Skip to main content

Home/ beyondwebct/ Group items matching "activity" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Barbara Lindsey

Shirky: A Group Is Its Own Worst Enemy - 1 views

  • April 24, 2003
  • I want to talk about a pattern I've seen over and over again in social software that supports large and long-lived groups.
  • definition of social software
  • ...59 more annotations...
  • It's software that supports group interaction
  • how radical that pattern is. The Internet supports lots of communications patterns, principally point-to-point and two-way, one-to-many outbound, and many-to-many two-way.
  • Prior to the Internet, the last technology that had any real effect on the way people sat down and talked together was the table.
  • We've had social software for 40 years at most, dated from the Plato BBS system, and we've only had 10 years or so of widespread availability, so we're just finding out what works. We're still learning how to make these kinds of things.
  • If it's a cluster of half a dozen LiveJournal users, on the other hand, talking about their lives with one another, that's social. So, again, weblogs are not necessarily social, although they can support social patterns.
  • So email doesn't necessarily support social patterns, group patterns, although it can. Ditto a weblog. If I'm Glenn Reynolds, and I'm publishing something with Comments Off and reaching a million users a month, that's really broadcast.
  • So there's this very complicated moment of a group coming together, where enough individuals, for whatever reason, sort of agree that something worthwhile is happening, and the decision they make at that moment is: This is good and must be protected. And at that moment, even if it's subconscious, you start getting group effects. And the effects that we've seen come up over and over and over again in online communities.
  • You are at a party, and you get bored. You say "This isn't doing it for me anymore. I'd rather be someplace else.
  • The party fails to meet some threshold of interest. And then a really remarkable thing happens: You don't leave.
  • That kind of social stickiness is what Bion is talking about.
  • Twenty minutes later, one person stands up and gets their coat, and what happens? Suddenly everyone is getting their coats on, all at the same time. Which means that everyone had decided that the party was not for them, and no one had done anything about it, until finally this triggering event let the air out of the group, and everyone kind of felt okay about leaving.
  • This effect is so steady it's sometimes called the paradox of groups.
  • what's less obvious is that there are no members without a group.
  • there are some very specific patterns that they're entering into to defeat the ostensible purpose of the group meeting together. And he detailed three patterns.
  • The first is sex talk,
  • second basic pattern
  • The identification and vilification of external enemies.
  • So even if someone isn't really your enemy, identifying them as an enemy can cause a pleasant sense of group cohesion. And groups often gravitate towards members who are the most paranoid and make them leaders, because those are the people who are best at identifying external enemies.
  • third pattern Bion identified: Religious veneration
  • The religious pattern is, essentially, we have nominated something that's beyond critique.
  • So these are human patterns that have shown up on the Internet, not because of the software, but because it's being used by humans. Bion has identified this possibility of groups sandbagging their sophisticated goals with these basic urges. And what he finally came to, in analyzing this tension, is that group structure is necessary. Robert's Rules of Order are necessary. Constitutions are necessary. Norms, rituals, laws, the whole list of ways that we say, out of the universe of possible behaviors, we're going to draw a relatively small circle around the acceptable ones.
  • He said the group structure is necessary to defend the group from itself. Group structure exists to keep a group on target, on track, on message, on charter, whatever. To keep a group focused on its own sophisticated goals and to keep a group from sliding into these basic patterns. Group structure defends the group from the action of its own members.
  • technical and social issues are deeply intertwined. There's no way to completely separate them.
  • Some of the users wanted the system to continue to exist and to provide a forum for discussion. And other of the users, the high school boys, either didn't care or were actively inimical. And the system provided no way for the former group to defend itself from the latter.
  • What matters is, a group designed this and then was unable, in the context they'd set up, partly a technical and partly a social context, to save it from this attack from within. And attack from within is what matters.
  • This pattern has happened over and over and over again. Someone built the system, they assumed certain user behaviors. The users came on and exhibited different behaviors. And the people running the system discovered to their horror that the technological and social issues could not in fact be decoupled.
  • nd the worst crisis is the first crisis, because it's not just "We need to have some rules." It's also "We need to have some rules for making some rules." And this is what we see over and over again in large and long-lived social software systems. Constitutions are a necessary component of large, long-lived, heterogenous groups.
  • As a group commits to its existence as a group, and begins to think that the group is good or important, the chance that they will begin to call for additional structure, in order to defend themselves from themselves, gets very, very high.
  • The downside of going for size and scale above all else is that the dense, interconnected pattern that drives group conversation and collaboration isn't supportable at any large scale. Less is different -- small groups of people can engage in kinds of interaction that large groups can't. And so we blew past that interesting scale of small groups. Larger than a dozen, smaller than a few hundred, where people can actually have these conversational forms that can't be supported when you're talking about tens of thousands or millions of users, at least in a single group.
  • So the first answer to Why Now? is simply "Because it's time." I can't tell you why it took as long for weblogs to happen as it did, except to say it had absolutely nothing to do with technology. We had every bit of technology we needed to do weblogs the day Mosaic launched the first forms-capable browser. Every single piece of it was right there. Instead, we got Geocities. Why did we get Geocities and not weblogs? We didn't know what we were doing.
  • It took a long time to figure out that people talking to one another, instead of simply uploading badly-scanned photos of their cats, would be a useful pattern. We got the weblog pattern in around '96 with Drudge. We got weblog platforms starting in '98. The thing really was taking off in 2000. By last year, everyone realized: Omigod, this thing is going mainstream, and it's going to change everything.
  • Why was there an eight-year gap between a forms-capable browser and the Pepys diaries? I don't know. It just takes a while for people to get used to these ideas. So, first of all, this is a revolution in part because it is a revolution. We've internalized the ideas and people are now working with them. Second, the things that people are now building are web-native.
  • A weblog is web-native. It's the web all the way in. A wiki is a web-native way of hosting collaboration. It's lightweight, it's loosely coupled, it's easy to extend, it's easy to break down. And it's not just the surface, like oh, you can just do things in a form. It assumes http is transport. It assumes markup in the coding. RSS is a web-native way of doing syndication. So we're taking all of these tools and we're extending them in a way that lets us build new things really quickly.
  • Third, in David Weinberger's felicitous phrase, we can now start to have a Small Pieces Loosely Joined pattern.
  • You can say, in the conference call or the chat: "Go over to the wiki and look at this."
  • It's just three little pieces of software laid next to each other and held together with a little bit of social glue. This is an incredibly powerful pattern. It's different from: Let's take the Lotus juggernaut and add a web front-end.
  • And finally, and this is the thing that I think is the real freakout, is ubiquity.
  • In many situations, all people have access to the network. And "all" is a different kind of amount than "most." "All" lets you start taking things for granted.
  • But for some groups of people -- students, people in high-tech offices, knowledge workers -- everyone they work with is online. Everyone they're friends with is online. Everyone in their family is online.
  • And this pattern of ubiquity lets you start taking this for granted.
  • There's a second kind of ubiquity, which is the kind we're enjoying here thanks to Wifi. If you assume whenever a group of people are gathered together, that they can be both face to face and online at the same time, you can start to do different kinds of things. I now don't run a meeting without either having a chat room or a wiki up and running. Three weeks ago I ran a meeting for the Library of Congress. We had a wiki, set up by Socialtext, to capture a large and very dense amount of technical information on long-term digital preservation.
  • The people who organized the meeting had never used a wiki before, and now the Library of Congress is talking as if they always had a wiki for their meetings, and are assuming it's going to be at the next meeting as well -- the wiki went from novel to normal in a couple of days.
  • It really quickly becomes an assumption that a group can do things like "Oh, I took my PowerPoint slides, I showed them, and then I dumped them into the wiki. So now you can get at them." It becomes a sort of shared repository for group memory. This is new. These kinds of ubiquity, both everyone is online, and everyone who's in a room can be online together at the same time, can lead to new patterns.
  • "What is required to make a large, long-lived online group successful?" and I think I can now answer with some confidence: "It depends."
  • The normal experience of social software is failure. If you go into Yahoo groups and you map out the subscriptions, it is, unsurprisingly, a power law. There's a small number of highly populated groups, a moderate number of moderately populated groups, and this long, flat tail of failure. And the failure is inevitably more than 50% of the total mailing lists in any category. So it's not like a cake recipe. There's nothing you can do to make it come out right every time.
  • Of the things you have to accept, the first is that you cannot completely separate technical and social issues.
  • So the group is real. It will exhibit emergent effects. It can't be ignored, and it can't be programmed, which means you have an ongoing issue. And the best pattern, or at least the pattern that's worked the most often, is to put into the hands of the group itself the responsibility for defining what value is, and defending that value, rather than trying to ascribe those things in the software upfront.
  • Members are different than users. A pattern will arise in which there is some group of users that cares more than average about the integrity and success of the group as a whole. And that becomes your core group, Art Kleiner's phrase for "the group within the group that matters most."
  • But in all successful online communities that I've looked at, a core group arises that cares about and gardens effectively. Gardens the environment, to keep it growing, to keep it healthy.
  • The core group has rights that trump individual rights in some situations
  • And absolute citizenship, with the idea that if you can log in, you are a citizen, is a harmful pattern, because it is the tyranny of the majority. So the core group needs ways to defend itself -- both in getting started and because of the effects I talked about earlier -- the core group needs to defend itself so that it can stay on its sophisticated goals and away from its basic instincts.
  • All groups of any integrity have a constitution. The constitution is always partly formal and partly informal. A
  • If you were going to build a piece of social software to support large and long-lived groups, what would you design for? The first thing you would design for is handles the user can invest in.
  • Second, you have to design a way for there to be members in good standing. Have to design some way in which good works get recognized. The minimal way is, posts appear with identity.
  • Three, you need barriers to participation.
  • It has to be hard to do at least some things on the system for some users, or the core group will not have the tools that they need to defend themselves.
  • The user of social software is the group, not the individual.
  • Reputation is not necessarily portable from one situation to another
  • If you want a good reputation system, just let me remember who you are. And if you do me a favor, I'll remember it. And I won't store it in the front of my brain, I'll store it here, in the back. I'll just get a good feeling next time I get email from you; I won't even remember why. And if you do me a disservice and I get email from you, my temples will start to throb, and I won't even remember why. If you give users a way of remembering one another, reputation will happen,
Barbara Lindsey

Inspiring Teachers - Tips - How to Involve and Engage Students - Empowering Educators Around the World - classroom resources, tips, articles, newsletter, books, webinars, & free web pages - 1 views

  • Give students "clues" to look for items in the classroom that relate to your topic of study. Put students on a "scavenger hunt". Once they find the item, they must explain why it is on the scavenger hunt. Let students go on a road trip. Place different stop signs around the school or classroom with an activity or reading passage. Students must "travel" to each place and complete the activity (idea courtesy of Beaver Elementary). Give students a "passport" that must be stamped at each "stop" on their trip.
    • Barbara Lindsey
       
      Do as a qr code, too.
Barbara Lindsey

Pre-Reading | Foreign Language Teaching Methods: Reading - 0 views

  • Brainstorming:
    • Barbara Lindsey
       
      How could you use word cloud generators for this?
  • The goal is to activate the learners' horizon of expectation, and help learners identify what the text is about
  • ideally
  • ...3 more annotations...
  • learner-centered
  • Skimming:
  • skim the first paragraph or page of the text, look at illustrations and subtitles, and identify the words in the text that explain the "who," "what," "where," and "when" of the text content
Barbara Lindsey

How-To Guide | Schoolshape - 0 views

  •  
    methods 2012
Barbara Lindsey

Curriculum21 - Annotexting - 0 views

  • Students are asked to read closely, cite evidence, and make evidence based inferences when they read. They are expected to deepen their learning by valuing textual evidence and reading critically.  Annotating text is one way students can cite textual evidence, infer and deepen meaning as they read..
  • Annotations make thinking visible for teachers and students. We can use the words and features of a text to better comprehend it, ask questions, and note our thoughts while reading. One goal of comprehension is that students will be proficient annotators of texts to understand more deeply by interacting and making thinking transparent while they read.
  • There are many reasons to ask students to annotate text: for basic comprehension, to show evidence of conceptual understanding, to show what is implied, to identify the claims in an argument, to read like a writer and identify characteristics of genre, to notice the nuance of language…and many other reasons.   Giving guidance as to what we want students to annotate for will be beneficial for the reader. Otherwise, they will annotate everything that comes to mind, and the work may not be helpful to the reader or the teacher.
  • ...2 more annotations...
  • Students submit their annotations via their smart phones or other digital devices, and then analyze each other’s notations collectively.  They could be looking for main ideas, thematic and literary elements, or big ideas from the work.   They could be looking for evidence of connections to other texts, their own experiences, or world issues. They could simply be searching for meaning to support them when reading complex texts. In addition, students could reflect on the collective evidence as a metacognitive activity to assess their own learning.  Perhaps the collaborative exercise raised new questions for them or offered them new ways of thinking about the text. Perhaps there is something else the student wants or needs to know?
  • What would have changed in the interpretation of this poem if our perspectives were woven together? Does the collaborative process of conversation yield a greater product? Does the thinking extend when multiple perspectives are mixed? Does the evidence yield to strategic thinking when multiple viewpoints are involved?
Barbara Lindsey

Technology-Driven Community Building Activities - Home - 0 views

  •  
    fall 2012 syllabus
Barbara Lindsey

Team and Community Building Using Mobile Devices « User Generated Education - 0 views

Barbara Lindsey

Students' Own Mobile Devices and Celly Provide Peer Feedback « User Generated Education - 1 views

  • Peer Feedback in an Interview Activity
    • Barbara Lindsey
       
      Any ideas for using this activity with your students?
Barbara Lindsey

A Texting Communications Exercise « User Generated Education - 1 views

  • This activity is an adaptation of the Back-to-Back Communications Exercise.  Students found a partner.  One volunteered to give the directions, the other to be the drawer.  They exchanged phone numbers and the drawers went to another room.  The direction givers were provided with the following drawing and told to text in words (one student asked if he could send a picture) the description of the drawing.  The goal was for the drawer to reproduce the drawing to scale.
    • Barbara Lindsey
       
      Could a personalized (for you and your students) version of this activity be used as an authentic assessment? Any questions? Comments? Concerns?
Barbara Lindsey

An Experiential, Mobile-Device Driven Communications Exercise « User Generated Education - 1 views

  • I adapted the Bridge-It communications exercise to incorporate my students’ (most ages 17-20) mobile devices.  It combined some of my favorite instructional strategies:
    • Barbara Lindsey
       
      Do you think this activity could be used in your classes? How would you modify it? Would it address assessment? Would it be authentic? Any other comments?
Barbara Lindsey

Facilitating Learner Voice and Presence in the Classroom Using Mobile Devices « User Generated Education - 1 views

  • What follows are the mobile activities I used in this course to get to know the learners, have them get to know one another, and build a sense of community.
    • Barbara Lindsey
       
      Could any of these activities be used in your classes? How would they enhance the learning already going on? Any concerns about any of these activities?
Barbara Lindsey

Using Mobile Devices and Technology to Enhance Emotional Intelligence « User Generated Education - 2 views

  • These students, as a group, are classified as lower income students.  None of their devices had the capability to download apps.  What this says to me as the educator is that when I am designing activities that use the students own devices in my BYOD classroom, that they cannot include the use of apps.  They have camera, email, texting, internet capabilities, but no way to use apps. 
  • As you can see the uploaded images created a personalized feelings poster.  Students were provided with scenarios and asked to locate on the Interactive White Board which of these displayed images that they created best represented how they would feel in that situation.
    • Barbara Lindsey
       
      Could you imagine using this activity with your students and if so, how would you modify it?
Barbara Lindsey

The New Gold Mine: Your Personal Information & Tracking Data Online - WSJ.com - 0 views

  • the tracking of consumers has grown both far more pervasive and far more intrusive than is realized by all but a handful of people in the vanguard of the industry. • The study found that the nation's 50 top websites on average installed 64 pieces of tracking technology onto the computers of visitors, usually with no warning. A dozen sites each installed more than a hundred. The nonprofit Wikipedia installed none.
  • the Journal found new tools that scan in real time what people are doing on a Web page, then instantly assess location, income, shopping interests and even medical conditions. Some tools surreptitiously re-spawn themselves even after users try to delete them. • These profiles of individuals, constantly refreshed, are bought and sold on stock-market-like exchanges that have sprung up in the past 18 months.
  • Advertisers once primarily bought ads on specific Web pages—a car ad on a car site. Now, advertisers are paying a premium to follow people around the Internet, wherever they go, with highly specific marketing messages.
  • ...22 more annotations...
  • "It is a sea change in the way the industry works," says Omar Tawakol, CEO of BlueKai. "Advertisers want to buy access to people, not Web pages."
  • The Journal found that Microsoft Corp.'s popular Web portal, MSN.com, planted a tracking file packed with data: It had a prediction of a surfer's age, ZIP Code and gender, plus a code containing estimates of income, marital status, presence of children and home ownership, according to the tracking company that created the file, Targus Information Corp.
  • Tracking is done by tiny files and programs known as "cookies," "Flash cookies" and "beacons." They are placed on a computer when a user visits a website. U.S. courts have ruled that it is legal to deploy the simplest type, cookies, just as someone using a telephone might allow a friend to listen in on a conversation. Courts haven't ruled on the more complex trackers.
  • tracking companies sometimes hide their files within free software offered to websites, or hide them within other tracking files or ads. When this happens, websites aren't always aware that they're installing the files on visitors' computers.
  • Often staffed by "quants," or math gurus with expertise in quantitative analysis, some tracking companies use probability algorithms to try to pair what they know about a person's online behavior with data from offline sources about household income, geography and education, among other things. The goal is to make sophisticated assumptions in real time—plans for a summer vacation, the likelihood of repaying a loan—and sell those conclusions.
  • Consumer tracking is the foundation of an online advertising economy that racked up $23 billion in ad spending last year. Tracking activity is exploding. Researchers at AT&T Labs and Worcester Polytechnic Institute last fall found tracking technology on 80% of 1,000 popular sites, up from 40% of those sites in 2005.
  • The Journal found tracking files that collect sensitive health and financial data. On Encyclopaedia Britannica Inc.'s dictionary website Merriam-Webster.com, one tracking file from Healthline Networks Inc., an ad network, scans the page a user is viewing and targets ads related to what it sees there.
    • Barbara Lindsey
       
      Tracking you an targeting ads to you on a popular dictionary site!
  • Beacons, also known as "Web bugs" and "pixels," are small pieces of software that run on a Web page. They can track what a user is doing on the page, including what is being typed or where the mouse is moving.
  • The majority of sites examined by the Journal placed at least seven beacons from outside companies. Dictionary.com had the most, 41, including several from companies that track health conditions and one that says it can target consumers by dozens of factors, including zip code and race.
  • After the Journal contacted the company, it cut the number of networks it uses and beefed up its privacy policy to more fully disclose its practices.
  • Flash cookies can also be used by data collectors to re-install regular cookies that a user has deleted. This can circumvent a user's attempt to avoid being tracked online. Adobe condemns the practice.
  • Most sites examined by the Journal installed no Flash cookies. Comcast.net installed 55.
  • Wittingly or not, people pay a price in reduced privacy for the information and services they receive online. Dictionary.com, the site with the most tracking files, is a case study.
  • Think about how these technologies and the associated analytics can be used in other industries and social settings (e.g. education) for real beneficial impacts. This is nothing new for the web, the now that it has matured, it can be a positive game-changer.
  • Media6Degrees Inc., whose technology was found on three sites by the Journal, is pitching banks to use its data to size up consumers based on their social connections. The idea is that the creditworthy tend to hang out with the creditworthy, and deadbeats with deadbeats.
  • "There are applications of this technology that can be very powerful," says Tom Phillips, CEO of Media6Degrees. "Who knows how far we'd take it?"
  • Hidden inside Ashley Hayes-Beaty's computer, a tiny file helps gather personal details about her, all to be put up for sale for a tenth of a penny.
  • "We can segment it all the way down to one person," says Eric Porres, Lotame's chief marketing officer.
  • One of the fastest-growing businesses on the Internet, a Wall Street Journal investigation has found, is the business of spying on Internet users.
  • Yahoo Inc.'s ad network,
  • "Every time I go on the Internet," she says, she sees weight-loss ads. "I'm self-conscious about my weight," says Ms. Reid, whose father asked that her hometown not be given. "I try not to think about it…. Then [the ads] make me start thinking about it."
  • Information about people's moment-to-moment thoughts and actions, as revealed by their online activity, can change hands quickly. Within seconds of visiting eBay.com or Expedia.com, information detailing a Web surfer's activity there is likely to be auctioned on the data exchange run by BlueKai, the Seattle startup.
  •  
    a New York company that uses sophisticated software called a "beacon" to capture what people are typing on a website
Barbara Lindsey

Principle III. Provide Multiple Means of Engagement | National Center On Universal Design for Learning - 0 views

  • Offering learners choices can develop self-determination, pride in accomplishment, and increase the degree to which they feel connected to their learning. However, it is important to note that individuals differ in how much and what kind of choices they prefer to have. It is therefore not enough to simply provide choice. The right kind of choice and level of independence must be optimized to ensure engagement.
  • In an educational setting, one of the most important ways that teachers recruit interest is to highlight the utility and relevance, of learning and to demonstrate that relevance through authentic, meaningful activities. It is a mistake, of course, to assume that all learners will find the same activities or information equally relevant or valuable to their goals. To recruit all learners equally, it is critical to provide options that optimize what is relevant, valuable, and meaningful to the learner.
  • Vary activities and sources of information so that they can be:  Personalized and contextualized to learners’ lives  Culturally relevant and responsive  Socially relevant Age and ability appropriate  Appropriate for different racial, cultural, ethnic, and gender groups
  • ...5 more annotations...
  • The level of perceived challenge The type of rewards or recognition available The context or content used for practicing and assessing skills The tools used for information gathering or production The color, design, or graphics of layouts, etc. The sequence or timing for completion of subcomponents of tasks
  • it is important to build in periodic or persistent “reminders” of both the goal and its value in order for them to sustain effort and concentration in the face of distracters.
  • Prompt or require learners to explicitly formulate or restate goal Display the goal in multiple ways Encourage division of long-term goals into short-term objectives Demonstrate the use of hand-held or computer-based scheduling tools Use prompts or scaffolds for visualizing desired outcome  Engage learners in assessment discussions of what constitutes excellence and generate relevant examples that connect to their cultural background and interests 
  • Mastery-oriented feedback is the type of feedback that guides learners toward mastery rather than a fixed notion of performance or compliance.
  • Provide feedback that is frequent, timely, and specific Provide feedback that is substantive and informative rather than comparative or competitive
1 - 20 of 110 Next › Last »
Showing 20 items per page