importance of exploring close enough to the edge to fall over it frequently. I model tolerance for error, learning from error, pushing the envelope of tech. Indeed, I've found that the earlier I can break something and fix it in public, the better. We talk about what works and what doesn't, discard what doesn't suit our purposes, push a tool further if it helps us learn together. It requires regular doses of humility to abandon what seemed like a bright idea at the time.
  • The objective is a culture of conversation that troubleshoots practical skills, explores theoretical underpinnings, dissects social implications.
  • Our internal social bookmarks enable us to create a mini-collective-intelligence by gathering resources about our discussion topics, selecting or writing descriptive snippets, assigning tags. The emerging tag-cloud serves as an index to the resources.
  • Wiki-work is about collaborative authoring.
  • In the process of using these tools to try to make sense together, we co-construct our learning. The last week of the course is about re-examining our learning process, reiterating the most important things we've learned, and redesigning the parts of the process that didn't work so well.
  •  
    fall 2011 syllabus
Barbara Lindsey

How Musicians Can Use Creative Commons | DIY Musician - 0 views

  •  
    Could use as rationale for academia, too.
Barbara Lindsey

Do Students Know Enough Smart Learning Strategies? | MindShift - 0 views

  • recent finding by PISA, the Programme for International Student Assessment, which administers academic proficiency tests to students around the globe, and place American students in the mediocre middle. “Students who use appropriate strategies to understand and remember what they read, such as underlining important parts of the texts or discussing what they read with other people, perform at least 73 points higher in the PISA assessment—that is, one full proficiency level or nearly two full school years—than students who use these strategies the least,” the PISA report reads.
  • Askell-Williams and her colleagues found that those students who used fewer of these strategies reported more difficulty coping with their schoolwork. For the second part of their study, they designed a series of proactive questions for teachers to drop into the lesson on a “just-in-time” basis—at the moments when students could use the prompting most. These questions, too, can be adopted by any parent or educator to make sure that children know not just what is to be learned, but how. What is the topic for today’s lesson? What will be important ideas in today’s lesson? What do you already know about this topic? What can you relate this to? What will you do to remember the key ideas? Is there anything about this topic you don’t understand, or are not clear about?
Barbara Lindsey

This is how to Use iPad to Enhance Students Reading Skills - 0 views

  •  
    Some great ideas that can be used for world languages, too!
Barbara Lindsey

Facilitating Learner Voice and Presence in the Classroom Using Mobile Devices... - 1 views

  • What follows are the mobile activities I used in this course to get to know the learners, have them get to know one another, and build a sense of community.
    • Barbara Lindsey
       
      Could any of these activities be used in your classes? How would they enhance the learning already going on? Any concerns about any of these activities?
Barbara Lindsey

Word Clouds | JamieKeddie.com - 0 views

  •  
    Gives example of using wordle to create a word cloud of the lyrics to a song. Students guess the content and then use Wordle to help them with the full text of the lyrics.
Barbara Lindsey

Classroom in the Cloud: 5 Awesome Things You Can Do With an IPad and an LCD Projector - 0 views

  •  
    The original post about using an iPad as a classroom doc camera and 5 ideas for using it. Comments also have additional suggestions.
Barbara Lindsey

How to Use QR Codes in Student Projects - SimpleK12 - 0 views

  •  
    Some basic ideas for using QR Codes for student/parent resources
Barbara Lindsey

Home | The Cooper International Learning Center - 0 views

  •  
    Great site organizationally and content-wise. Wonderful use of blogging for authentic, contextualized student use of TL.
Barbara Lindsey

Moving at the Speed of Creativity - Academic Integrity on a Digital Campus by Berlin Fang - 0 views

  • Causes of Academic Dishonesty from literature: Craig, Federici & Buehler, 2010 Academic - assessment design - education about academic dishonesty - poor understanding of citation styles - “poor understanding of the proper use of intellectual property”
  • Ethical - cutting corners - work ethics - cultureal differences Personal - personal maturity - “poor time management skills” - “new to college experience” Academic dishonesty can be defined as “anything with gives students an unearned advantage academically” - see Hart and Morgan, 2010
  • We also use TurnItIn.com Encourage professors to use questions from randomized question blocks Provide resources - Writing Center - Library Resources - Endnote
  • ...3 more annotations...
  • One example: LockDown Browser - students are locked down to just that browser - highly recommended by Berlin, stop students from digitally multi-tasking during exams in class
  • You need to have published policies and procedures about academic dishonesty - policies, syllabus, and enforcement Education is key - do this as part of orientation - special seminars for students - workshops for teachers
  • It comes down to this: “Life itself is open book” “Open is the new normal” - some assessment can be made out in the open so students can have their own identities - like blogs - I was very impressed by Dr. Alec Couros‘ presentation yesterday about how students are using their blogs
« First ‹ Previous 41 - 60 of 622 Next › Last »
Showing 20 items per page