Skip to main content

Home/ educators/ Group items tagged identity

Rss Feed Group items tagged

1More

Jure Klepic: Social Media Influence Is Much More Than This Forbes List Shows - 3 views

  •  
    Jure Klepic nails it in his critique of the Forbes 2013 list of Social Media influencers. If you're clueless about social media, don't make a list. Jure says "It seems that today everyone thinks they can write and preach about influence, even though they have no clue as to what influence is. In order to rank people on the ability to influence we need to understand influence, not just define it. When people just try to define influence they come away with something as useless as what is used in this post. The real definition of influence is quite simple -- influence is the power to sway. But understanding influence is far more than just knowing this definition. Understanding influence in contemporary online world means understanding contemporary notions of identity and identity construction. Identity, ideas of person and self are cultural constructs; they are ideas and values that are part of our culture. So the real question here should not be who will make the next Forbes list, but how can the author of an article about influence omit the names of so many of the brightest and best thought leaders in the field? "
2More

Protect Yourself from Internet Scams - Subscribe to Internet ScamBuste (...).URL - 4 views

  •  
    "Internet Scams, Identity Theft, and Urban Legends: Are You at Risk?" Unfortunately, as we hear every single day, being smart is NOT enough to protect yourself from dangerous Internet scams, frustrating spam, or devious identity theft
  •  
    Unfortunately, as we hear every single day, being smart is NOT enough to protect yourself from dangerous Internet scams, frustrating spam, or devious identity theft
1More

Boys secure in their racial identity seek more diverse friendships - 0 views

  •  
    "Children often seek answers from parents, friends and media to better understand their racial identity. Middle school boys who feel secure about their race during this ongoing information gathering will likely befriend diverse people, according to a new University of Michigan study."
2More

The Innovative Educator: The Innovative Educator's Advice for Managing Your Digital Foo... - 19 views

  • I branded myself to have an online identity of which I’m proud. This is an important skill to teach students. Equally important is conveying the idea that being safe and responsible online does not mean hiding your identity but rather defining it and owning it.
  •  
    Equally important is conveying the idea that being safe and responsible online does not mean hiding your identity but rather defining it and owning it. Below are articles I have written for educators and parents to help their students do the same.
2More

Personas | Metropath(ologies) | An installation by Aaron Zinman - 12 views

  •  
    Enter your name, and Personas scours the web for information and attempts to characterize the person - to fit them to a predetermined set of categories that an algorithmic process created from a massive corpus of data. The computational process is visualized with each stage of the analysis, finally resulting in the presentation of a seemingly authoritative personal profile.
  •  
    "Personas is a component of the Metropath(ologies) exhibit, recently on display at the MIT Museum by the Sociable Media Group from the MIT Media Lab (Please contact us if you want to show it next!). It uses sophisticated natural language processing and the Internet to create a data portrait of one's aggregated online identity. In short, Personas shows you how the Internet sees you. "
1More

Controlling Your Digital Identity is as Easy as 1-2-3 - 22 views

  •  
    digital footprint presentation by Dean Shareski recently presented at #BLC10 - excellent for teachers.
1More

Education Innovation: Social Media and The Role of Personal Branding In Education - 11 views

  •  
    it is crucial to monitor and define our online identities. We need to start thinking of those Google results as our resume and clean up anything that doesn't belong there.
11More

Play It Safe: Hackers use the back door to get into your computer; a strong, well-chose... - 0 views

  • For the home user, however, password safety requires more than on-the-fly thinking. Pacheco suggests a system built around a main word for all instances. The distinction is that the name of the site is added somewhere. For example, if the main word is "eggplant," the password might be "eggyyplant" Yahoo, "eggplantgg" for Google or "wleggplant" for Windows Live. He suggests listing the variations in an Excel spreadsheet.
  • Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
  • "A good password is the most important part of Internet security," said Robert Pacheco, the owner of Computer Techs of San Antonio. "It's the beginning and end of the issue. You can't stop it (hacking). You do what you can do to prevent it. You just try to stop most of it." A strong firewall, as well as spyware -- and virus-detection software -- protect a computer's so-called "back door," Pacheco said, where a hacker can gain access through various cyber threats. Those threats include infected e-mail attachments; phishing Web pages that exploit browser flaws; downloaded songs or pictures with hidden trojans; or plain ol' poking-and-prodding of a computer's shields. But passwords protect information from a frontal assault by way of the computer's keyboard.
  • ...7 more annotations...
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything. Get to know the person -- a technique that geeks refer to as "social engineering" -- and the password is easy to guess. There are message-board stalkers who can guess passwords in a half-dozen tries. Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password.
  • Other people use easy-to-remember passwords. Trouble is, Rogers said, they're easy-to-guess passwords, too. Good examples of bad passwords are your name, your family's names, your pet's name, the name of your favorite team, your favorite athlete or your favorite anything
  • The type of hardware being used can be a clue, said Rogers, a senior technical staffer in the CERT Program, a Web security research center in Carnegie-Mellon University's software engineering institute. It's easy to find a default password, typically in the user's manual on a manufacturer's Web site. If the user hasn't changed the default, that's an easy break-in.
  • Hackers rely on a lot of methods. Some, Rogers said, employ "shoulder surfing." That means what it sounds like -- looking over someone's shoulder as that person is typing in a password
  • Most of the password hacking activity these days goes on at homes, in school or in public settings. These days, many workplaces mandate how a password is picked.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry.
  • The idea is to choose a password that contains at least one uppercase letter, one numeral and at least eight total characters. Symbols are good to throw in the mix, too. Many companies also require that passwords be changed regularly and that pieces of older ones can't be re-used for months. And user names cannot be part of the password. Examples: Eggplant99, 99eggpLanT, --eggp--99Lant. For the next quarter, the password might change to variations on "strawberry."
  •  
    Password security is a big deal, and if you don't think it is, then someone might be hacking into your computer even as you read this. A strong password isn't foolproof, but it proves that you're no fool. And it might protect you from compromised data, a broken computer or identity theft. Your bank account, your personal e-mails and lots of other stuff are at risk with weak passwords.
1More

Going Global, Going Public - 0 views

  •  
    Presentation by Dean Shareski. Talks about our identity on the Internet, filtering.
1More

ELT notes: Some thoughts on identity -particularly mine - 6 views

  •  
    Who are we when we are online? Maybe a better question could be, What is it about you that surfaces in an online environment and would not come up anywhere else?
22More

UK Team is focusing on online comment defamation - 1 views

  • a new team to track down people who make anonymous comments about companies online.
  • a new team to track down people who make anonymous comments about companies online.
  • a new team to track down people who make anonymous comments about companies online.
  • ...15 more annotations...
  • a rising problem with people making anonymous statements that defamed companies, and people sharing confidential information online.
  • the new team would ensure there was “nowhere to hide in cyberspace”.
  • a story from six years earlier about United Airlines going bankrupt was voted up on a newspaper website. This was later picked up by Google News and eventually the Bloomberg news wire, which published it automatically as if it were a news story.
    • Vicki Davis
       
      Could this be considered the new "insider trading" - hmmm. Surely there are issues if it is done maliciously but isn't there a line here?
  • rogue employees
    • Vicki Davis
       
      Uhm, how about rogue companies?
  • trying to get Internet Service Providers to give out details of customers who had made comments online
  • shares in American firm United Airlines fell by 99 per cent in just 15 minutes after an outdated story that the firm had filed for bankruptcy was forced back onto the headlines.
  • the numbers of disgruntled employees looking to get their own back on employers or former employers was also on the rise.
  • could stifle free speech, and the ability of people to act as whistle-blowers to expose actions by their employers.
  • an outlet for anonymous reporting.
    • Vicki Davis
       
      Is it possible to have accountability AND anonymity? Must these be mutually exclusive?
  • This is known as the ‘Streisand effect’ online, after a case where singer Barbara Streisand tried to suppress photos of her California beachside home from a publicly-available archive of photos taken to document coastal erosion.
  • Nightjack. This was the guy who was blogging on the front line about police work and he was forced to stop this story because he was unmasked by The Times
  • If you allow a lot of anonymous debate by people who are not regulated, you can get it descending to the common denominator. If you allow people to register with an identity, even if it’s not their real one, you bring the level of debate up.”
  • There was one case a couple of years ago that we just keep referring back to where a defamatory comment was made and it wasn’t taken down for a period of time. Because of that the host of the website was held to be liable.”
  • the ‘Wild West’ era of the internet was in some ways coming to an end, with firms starting to crack down
  • I think companies are still grappling with whether it’s better to take it on the chin and hope people don’t see the comments, or on the other hand cracking down on everything that’s particularly damaging that’s said online. Maybe this is set to change.”
  •  
    While this article starts out about a lawfirm in Birmingham UK that is going to "track down people who make anonymous comments about companies online" it becomes an amazingly poignant article on the very nature of the Internet today and the push pull between anonymous commenting and accountability of the commenter. Push pull between free speech and online identity and brand protection. One person in this article claims that this sort of thing is the sign that the "wild west" of the INternet is coming to an end. Oh dear, I hope someone invents a new one if somehow anonymous commenters are now going to risk such! Also love the article's discussion of the Streisand effect wherein Barbara protested the sharing of some photos of her eroding beachfront which caused a stir and more people looking at the photos than if she had left it alone. This article is going to be a must read for Flat Classroom students and would be great for college-level discussions as well.
1More

Why Technology Will Never Fix Education - Commentary - The Chronicle of Higher Education - 11 views

  •  
    Interesting article in Journal of Higher Ed with Many Great Points "The real obstacle in education remains student motivation. Especially in an age of informational abundance, getting access to knowledge isn't the bottleneck, mustering the will to master it is. And there, for good or ill, the main carrot of a college education is the certified degree and transcript, and the main stick is social pressure. Most students are seeking credentials that graduate schools and employers will take seriously and an environment in which they're prodded to do the work. But neither of these things is cheaply available online. Arizona State University's recent partnership with edX to offer MOOCs is an attempt to do this, but if its student assessments fall short (or aren't tied to verified identities), other universities and employers won't accept them. And if the program doesn't establish genuine rapport with students, then it won't have the standing to issue credible nudges. (Automated text-message reminders to study will quickly become so much spam.) For technological amplification to lower the costs of higher education, it has to build on student motivation, and that motivation is tied not to content availability but to credentialing and social encouragement. The Law of Amplification's least appreciated consequence, however, is that technology on its own amplifies underlying socioeconomic inequalities.
2More

Building an Online Presence More Important Than Ever - 15 views

  •  
    Most educators - and President Obama, in his 9/14 speech - focus on avoiding negative footprints, and ignore how incredibly important it is for students to learn to build a positive digital footprint.
  •  
    commentary on why high school students should purposely build an online identity
1More

Study on the Effective Use of Social Software to Support Student Learning & Engagement - 0 views

  •  
    "Our investigations have shown that social software tools support a variety of ways of learning: sharing of resources (eg bookmarks, photographs), collaborative learning, problem-based and inquiry-based learning, reflective learning, and peer-to-peer learning. Students gain transferable skills of team working, online collaboration, negotiation, and communication, individual and group reflection, and managing digital identities."
18More

World Without Walls: Learning Well with Others | Edutopia - 0 views

  • We must also expand our ability to think critically about the deluge of information now being produced by millions of amateur authors without traditional editors and researchers as gatekeepers. In fact, we need to rely on trusted members of our personal networks to help sift through the sea of stuff, locating and sharing with us the most relevant, interesting, useful bits. And we have to work together to organize it all, as long-held taxonomies of knowledge give way to a highly personalized information environment.
    • Jeff Richardson
       
      Good reason for teaching dig citizenship
    • Terry Elliott
       
      What Will suggests here is rising complexity, but for this to succeed we don't need to fight our genetic heritage. Put yourself on the Serengeti plains, a hunter-gatherer searching for food. You are thinking critically about a deluge of data coming through your senses (modern folk discount this idea, but any time in jobs that require observation in the 'wild' (farming comes to mind) will disabuse you rather quickly that the natural world is providing a clear channel.) You are not only relying upon your own 'amateur' abilities but those of your family and extended family to filter the noise of the world to get to the signal. This tribe is the original collaborative model and if we do not try to push too hard against this still controlling 'mean gene' then we will as a matter of course become a nation of collaborative learning tribes.
  • Collaboration in these times requires our students to be able to seek out and connect with learning partners, in the process perhaps navigating cultures, time zones, and technologies. It requires that they have a vetting process for those they come into contact with: Who is this person? What are her passions? What are her credentials? What can I learn from her?
    • Terry Elliott
       
      Aye, aye, captain. This is the classic problem of identity and authenticity. Can I trust this person on all the levels that are important for this particular collaboration? A hidden assumption here is that students have a passion themselves to learn something from these learning partners. What will be doing in this collaboration nation to value the ebb and flow of these learners' interests? How will we handle the idiosyncratic needs of the child who one moment wants to be J.K.Rowling and the next Madonna. Or both? What are the unintended consequences of creating an truly collaborative nation? Do we know? Would this be a 'worse' world for the corporations who seek our dollars and our workers? Probably. It might subvert the corporation while at the same moment create a new body of corporate cooperation. Isn't it pretty to think so.
  • Likewise, we must make sure that others can locate and vet us.
  • ...9 more annotations...
  • technical know-how is not enough. We must also be adept at negotiating, planning, and nurturing the conversation with others we may know little about -- not to mention maintaining a healthy balance between our face-to-face and virtual lives (another dance for which kids sorely need coaching).
    • Terry Elliott
       
      All of these skills are technical know how. We differentiate between hard and soft skills when we should be showing how they are all of a piece. I am so far from being an adequate coach on all of these matters it appalls me. I feel like the teacher who is one day ahead of his students and fears any question that skips ahead to chapters I have not read yet.
  • The Collaboration Age comes with challenges that often cause concern and fear. How do we manage our digital footprints, or our identities, in a world where we are a Google search away from both partners and predators? What are the ethics of co-creation when the nuances of copyright and intellectual property become grayer each day? When connecting and publishing are so easy, and so much of what we see is amateurish and inane, how do we ensure that what we create with others is of high quality?
    • Terry Elliott
       
      Partners and predators? OK, let's not in any way go down this road. This is the road our mainstream media has trod to our great disadvantage as citizens. These are not co-equal. Human brains are not naturally probablistic computer. We read about a single instance of internet predation and we equate it with all the instances of non-predation. We all have zero tolerance policies against guns in the school, yet our chances of being injured by those guns are fewer than a lightning strike. We cannot ever have this collaborative universe if we insist on a zero probability of predation. That is why, for good and ill, schools will never cross that frontier. It is in our genes. "Better safe than sorry" vs. "Risks may be our safeties in disguise."
  • Students are growing networks without us, writing Harry Potter narratives together at FanFiction.net, or trading skateboarding videos on YouTube. At school, we disconnect them not only from the technology but also from their passion and those who share it.
  • The complexities of editing information online cannot be sequestered and taught in a six-week unit. This has to be the way we do our work each day.
  • The process of collaboration begins with our willingness to share our work and our passions publicly -- a frontier that traditional schools have rarely crossed.
  • Look no further than Wikipedia to see the potential; say what you will of its veracity, no one can deny that it represents the incredible potential of working with others online for a common purpose.
  • The technologies we block in their classrooms flourish in their bedrooms
  • Anyone with a passion for something can connect to others with that same passion -- and begin to co-create and colearn the same way many of our students already do.
  • I believe that is what educators must do now. We must engage with these new technologies and their potential to expand our own understanding and methods in this vastly different landscape. We must know for ourselves how to create, grow, and navigate these collaborative spaces in safe, effective, and ethical ways. And we must be able to model those shifts for our students and counsel them effectively when they run across problems with these tools.
  •  
    Article by Wil Richardson on Collaboration
2More

» Web Presence. On Purpose. Bud the Teacher - 0 views

  • We’ll spend the weekend thinking through the identity of our respective organizations and what we can do online to both reflect and support that identity and the good work that all of us are trying to do in our various locations around writing and teaching and learning.
  •  
    Excellent overview by Bud the Teacher on what is happening at the National Writing project events this weekend and reflections on the areas he is wanting to learn more about.
1More

ShowYourself Widget - 0 views

  •  
    ShowYourself is a simple to make, easy, free and fun utility to help establish your identity across the web. Have a Flickr account and a Facebook and AIM? Combine all your profiles on the web into one attractive widget that you can put on your blog, your myspace or anywhere on the web. From Kim Cofino's blog always learning http://tinyurl.com/38a43j
4More

YouTube - Broadcast Yourself. - 0 views

  • YouTube is not for pornography or sexually explicit content. If this describes your video, even if it's a video of yourself, don't post it on YouTube. Also, be advised that we work closely with law enforcement and we report child exploitation. Please read our Safety Tips and stay safe on YouTube. Don't post videos showing bad stuff like animal abuse, drug abuse, under-age drinking and smoking, or bomb making. Graphic or gratuitous violence is not allowed. If your video shows someone being physically hurt, attacked, or humiliated, don't post it. YouTube is not a shock site. Don't post gross-out videos of accidents, dead bodies or similar things intended to shock or disgust.
  • Only upload videos that you made or that you are authorized to use.
  • revealing other people’s personal information,
  •  
    Many people have not read the Youtube Community Guidelines. You should report any videos that break these rules to youtube - everyone should have a youtube account and be able to do this. Today, a student had a bad video linked to hers -- I had to go to another place to report the other video but you can do this! Guidelines: "Don't Cross the Line Here are some common-sense rules that will help you steer clear of trouble: * YouTube is not for pornography or sexually explicit content. If this describes your video, even if it's a video of yourself, don't post it on YouTube. Also, be advised that we work closely with law enforcement and we report child exploitation. Please read our Safety Tips and stay safe on YouTube. * Don't post videos showing bad stuff like animal abuse, drug abuse, under-age drinking and smoking, or bomb making. * Graphic or gratuitous violence is not allowed. If your video shows someone being physically hurt, attacked, or humiliated, don't post it. * YouTube is not a shock site. Don't post gross-out videos of accidents, dead bodies or similar things intended to shock or disgust. * Respect copyright. Only upload videos that you made or that you are authorized to use. This means don't upload videos you didn't make, or use content in your videos that someone else owns the copyright to, such as music tracks, snippets of copyrighted programs, or videos made by other users, without necessary authorizations. Read our Copyright Tips for more information. * We encourage free speech and defend everyone's right to express unpopular points of view. But we don't permit hate speech (speech which attacks or demeans a group based on race or ethnic origin, religion, disability, gender, age, veteran status, and sexual orientation/gender identity). * Things like predatory behavior, stalking, threats, harassment, intimidation, invading privacy, revealing other people's personal information, and inciting others to commit violent act
1More

Facebook - Privacy settings recommended by Sophos - 0 views

  •  
    Facebook walkthrough - adjust your privacy settings This guide walks you through Sophos-recommended privacy settings in Facebook, and shows you how to set more secure levels of privacy and reduce the chance of becoming a victim of online identity theft.
1 - 20 of 43 Next › Last »
Showing 20 items per page