Skip to main content

Home/ Horizon Project 2008/ Group items tagged networking

Rss Feed Group items tagged

Vicki Davis

From the Annointed Few to the Collective Many - 0 views

  • What has not changed significantly, however, is the nature of human interactions in business – email, conference calls, and presentations by experts to non-experts are still the dominant means of interaction
  • the Internet has morphed from a presentation medium to an interactive platform in just a few years
  • a leading web analysis site
  • ...18 more annotations...
  • more than 50 percent of Americans aged 20-30 years old use Facebook
  • among Americans under the age of 35, social networking and user-generated content sites have overtaken TV as a primary media.
  • orkplace communities are designed to solve workplace-related challenges
  • We’re in the midst of a paradigm shift where individuals are indeed connecting “in ways and at levels that [they] haven’t done before”
  • Workplace communities
  • “Visitors to MySpace.com and Friendster.com generally skew older, with people age 25 and older comprising 68 and 71 percent of their user bases, respectively.”
  • talent management is about finding, developing, and retaining key talent within the organization
  • Ernst & Young, for instance, has a significant presence on Facebook in support of its recruiting efforts
  • Google, Home Depot, Enterprise Rent a Car, and Deloitte also are recruiting using Web 2.0 tools through YouTube videos and even alumni social networks
  • “If companies keep social networks out, they will be doing a significant disservice to their bottom lines
  • Between 2000 and 2020, 75 million Boomers will reach retirement age.
  • The only content service with mass adoption (greater than 50 percent) was Social Networking, and this was only among respondents under the age of 35.”
  • In addition, Millennials are the first generation to spend more hours online per week than watching TV (16.7 vs 13.6).
  • some of the characteristics of Millenials, which included a desire to work in  “[open] and flat organizations” as “part of a tribe.”
  • “heavy use of technology (messaging, collaboration, online learning) as a daily part of their work lives.”
  • robust and active communities will have an easier time recruiting talented Millennials
  • they have opportunities to meaningfully connect to their peers and supervisors.
  • A retiring Boomer who is an expert in a particular field could be an excellent community manager, blogger, or wiki contributor.
  •  
    Business people and management should read this article about the transformation of business by using workplace communities. "Workplace communities are designed to solve workplace-related challenges" -- they focus on tasks. I would find it interesting to see a business REALLY use technology to change things. Having the business in a business network (OK a NING) and let people tag their posts with the business related PROBLEMS they are having and blog, video, or photograph it-- the tag cloud would tell the business IMMEDIATELY what the problems are in the company. The problem with this model is that there are few corporate executives who REALLY want to know the problems within their organizations. They don't want to be problem solvers, just opportunity creators. However, when managers open their eyes (and I'm a former General Manager myself) and see that two things give business opportunity: problem solving and innovation. And they are directly related. True innovation solves problems. Read this article and think about how you may solve problems using the networks you may now create. If you don't want everyone to know, keep it private and only allow people in your company in.
  •  
    Important article about why businesses need to change.
glen gatin

MiT5: Collaboration and Collective Intelligence - 0 views

    • glen gatin
       
      Two essential components of online social networks? Community and content. Where is your content stored in meatspace?
  •  
    Scholz talking about the two things of value in a online social network. Community and content. What amalog BSP are impacted by the move to online life? KYD?
Vicki Davis

SurfTheChannel - Home - 0 views

  •  
    This is a website where tv enthusiasts are sharing videos and collaborating. This is an example of how television and all of our entertainment is evolving to become more customized. In addition to creating personal learning networks, we will also be creating personal entertainment networks (PEN's) -- all via this amazing thing we call RSS. Understanding RSS is not only important for learning but just living your life. User created content is here to stay.
  •  
    This is a website that people are using for TV enthusiasts and they are collaborating and sharing videos.
Steve Madsen

Google CEO Eric Schmidt: Social networks are still too closed | Outside the Lines - CNE... - 0 views

  •  
    Social networks are still too closed.
glen gatin

Online Predators and Their Victims - 0 views

  • The publicity about online"predators" who prey on naive children using trickery and violence is largely inaccurate.
  • adult offenders who meet, develop relationships with, and openly seduce underage teenagers
  • In the great majority of cases, victims are aware they are conversing online with adults. In the N-JOV Study, only 5% of offenders pretended to be teens when they met potential victims online. (112)
  • ...23 more annotations...
  • Offenders rarely deceive victims about their sexual interests.
  • promises of love and romance
  • 99% of victims of Internet-initiated sex crimes in the N-JOV Study were 13 to 17 years old, and none were younger than 12. 48% were 13 or 14 years old. (115)
  • My (Liz B. Davis ) Summary of Key Points (All are quotes directly from the article): Online "Predators" and Their Victims. Myths, Realities, and Implications for Prevention and Treatment. by: Janis Wolak, David Finkelhor, and Kimberly J. Mitchell - University of New Hampshire and Michele L. Ybarra - Internet Solutions for Kids, Inc.
  • it was those 15-17 years of age who were most prone to take risks involving privacy and contact with unknown people. (115)
  • take place in isolation and secrecy, outside of oversight by peers, family  members, and others in the youth's face-to-face social networks (115)
  • Most of the online child molesters described in the N-JOV Study met their victims in chatrooms. In a 2006 study, about one third of youths who received online sexual solicitation had received them in chatrooms. (116)
  • Youth internet users with histories of offline sexual or physical abuse appear to be considerably more likely to receive online aggressive sexual solicitations. (117)
  • ..Although Internet safety advocates worry that posting personal information exposes youths to online molesters, we have not found empirical evidence that supports this concern. It is interactive behaviors, such as conversing online with unknown people about sex, that more clearly create risk. (117)
  • Online molesters do not appear to be stalking unsuspecting victims but rather continuing to seek youths who are susceptible to seduction. (117)
  • maintaining online blogs or journals, which are similar to social networking sites in that they often include considerable amounts of personal information and pictures, is not related to receiving aggressive sexual solicitation unless youths also interact online with unknown people. (117)
  • Boys constitute 25% of victims in Internet-initiated sex crimes, and virtually all of their offenders are male. (118
  • Some gay boys turn to the internet to find answers to questions about sexuality or meet potential romantic partners, and there they may encounter adults who exploit them. (118)
  • ..child molesters are, in reality, a diverse group that cannot be accurately characterized with one-dimensional labels. (118)
  • Online child molesters are generally not pedophiles. (118)Online child molesters are rarely violent. (119)
  • Child pornography production is also an aspect of Internet-initiated sex crimes. One in five online child molesters in the N-JOV Study took sexually suggestive or explicit photographs of victims or convinced victims to take such photographs of themselves or friends. (120)
  • Youths may be more willing to talk extensively and about more intimate matters with adults online than in face-to-face environments. (121
  • it may not be clear to many adolescents and adults that relationships between adults and underage adolescents are criminal. (122)
  • Simply urging parents and guardians to control, watch, or educate their children may not be effective in many situations. The adolescents who tend to be the victims of Internet-initiated sex crimes many not themselves be very receptive to the advice and supervision of parents. (122)
  • We recommend educating youths frankly about the dynamics of Internet-initiated and other nonforcible sex crimes. Youths need candid, direct discussions about seduction and how some adults deliberately evoke and then exploit the compelling feelings that sexual arousal can induce. (122)
  • The factors that make youths vulnerable to seduction by online molesters are complex and related to immaturity, inexperience, and the impulsiveness with which some youths respond to and explore normal sexual urges.
    • glen gatin
       
      Extended adolescence as much a contributing factor as inherent evil in online community?
    • Vicki Davis
       
      Not sure I understand the term "extended adolescence?"
    • glen gatin
       
      Twenty somethings still living with their parents.
    • glen gatin
       
      The whole concept of adult hood has shifted as a result. Thinking of the woman who was censured for putting her 9 yr old on the subway. Not sure how this applies to online predators.
    • glen gatin
       
      Comment box seems to work fine. It took me a while to find it too. What a neat tool! I can think of a 6 projects where this will come in very handy!! Thanks for the invite, Vicki.
    • Vicki Davis
       
      Interesting theory -- I'm not sure that this study was focusing on that age group -- we need to refer to the original study linked at the top of the page on that one.
  • images of adolescent sexuality abound in the media
    • glen gatin
       
      Much of what is published in the MSM about social networking and the internet in general is designed to emphasize the hazards. predators, identity theft, viruses etc. Usually hot button emotional issues. Same old deal, people love to be horrified. It sells alot of papers. In an attention economy it is getting harder to attract attention. A good "scary internet" story attracts attention and sells papers.
  •  
    Information summarizing an article on online safety -- something important for education subgroups to cover.
Vicki Davis

Connecting People Via The Network - Horizon Project 2008 - 0 views

  •  
    A very nice video done by a student about connecting people via the network.
  •  
    I enjoyed this video a lot from Ren at Goodland High School. I particularly liked the contrast of the computers at the beginning of the video. I think he did a nice job.
Steve Madsen

MySpace Signs Deal to Aim Its Content for Overseas TV - New York Times - 0 views

  •  
    MySpace hopes to provide an alternative pilot process. Rather than spend millions of dollars on a test TV episode that might never receive a series order, the company hopes to use its social network as a test bed.
Steve Madsen

NBC has news for MySpace - 0 views

  •  
    NBC News and MSNBC.com will provide political news and other content to social networking site MySpace.
  •  
    The age group that makes use of the likes of MySpace are also getting more involved in teh political process
glen gatin

George Siemens - whoisTV on blip.tv - 0 views

  •  
    Some excellent videos of leading thinkers about Web. 20 and social networking and their impact on education and business.
Steve Madsen

Earthquake in Progress: Your Laptop Can Save You! - 0 views

  •  
    The lastest effort in distributed computing tht aims to turn your computer into a node in a vast, distributed earthquake detection network.
Steve Madsen

Vodafone's 'Long Term' Hesitance - 0 views

  •  
    LTE would make today's cable and DSL modems-as well as the "3G," or third-generation, mobile networks wireless carriers have spent billions to deploy-seem downright snail-like.
  •  
    Wireless carriers have spent truck loads of money on 3G wireless. Long Term Evolution will probably cost that much again to implement
Vicki Davis

MASSP News Center » Can You Hear Me Now? - 0 views

  • May school officials lawfully “search” the confiscated cell phone to look at stored text messages, photographs, videos, and logs of incoming and outgoing calls? Clearly, the circumstances of the search must satisfy the T.L.O. standard. Not as clear, however, is whether such a search violates federal or Michigan laws regarding stored electronic communications.
  • [A] search of a student by a teacher or other school officials will be ‘justified at its inception’ when there are reasonable grounds for suspecting that the search will turn up evidence that the student has violated or is violating either the law or the rules of the school. Such a search will be permissible in its scope when the measures adopted are reasonably related to the objectives of the search and not excessively intrusive in light of the age and sex of the student and the nature of the infraction.”
  • In Klump v Nazareth Area Sch Dist, 425 F Supp 2d 622 (ED Pa, 2006), a federal district court denied the school’s motion to dismiss a lawsuit filed by a student whose cell phone was searched.
  • ...5 more annotations...
  • compensatory and punitive damages for the alleged unconstitutional search, violation of the Pennsylvania Wiretapping and Electronic Surveillance Control Act, invasion of privacy, and defamation.
  • The court ruled that the student had stated a claim for the alleged violation of his right to be free from an unreasonable search.
  • here was no basis for them to search the text and voice mail messages stored on the phone.
  • unlawful access to the stored voice mail and text message communications.
  • (2) A person shall not willfully and maliciously read or copy any message from any telegraph, telephone line, wire, cable, computer network, computer program, or computer system, or telephone or other electronic medium of communication that the person accessed without authorization. (3) A person shall not willfully and maliciously make unauthorized use of any electronic medium of communication, including the internet or a computer, computer program, computer system, or computer network, or telephone.
  •  
    Confiscating and looking at information on cell phones by school officials is still not clear. This is a very interesting case study for those working with digital citizenship issues at their school.
  •  
    A court case about illegal search and siezure of a cell phone in Michigan, USA.
glen gatin

How tech wars end (Scripting News) - 0 views

  •  
    Humankind lose its pirate mentality and warlike pride. Hmmm... nice to think about.
glen gatin

digital digs: Building Scholarly Networks - 0 views

  • We might like to think that information-sharing is intrinsic to academic work, especially academic work that is publicly funded. However we also place many restrictions on publishing, like peer review, and I imagine there are still academics who try to keep their work secret until it is ready for any number of semi-paranoid reasons. I'm not going to say we shouldn't do these things, but we need to recognize that the discipline works by controlling the production and distribution of disciplinary knowledge.
  •  
    See Skirky Coasean floor- the cost of dissemintation of academic research has dropped to near zero. When institutions insist on exhorbitant journal access fees they doom themselves to irrelevance. Attention economy needs eyeballs and the eyeballs glaze over at the idea of paying $180.00 for a PDF report on online education in Canada, a publicly funded research project.(295 for the hard copy)
Steve Madsen

collectiveintelligence » home - 0 views

  • After blogging about this and talking to my network about it, we thought it would be interesting to write something collaboratively using our collective intelligence
    • Steve Madsen
       
      A new site that is testing the waters to write lengthy prose collaboratively.
  •  
    A new site that is trying to use collaboration to write a lengthy document .
Vicki Davis

This morning I came here before I went to twitter. This seems to be the place to be rig... - 0 views

  • Ryan Bretag I'll join in the fun if you'll have me. Let me know time when you know.
  • Lisa Parisi This morning I came here before I went to twitter. This seems to be the place to be right now. Still not sure of all the groupings, taggings, etc. Reading what everyone writes and hoping to get it soon
  • I was going to present 20 minutes on Del.icio.us, but I may show Diigo instead - or both - or 20 minutes is not enough....
  • ...22 more annotations...
  • This new version "appears" to have fixed that issue, plus I've been impressed with the new features.
  • Caroline Obannon I'm second guessing teaching only del.icio.us myself, too.
  • Liz Davis I'm wondering if Diigo is too much for the newbie. Delicious is so simple and obviously useful. I'm afraid Diigo would scare some people away. I'm still inclined to start with delicious and save Diigo for my more advanced users (of which I have very few).
  • Maybe overwhelming would describe my feelings.
  • However, I can defely think of quite a few people who would balk at it, too and favor the simplicity of Del.icio.us.
  • but most likely wouldn't participate in the social/sharing aspects they offer.
  • The nice thing about the Diigo toolbar is that you can select which buttons to see, so for those who might find the extra choices of tools overwhelming, it can at least be customized.
  • I'm feeling a Diigo obsession building. As soon as Explorer comes up I check to see if there are any messages in Diigo. How nice of them to put that number right on my toolbar!
  • I created my very first List last night,
  • Kristin Hokanson Liz I think it may be too much ially for the newbie and I will continue to send to delicious.
  • There is one feature that I REALLY like and that is that you can EMAIL something you are tagging so for folks who LIKE to get those sites emailed, you can still meet their needs without an extra step yourself
  • I second that. I like Diigo, but del.icio.us simplicity is so inviting.
  • The value of Diigo is that it brings a number of tools together allowing for multiple entry points. The old training model is show them a tool from start to finish that goes over every single detail. With Diigo, why show everything to those new to all this? It is rather easy to click into your bookmarks. From there, teachers have a space they can grow. It also provides a wonderful opportunity to differentiate with your teachers -- the whole multiple points of entry.
  • still I will have fun, exploring it and making effective use of it.
  • it is the ease of integration with blogging and twitter -- I annotated a page yesterday and pulled it directly into my blog. I can twitter bookmark that is important quickly -- AND I can use the tagging standards for the horizon project without having to remember the darn tags -- tag dictionaries are the most useful things to have been invented in a LONG time -- we need to set them up within one of our educational groups!
  • I don' t think I would not teach delicious. But perhaps starting with delicious and saving Diigo for later is a good idea.
  • We are conversing about the usefulness of diigo and I thought you might like to be included.
  • Maggie Tsai has invited Wade Ren to this conversation
  • Are you guys planning a Sunday get-together? If so, please advise the time - I'd love to join you and help answering any question.
  • Howdy! Wow, what can I say? Diigo is a lot more than delicious. If CoolCat Vicki hadn't written about Diigo again, I probably would have stuck with Delicious...and,if I hadn't been using Twitter, blogs, played around with Facebook, the social networking side of Diigo would have been just so much MORE to learn.
  • my concern would be to NOT limit learners in workshop sessions to the path I followed in learning these tools. Simply, folks, here is a tool that will grow as you grow and learn more about living and contributing in an interconnected world. The ability to have conversations like this, to annotate web pages, to share relevant quotes and tweet as needed...makes me wonder at the need for blogs at all.
  • A few folks are considering exploring Diigo on Sunday morning and having a conversation about it now...join in and learn with us!
  •  
    This is a very honest, open discussion between educators about why diigo or delicious -- I think the fact we can have this conversation within diigo at all says a lot for the usefulness of the tool. Diigo is an emerging tool for social bookmarking and collective intelligence.
  •  
    Look at the conversations betwen educators occuring on diigo about this tool.
Steve Madsen

MediaPost Publications - More Bosses Using Social Media Profiles To Evaluate Potential ... - 0 views

  • A new CareerBuilder.com survey found that 22% of all hiring managers have combed through social media profiles to help evaluate potential hires, up from just 11% two years ago.
    • Steve Madsen
       
      Potential employers are looking at social networks to get more of a feel for future employees. Could be an idea for a video section?
1 - 17 of 17
Showing 20 items per page