Skip to main content

Home/ Diigo In Education/ Group items tagged Technology privacy

Rss Feed Group items tagged

Ross Davis

islt9440 - Group 7: Diigo for Education - About diigo.com - 86 views

  • Diigo highlighting tool allows the teacher or student to highlight in an article or a web page
  • The key concepts or vocabulary words could be highlighted to check for understanding. Some students have problems determining what should be highlighted in an article or passage. Teachers could use this tool to demonstrate how to correctly highlight and find the key points.
  • About diigo.com page Details and Tags Print Download PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion history notify me Protected Details last edit by cmh459 Sunday, 7:53 pm - 36 revisions Tags none About diigo.comDiigo or Digest of Internet Information, Groups and Other stuff is a social bookmarking site that allows its users to bookmark and tag websites. Users are also able to highlight information and put sticky notes directly on the webpage as you are reading it. Your notes can be public which allows other users to view and comment on your notes and add their own or it can be private. Sites can be saved and stored for later reading and commenting. Users can also join groups with similar interests and follow specific people and sites. Teachers can register for an educator account that allows a teacher to create accounts for an entire class. In an education account, students are automatically set up as a Diigo group which allows for easy sharing of documents, pictures, videos, and articles with only your class group. There are also pre-set privacy settings so only the teacher and classmates can see the bookmarks and communications. This is a great way to ensure that your students and their comments are kept private from the rest of the Internet community. Diigo is a great tool for teachers to use to have students interact with material and to share that interaction with classmates. Best Practices for using Diigo tools Tagging Tool Teachers or students can tag a website that they want to bookmark for future reference. Teachers can research websites or articles that they want their students to view on a certain topic and tag them for the students. This tool is nice when researching a certain topic. The teacher can tag the websites that the students should use eliminating the extra time of searching for the sites that would be useful and appropriate for the project.Highlighting Tool Diigo highlighting tool allows the teacher or student to highlight in an article or a web page . 1The key concepts or vocabulary words could be highlighted to check for understanding. Some students have problems determining what should be highlighted in an article or passage. Teachers could use this tool to demonstrate how to correctly highlight and find the key points. Sticky Notes Tool The sticky note tool is a great addition to the tools of diigo. Students may add sticky notes to a passage as they are reading it. The sticky notes could be used to make notes or ask questions by the students. Teachers could postition the sticky notes in the passage for students to respond to various ideas as they are reading. Students could use sticky notes to peer edit and make comments on other student's work through Google docs. These are just a few ideas of how to apply the diigo tools to your teaching practices. Both students and teachers benefit form using these tools. The variety of uses or practices give both groups a hands on way of dealing with text while making it more efficient. Bookmark/Snapsho
  • ...10 more annotations...
  • islt9440 - Group 7: Diigo for Education guest · Join · Help · Sign In · Join this Wiki Recent Changes Manage Wiki Group 7 Project HomeDiigo RSS FeedsSample Lesson Plans Social Studies Spanish Math (Functions) Math (Geometry) Collaboration Pages Collaboration Home Job Assignments Project Info Lesson Plan Ideas About diigo.com page Details and Tags Print Download PDF Backlinks Source Delete Rename Redirect Permissions Lock discussion history notify me Protected Details last edit by cmh459 Sunday, 7:53 pm - 36 revisions Tags none About diigo.com Diigo or Digest of Internet Information, Groups and Other stuff is a social bookmarking site that allows its users to bookmark and tag websites. Users are also able to highlight information and put sticky notes directly on the webpage as you are reading it. Your notes can be public which allows other users to view and comment on your notes and add their own or it can be private. Sites can be saved and stored for later reading and commenting. Users can also join groups with si
  • Diigo or Digest of Internet Information, Groups and Other stuff is a social bookmarking site that allows its users to bookmark
  • and tag websites
  • Diigo highlighting tool allows the teacher or student to highlight in an article or a web page.
  • The key concepts or vocabulary words could be highlighted to check for understanding
  • Diigo highlighting tool allows the teacher or student to highlight in an article or a web page. The key concepts or vocabulary words could be highlighted to check for understanding
  • Diigo highlighting tool allows the teacher or student to highlight in an article or a web page. The key concepts or vocabulary words could be highlighted to check for understanding. Some students have problems determining what should be highlighted in an article or passage. Teachers could use this tool to demonstrate how to correctly highlight and find the key points.
  • Diigo highlighting tool allows the teacher or student to highlight in an article or a web page.
  • Teachers or students can tag a website that they want to bookmark for future reference. Teachers can research websites or articles that they want their students to view on a certain topic and tag them for the students.This tool is nice when researching a certain topic. The teacher can tag the websites that the students should use eliminating the extra time of searching for the sites that would be useful and appropriate for the project.
  • The sticky note tool is a great addition to the tools of diigo. Students may add sticky notes to a passage as they are reading it. The sticky notes could be used to make notes or ask questions by the students.Teachers could postition the sticky notes in the passage for students to respond to various ideas as they are reading.Students could use sticky notes to peer edit and make comments on other student's work through Google docs.
  •  
    My group for my grad class, "Learning with the Internet" created this wiki about using and implementing Diigo in the classroom.
Jeff Andersen

TECHNOLOGY AS A THREAT TO PRIVACY: Ethical Challenges - 5 views

  •  
    The aim of this paper is to assess the impact of technology on the private lives of people. It is approached from a socio-ethical perspective with specific emphasis on the implication for the information profession. The issues discussed are the concept privacy, he influence of technology on the processing of personal and private information, the relevance of this influence for the information profession, and proposed solutions to these ethical issues for the information profession.
Nancy Cheng

Paralegal Guide to Technology, Privacy and Free Speech | Paralegal.net - 1 views

  •  
    This guide uses accessible language to warn about common privacy issues in using social media. It has pointers to useful articles and examples of how data mining can expose personal details.
Christina Melly

A dozen ways to teach ethical and safe technology use - Home - Doug Johnson's... - 142 views

  • Responsible teachers recognize that schools must give students the understandings and skills they need to stay safe not just in school, but outside of school where most Internet use by young people occurs. Over-filtered school networks set up a false sense of security; the real world of the Internet is quite different from the Internet at school.
    • Rob Weston
       
      Can't agree enough with this, the over-use of filters in schools is making everybody complacent when it comes to teaching students to self-filter.
    • Christina Melly
       
      Right -- if students don't take ownership of their own messages, we see a lot more of those inappropriate messages when the "babysitter" is taken away.
  • A district’s current acceptable use policy should include language about posting private information about both oneself and others
  • A district’s current acceptable use policy should include language about posting private information about both oneself and others
  • ...5 more annotations...
  • Verbalization of how we personally make decisions is a very powerful teaching tool, but it’s useless to lecture about safe and appropriate use when we ourselves might not follow our own rules.
  • If you're not making mistakes, then you're not doing anything
  • 9. Create environments that help students avoid temptations
  • Assess children’s understanding of ethical concepts. Do not give technology-use privileges until a student has demonstrated that he or she knows and can apply school policies. Test appropriate use prior to students gaining online access.
  • Privacy - I will protect my privacy and respect the privacy of others. Property - I will protect my property and respect the property of others. a(P)propriate Use - I will use technology in constructive ways and in ways which do not break the rules of my family, church, school, or government.
  •  
    2. Stress the consideration and application of principles rather than relying on a detailed set of rules. Although sometimes more difficult to enforce in a consistent manner, a set of a few guidelines* rather than lengthy set of specific rules is more beneficial to students in the long run. By applying guidelines rather than following rules, students engage in higher level thinking processes and learn behaviors that will continue into their next classroom, their homes, and their adult lives.
  •  
    Teaching ethical and safe use of ICTs.
jlesher

Ed Tech Must Embrace Stronger Student Privacy Laws -- THE Journal - 21 views

    • jlesher
       
      Important thoughts about privacy
  • Adoption of these technologies has raised significant questions about student privacy because vendors are storing personal student data on servers located outside of a district's physical jurisdiction.
Kalin Wilburn

Write In Private: Free Online Diary And Personal Journal | Penzu - 2 views

  • Write in Private
  • Your own personal journal and online diary.
  • Don't want to share everything with the world? Easily keep your personal thoughts, memories,and ideas safe and secure in the cloud!
  • ...4 more annotations...
  • Rich in Features Privacy First  Penzu was designed to focus on your privacy. Unlike blogging,your entries are private by default. A Picture Is Worth A Thousand…Insert your own photos (now with flickr) and bring your entries to life! Share If You Want To  You can shareyour individual entries via email or createa public link and share with the world... Instant Search  Find long-lost entries quickly and easily with our fast filtered search and sorting.
  • Good for You Less Stress  Expressive writing is an extremely cathartic process, helping you to relax and release stress. More → Be Healthier  Numerous studies have shown that keeping a journal can improve your immune function. More → Get Smarter  Keeping a journal or diary can not only boost your "working memory" but your grades too. More → Lose Weight  Keeping a food diary has been suggested to double weight-loss when combined with a diet. More →
  • Serious Privacy
  • Locking  You can password protect your individual entries for extra privacy. Or, with a Penzu Pro account, you can lock the contents of your entries using military-grade encryption and a unique distributed security process to keep your data safe. SSL  Your entries are even more secure with 128-bit SSL, the same technology used by online banks to transfer information across the web. That means all entries, passwords, and data are safely sent to our servers from your computer or device. Read All About Security →
anonymous

Through the Keyhole: Observations on the Ravi Trial | text2cloud - 1 views

  • martphone and the webcam have made it possible for all manner of sexual activity to be recorded and distributed for all the world to see free of charge. This is one way to explain why none of the people who read Ravi’s original tweet, none of the young women crowded around Wei’s computer to see what Clementi and his guest were up to, and none of the people who received Ravi’s invitation to view Clementi’s next liaison bestirred themselves to stay his hand. As Cicco testified, they “really didn’t think that it was that big of a deal.”
  •  
    The trial in the cyberspying case at Rutgers is now underway. There is so much here for students and teachers at all levels to consider about ethics, privacy, and the digital life sentence for the accused in the Age of the Google Search. I don't think even our most technologically adept students quite realize that what they text and tweet is there forever.
anonymous

text2cloud - 63 views

  •  
    Text2cloud is a collaborative effort to explore idea-driven writing with the web imagined as the primary destination. Engaging with the end of privacy, school violence, censorship, and the transformation of literacy, text2cloud aims to spur similar uses of multimedia for reflection, meditation, deliberation, and speculation--in sum, the introspective arts on associates with the life of the mind.
  •  
    Threads on campus violence, how the loss of privacy in the digital age is transforming life on campus, and how public life is changed by the proliferation of concealed cameras. Navigational makeover introduced to improve reading experience. Feedback welcome.
Matt Renwick

Privacy Concerns for ClassDojo and Other Tracking Apps for Schoolchildren - NYTimes.com - 44 views

  • “I have told all my staff, ‘You cannot display this data publicly,’
  • threatening them into compliance
  • ClassDojo does not seek explicit parental consent
Laura Doto

Final Report: Friendship | DIGITAL YOUTH RESEARCH - 1 views

  • Social relations—not simply physical space—structure the social worlds of youth.
    • Laura Doto
       
      A critical conclusion to be realized that can inform our assumptions as educators.
  • When teens are involved in friendship-driven practices, online and offline are not separate worlds—they are simply different settings in which to gather with friends and peers
  • these dynamics reinforce existing friendship patterns as well as constitute new kinds of social arrangements.
  • ...43 more annotations...
  • Homophily describes the likelihood that people connect to others who share their interests and identity.
  • One survey of Israeli teens suggests that those who develop friendships online tend toward less homogenous connections than teens who do not build such connections
  • Teens frequently use social media as additional channels of communication to get to know classmates and turn acquaintances into friendships.
  • Some teens—especially marginalized and ostracized ones—often relish the opportunity to find connections beyond their schools. Teens who are driven by specific interests that may not be supported by their schools, such as those described in the Creative Production and Gaming chapters, often build relationships with others online through shared practice.
  • there are plenty of teens who relish the opportunity to make new connections through social media, this practice is heavily stigmatized
  • the public myths about online “predators” do not reflect the actual realities of sexual solicitation and risky online behavior (Wolak et al. 2008). Not only do unfounded fears limit teenagers unnecessarily, they also obscure preventable problematic behavior
  • As she described her typical session on Photobucket, it became clear that a shared understanding of friendship and romance was being constructed by her and other Photobucket users:
  • The fact that they draw from all of these sources suggests that youth’s friendship maintenance is in tune with a discourse of love and friendship that is being widely displayed and (re)circulated.
  • “It’s like have you noticed that you may have someone in your Top 8 but you’re not in theirs and you kinda think to yourself that you’re not as important to that person as they are to you . . . and oh, to be in the coveted number-one spot!”
  • Taking someone off your Top 8 is your new passive-aggressive power play when someone pisses you off.
  • Top Friends are persistent, publicly displayed, and easily alterable. This makes it difficult for teens to avoid the issue or make excuses such as “I forgot.” When pressured to include someone, teens often oblige or attempt to ward off this interaction by listing those who list them
  • Other teens avoid this struggle by listing only bands or family members. While teens may get jealous if other peers are listed, family members are exempt from the comparative urge.
  • to avoid social drama with her friends:
  • The Top Friends feature is a good example of how structural aspects of software can force articulations that do not map well to how offline social behavior works.
  • teens have developed a variety of social norms to govern what is and is not appropriate
  • The problem with explicit ranking, however, is that it creates or accentuates hierarchies where they did not exist offline, or were deliberately and strategically ambiguous, thus forcing a new set of social-status negotiations. The give-and-take over these forms of social ranking is an example of how social norms are being negotiated in tandem with the adoption of new technologies, and how peers give ongoing feedback to one another as part of these struggles to develop new cultural standards.
  • While teen dramas are only one component of friendship, they are often made extremely visible by social media. The persistent and networked qualities of social media alter the ways that these dramas play out in teen life. For this reason, it is important to pay special attention to the role that social media play in the negotiation of teen status.
  • primarily a continuation of broader dramas.
  • social media amplify dramas because they extend social worlds beyond the school.
  • Gossip and rumors have played a role in teen struggles for status and attention since well before social media entered the scene
  • social media certainly alter the efficiency and potential scale of interactions. Because of this, there is greater potential for gossip to spread much further and at a faster pace, making social media a culprit in teen drama. While teen gossip predates the Internet, some teens blame the technologies for their roles in making gossip easier and more viral
  • That’s what happened with me and my friends. We got into a lot of drama with it and I was like, anyone can write anything. It can be fact, fiction. Most people, what they read they believe. Even if it’s not true (C.J. Pascoe, Living Digital).
  • finds the News Feed useful “because it helps you to see who’s keeping track of who and who’s talking to who.” She enjoys knowing when two people break up so that she knows why someone is upset or when she should reach out to offer support. Knowing this information also prevents awkward conversations that might reference the new ex. While she loves the ability to keep up with the lives of her peers, she also realizes that this means that “everybody knows your business.”
  • Some teens find the News Feed annoying or irrelevant. Gadil, an Indian 16-year-old from Los Angeles, thinks that it is impersonal while others think it is downright creepy. For Tara, a Vietnamese 16-year-old from Michigan, the News Feed takes what was public and makes it more public: “Facebook’s already public. I think it makes it way too like stalker-ish.” Her 18-year-old sister, Lila, concurs and points out that it gets “rumors going faster.” Kat, a white 14-year-old from Salem, Massachusetts, uses Facebook’s privacy settings to hide stories from the News Feed for the sake of appearances.
  • While gossip is fairly universal among teens, the rumors that are spread can be quite hurtful. Some of this escalates to the level of bullying. We are unable to assess whether or not bullying is on the rise because of social media. Other scholars have found that most teens do not experience Internet-driven harassment (Wolak, Mitchell, and Finkelhor 2007). Those who do may not fit the traditional profile of those who experience school-based bullying (Ybarra, Diener-West, and Leaf 2007), but harassment, both mediated and unmediated, is linked to a myriad of psychosocial issues that includes substance use and school problems (Hinduja and Patchin 2008; Ybarra et al. 2007).
  • Measuring “cyberbullying” or Internet harassment is difficult, in part because both scholars and teens struggle to define it. The teens we interviewed spoke regularly of “drama” or “gossip” or “rumors,” but few used the language of “bullying” or “harassment” unless we introduced these terms. When Sasha, a white 16-year-old from Michigan, was asked specifically about whether or not rumors were bullying, she said: I don’t know, people at school, they don’t realize when they are bullying a lot of the time nowadays because it’s not so much physical anymore. It’s more like you think you’re joking around with someone in school but it’s really hurting them. Like you think it’s a funny inside joke between you two, but it’s really hurtful to them, and you can’t realize it anymore. Sasha, like many of the teens we interviewed, saw rumors as hurtful, but she was not sure if they were bullying. Some teens saw bullying as being about physical harm; others saw it as premeditated, intentionally malicious, and sustained in nature. While all acknowledged that it could take place online, the teens we interviewed thought that most bullying took place offline, even if they talked about how drama was happening online.
  • it did not matter whether it was online or offline; the result was still the same. In handling this, she did not get offline, but she did switch schools and friend groups.
  • Technology provides more channels through which youth can potentially bully one another. That said, most teens we interviewed who discussed being bullied did not focus on the use of technology and did not believe that technology is a significant factor in bullying.
  • They did, though, see rumors, drama, and gossip as pervasive. The distinction may be more connected with language and conception than with practice. Bianca, a white 16-year-old from Michigan, sees drama as being fueled by her peers’ desire to get attention and have something to talk about. She thinks the reason that people create drama is boredom. While drama can be hurtful, many teens see it simply as a part of everyday social life.
  • Although some drama may start out of boredom or entertainment, it is situated in a context where negotiating social relations and school hierarchies is part of everyday life. Teens are dealing daily with sociability and related tensions.
  • Tara thinks that it emerges because some teens do not know how to best negotiate their feelings and the feelings of others.
  • Teens can use the ability to publicly validate one another on social network sites to reaffirm a friendship.
  • So, while drama is common, teens actually spend much more time and effort trying to preserve harmony, reassure friends, and reaffirm relationships. This spirit of reciprocity is common across a wide range of peer-based learning environments we have observed.
  • From this perspective, commenting is not as much about being nice as it is about relying on reciprocity for self-gain
  • That makes them feel like they’re popular, that they’re getting comments all the time by different people, even people that they don’t know. So it makes them feel popular in a way (Rural and Urban Youth).
  • Gossip, drama, bullying, and posing are unavoidable side effects of teens’ everyday negotiations over friendship and peer status. What takes place in this realm resembles much of what took place even before the Internet, but certain features of social media alter the dynamics around these processes. The public, persistent, searchable, and spreadable nature of mediated information affects the way rumors flow and how dramas play out. The explicitness surrounding the display of relationships and online communication can heighten the social stakes and intensity of status negotiation. The scale of this varies, but those who experience mediated harassment are certainly scarred by the process. Further, the ethic of reciprocity embedded in networked publics supports the development of friendships and shared norms, but it also plays into pressures toward conformity and participation in local, school-based peer networks. While there is a dark side to what takes place, teens still relish the friendship opportunities that social media provide.
  • While social warfare and drama do exist, the value of social media rests in their ability to strengthen connections. Teens leverage social media for a variety of practices that are familiar elements of teen life: gossiping, flirting, joking around, and hanging out. Although the underlying practices are quite familiar, the networked, public nature of online communication does inflect these practices in new ways.
  • Adults’ efforts to regulate youth access to MySpace are the latest example of how adults are working to hold on to authority over teen socialization in the face of a gradual erosion of parental influence during the teen years.
  • learning how to manage the unique affordances of networked sociality can help teens navigate future collegiate and professional spheres where mediated interactions are assumed.
  • articulating those friendships online means that they become subject to public scrutiny in new ways;
  • This makes lessons about social life (both the failures and successes) more consequential and persistent
  • make these dynamics visible in a more persistent and accessible public arena.
  • co-constructing new sets of social norms together with their peers and the efforts of technology developers. The dynamics of social reciprocity and negotiations over popularity and status are all being supported by participation in publics of the networked variety as formative influences in teen life. While we see no indication that social media are changing the fundamental nature of these friendship practices, we do see differences in the intensity of engagement among peers, and conversely, in the relative alienation of parents and teachers from these social worlds.
  •  
    MacArthur Foundation Study - Friendship chapter
Roland Gesthuizen

Teachers demand protocol for emails - smh.com.au - 101 views

  •  
    "Teachers across NSW will refuse to respond to student and parent emails unless all public and private schools put protocols in place to deal with the after-hours use of technology, privacy issues and legal concerns. "
  •  
    Check the date please... Dec 2002 is what shows when I read article. Were you doing historical piece on changes?
Steven Szalaj

Flipping the Switches on Facebook's Privacy Controls - NYTimes.com - 31 views

  •  
    A description of what FB can do with your actions, posts and clicks and how you can control what FB does with that information.  Sort of.
Kelvin Thompson

Twiducate.com - Social Networking For Schools - 64 views

  •  
    cipals and teachers. Our goal is to provide social networking for you and your 21st century learning students. We respect student privacy and as such only you and your students can view your network and posts. Give your students the skills they need to survive in today's technological world!
Randolph Hollingsworth

FERPA and Social Media | Faculty Focus - 44 views

  • FERPA was never intended to place students into the box of a physical or online classroom to prevent them from learning from the public.
  •  
    Great approach to helping instructors understand some basic issues of student privacy and the role of social media. This kind of argument might encourage people to assign the use of (and contribution to) open educational resources. "FERPA was never intended to place students into the box of a physical or online classroom to prevent them from learning from the public."
D. S. Koelling

Embracing the Cloud: Caveat Professor - The Digital Campus - The Chronicle of Higher Ed... - 37 views

  • My work as chief privacy and security officer at a large public university has, however, given me pause to ask if our posture toward risk prevents us from fully embracing technology at a moment of profound change.
  • Consequently, faculty members are accepting major personal and institutional risk by using such third-party services without any institutional endorsement or support. How we provide those services requires a nuanced view of risk and goes to the heart of our willingness to trust our own faculty and staff members.
  • The technologically savvy among us recognize that hard physical, virtual, and legal boundaries actually demark this world of aggressively competitive commercial entities. Our students, faculty, and staff often do not.
  • ...5 more annotations...
  • But can we embrace the cloud? Can the faculty member who wears our institution's name in her title and e-mail address, to whom we've entrusted the academic and research mission of the institution, be trusted to reach into the cloud and pluck what she believes is the optimal tool to achieve her pedagogical aims and use it? Unfortunately, no. Many faculty and staff members simply use whatever service they choose, but they often do not have the knowledge or experience needed to evaluate those choices. And those who do try to work through the institution soon find themselves mired in bureaucracy.
  • First we review the company's terms of service. Of course, we also ask the company for any information it can provide on its internal data security and privacy practices. Our purchasing unit rewrites the agreement to include all of the state-required procurement language; we also add our standard contract language on data security. All of this information is fed into some sort of risk assessment of varying degrees of formality, depending on the situation, and, frankly, the urgency. That leads to yet another round of modifications to the agreement, negotiations with the company, and, finally, if successful, circulation for signatures. After which we usually exhume the corpse of the long-deceased faculty member and give him approval to use the service in his class. We go through this process not from misguided love of bureaucracy, but because our institutions know of no other way to manage risk. That is, we have failed to transform ourselves so we can thrive and compete in the 21st century.
  • But our faculty and staff are increasingly voting with their feet—they're more interested in the elegance, portability, and integration of commercial offerings, despite the inability to control how those programs change over time. By insisting on remaining with homegrown solutions, we are failing to fall in lockstep with those we support.
  • Data security? Of course there are plenty of fly-by-night operations with terrible security practices. However, as the infrastructure market has matured (one of the generally unrecognized benefits of cloud services), more and more small companies can provide assurances of data security that would shame many of us even at large research-intensive institutions.
  • If higher education is to break free of the ossified practices of the past, we must find ways to transfer risk acceptance into the faculty domain—that is, to enable faculty to accept risk. Such a transformation is beyond the ability of the IT department alone—it will require our campus officials, faculty senates, registrars, and research and compliance officers working together to deeply understand both the risks and the benefits
tapiatanova

A Social Network Can Be a Learning Network - The Digital Campus - The Chronicle of High... - 98 views

  • Sharing student work on a course blog is an example of what Randall Bass and Heidi Elmendorf, of Georgetown University, call "social pedagogies." They define these as "design approaches for teaching and learning that engage students with what we might call an 'authentic audience' (other than the teacher), where the representation of knowledge for an audience is absolutely central to the construction of knowledge in a course."
    • trisha_poole
       
      Very important - social pedagogies for authentic tasks - a key for integrating SNTs in the classroom.
    • Daniel Spielmann
       
      Agreed, for connectivism see also www.connectivism.ca
  • External audiences certainly motivate students to do their best work. But students can also serve as their own authentic audience when asked to create meaningful work to share with one another.
    • Daniel Spielmann
       
      The last sentence is especially important in institutional contexts where the staff voices their distrust against "open scholarship" (Weller 2011), web 2.0 and/or open education. Where "privacy" is deemed the most important thing in dealing with new technologies, advocates of an external audience have to be prepared for certain questions.
    • tapiatanova
       
      yes! nothing but barriers! However, it is unclear if the worries about pravacy are in regards to students or is it instructors who fear teaching in the open. everyone cites FERPA and protection of student identities, but I have yet to hear any student refusing to work in the open...
  • Students most likely won't find this difficult. After all, you're asking them to surf the Web and tag pages they like. That's something they do via Facebook every day. By having them share course-related content with their peers in the class, however, you'll tap into their desires to be part of your course's learning community. And you might be surprised by the resources they find and share.
  • ...9 more annotations...
  • back-channel conversations
  • While keynote speakers and session leaders are speaking, audience members are sharing highlights, asking questions, and conversing with colleagues on Twitter
    • trisha_poole
       
      An effective use of Twitter that can be translated to classrooms.
    • Daniel Spielmann
       
      All classrooms?
    • John Dorn
       
      classrooms where students are motivated to learn. Will this work in a HS classroom where kids just view their phones as a means to check up on people? Maybe if they can see "cool" class could be if they were responsible for the freedoms that would be needed to use twitter or other similar sites.
  • Ask your students to create accounts on Twitter or some other back-channel tool and share ideas that occur to them in your course. You might give them specific assignments, as does the University of Connecticut's Margaret Rubega, who asks students in her ornithology class to tweet about birds they see. During a face-to-face class session, you could have students discuss their reading in small groups and share observations on the back channel. Or you could simply ask them to post a single question about the week's reading they would like to discuss.
  • A back channel provides students a way to stay connected to the course and their fellow students. Students are often able to integrate back channels into their daily lives, checking for and sending updates on their smartphones, for instance. That helps the class become more of a community and gives students another way to learn from each other.
  • Deep learning is hard work, and students need to be well motivated in order to pursue it. Extrinsic factors like grades aren't sufficient—they motivate competitive students toward strategic learning and risk-averse students to surface learning.
  • Social pedagogies provide a way to tap into a set of intrinsic motivations that we often overlook: people's desire to be part of a community and to share what they know with that community.
  • Online, social pedagogies can play an important role in creating such a community. These are strong motivators, and we can make use of them in the courses we teach.
  • The papers they wrote for my course weren't just academic exercises; they were authentic expressions of learning, open to the world as part of their "digital footprints."
    • Daniel Spielmann
       
      Yes, but what is the relation between such writing and ("proper"?) academic writing?
  • Collaborative documents need not be text-based works. Sarah C. Stiles, a sociologist at Georgetown, has had her students create collaborative timelines showing the activities of characters in a text, using a presentation tool called Prezi.com. I used that tool to have my cryptography students create a map of the debate over security and privacy. They worked in small groups to brainstorm arguments, and contributed those arguments to a shared debate map synchronously during class.
  •  
    A great blog post on social pedagogies and how they can be incorporated in university/college classes. A good understanding of creating authentic learning experiences through social media.
  •  
    A great blog post on social pedagogies and how they can be incorporated in university/college classes. A good understanding of creating authentic learning experiences through social media.
  •  
    A great blog post on social pedagogies and how they can be incorporated in university/college classes. A good understanding of creating authentic learning experiences through social media.
Kelly Sereno

SIRS: Making Students Literate in Digital Age - 70 views

    • Kelly Sereno
       
      Pro - Argument #1
  • The American Library Association encourages schools and libraries to think twice before keeping kids off social media, saying such prohibition "does not teach safe behavior and leaves youth without the necessary knowledge and skills to protect their privacy or engage in responsible speech." Their policy statement on the topic says that instead of restricting access, librarians and teachers "should educate minors to participate responsibly, ethically and safely."
  • Perhaps the biggest objection to widespread use of social sites is the likelihood that kids will encounter irrelevant or even offensive material--a fear that many teachers say is overblown. While the Web can seem like "a sea of pornography and idiots," says James Lerman, the author of several books on educational technology, schools must help students figure out how to navigate it so they "can get to the good stuff" that's applicable to school.
  • ...1 more annotation...
  • The American Library Association encourages schools and libraries to think twice before keeping kids off social media, saying such prohibition "does not teach safe behavior and leaves youth without the necessary knowledge and skills to protect their privacy or engage in responsible speech.
DON PASSENANT

Straight from the DOE: Dispelling Myths About Blocked Sites | MindShift - 31 views

    • DON PASSENANT
       
      This is great info to use when trying to convince districts to ease up on blocks.
  • hese are technology tools that are put in place to filter sites that are inappropriate. These filters are getting better and better.
  • What we have had is what I consider brute force technologies that shut down wide swaths of the Internet, like all of YouTube, for example. Or they may shut down anything that has anything to do with social media, or anything that is a game.
  • ...4 more annotations...
  • How do we educate this generation of young people to be safe online, to be secure online, to protect their personal information, to understand privacy, and how that all plays out when they’re in an online space.
  • re schools or teachers circumventing rules if they show YouTube videos or other blocked sites to students?
  • not circumventing the rules.
  • If the technology fails us and filters something appropriate and useful, and if teachers in their professional judgment think it’s appropriate, they should be able to show it. Teachers need to impose their professional judgment on materials that are available to their students.
Derrick Grose

Moving beyond "mountains of dead and mulched - 28 views

  •  
    Cory Doctorow discusses the future of books and libraries and what appeals to adolescent readers in an age where technology both inhibits and promotes freedom.
1 - 20 of 37 Next ›
Showing 20 items per page