Skip to main content

Home/ WomensLearningStudio/ Group items tagged identity

Rss Feed Group items tagged

Doris Reeves-Lipscomb

Meg Jay: Why 30 is not the new 20 | Video on TED.com - 0 views

  •  
    Excellent video on why 20s are critical adult forming period--brain is fully formed for adulthood; "Plan and not quite enough time to do great things"--Leonard Bernstein Musical chair relationships and fear of not being able to sit down at age 30 with partner for life can cause bad decision making Post millennial crisis is not having the career that you want, or family that you want Story of Emma--at age 25--"having an identity crisis". Thought she might want to work in art or entertainment. Lived with boyfriend who displayed temper more than ambition. Head in lap, and sobbed for hour. In case of emergency, please call. who will be there for me? Told her three things that all 20 somethings need to hear: 1. Get identity capital--investment in who you might want to be next. Identity capital begets identity capital. Discounting exploration is not supposed to count when it is procrastination. 2. New piece of capital or person to date comes from weak ties--half of 20 somethings are underemployed, and half of them are not--reaching out to weak ties is how you connect; 3. You can't pick your family but you can pick your friends. You can pick your family and the time is now. The best time to work on your marriage is before you are married. Consciously choosing what you want. Found an old roommate's cousin who helped her get a job; married and has plenty of emergency contacts. One good conversation, one good Ted Talk can have an enormous impact. "Thirty is not the new 20, claim your adulthood, get your identity capital, reach out to weak ties to make your family.
Doris Reeves-Lipscomb

Privacy, please: New technologies could hide your identity online - NBC News - 0 views

  • Data crunching has grown so sophisticated and powerful, privacy researchers now warn that tracing identities from a pool of supposedly "anonymized" data is not just a possibility, it's a certainty.
  • "It is depressingly hard to try to anonymize data in a way that resists identification by a committed adversary," Arvind Narayanan, a privacy researcher at Princeton University, told NBC News.
  • such as the DuckDuckGo search engine, whose motto is "We don't track you" — gain popularity, an incentive would arise.
  • ...1 more annotation...
  • Microsoft, Apple, Google, Facebook and Yahoo aren't likely to make changes to the way they collect or share data overnight. Some online tools politely request third-party trackers to stop, but such requests are like a "gentleman's anonymity based on a handshake," Ford said. Of course, if you're signed into a service like Facebook that asks for your real name up front, you've already checked anonymity at the door.
  •  
    article by Nidhi Subbaraman, June 14, 2013 on lack of privacy online, NBC News
Lisa Levinson

Company Envisions 'Vaults' for Personal Data - NYTimes.com - 0 views

  •  
    Creating a vault to store your personal online data to preserve and manage your digital identity.
Doris Reeves-Lipscomb

John Seely Brown: The Entrepreneurial Learner#KMWorld | Above and Beyond KM - 0 views

  •  
    Blog post by John Seely Brown, "Identity Shift is the biggest shift of all. We're moving from a sense of "I am what I wear/own/control" to "I am what I create, share and others build on." How do I put something into play so others build on it? When you figure this out, you understand agency and impact. "
Doris Reeves-Lipscomb

Sticky data: Why even 'anonymized' information can still identify you - The Globe and Mail - 0 views

  • This isn’t the first time this has happened, that big data sets full of personal information – supposedly obscured, or de-identified, as the process is called – have been reverse engineered to reveal some or even all of the identities contained within. It makes you wonder: Is there really such a thing as a truly anonymous data set in the age of big data?
  • That might sound like a bore, but think about it this way: there’s more than taxi cab data at stake here. Pretty much everything you do on the Internet these days is a potential data set. And data has value. The posts you like on Facebook, your spending habits as tracked by Mint, the searches you make on Google – the argument goes that the social, economic and academic potential of sharing these immensely detailed so-called “high dimensional” data sets with third parties is too great to ignore.
  • University of Colorado Law School associate professor Paul Ohm’s 2009 paper on the topic made the bold claim that “data can be either useful or perfectly anonymous but never both.”
  • ...1 more annotation...
  • A similar situation was cited by Princeton University researchers Arvind Narayanan and Edward W. Felten in a recent response to Cavoukian and Castro. The pair wrote that, in one data set where location data had supposedly been anonymized, it was still possible in 95 per cent of test cases to re-identify users “given four random spatio-temporal points” – and 50 per cent if the researchers only had two. In other words, de-identifying location data is moot if you know where a target lives, where they work and have two other co-ordinates they visit with regularity.
  •  
    post by Matthew Braga as special to The Globe and Mail, 8/6/14 on how deidentified data can be hacked to reveal identities of users.
Doris Reeves-Lipscomb

You Will Be Googled - 0 views

  •  
    blog post on Mashable on how to create your online identity 5 tips 1. Google your name--see who you are competing against in terms of name recognition 2. Own your name--get LinkedIn profile and pictures to show up first by creating a name specific URL at LinkedIn 3. Block and tackle on social networks such as Facebook to only share certain info with the public or limit Facebook content to friends only. 4. Advance the ball forward--create some great content in the first page of results; some apps help with that--Brandyourself 5. Make your own plays--showcase your expertise in a blog post, answer a question on Quora or comment on an article.
Lisa Levinson

Crap Detection Resources - 0 views

  •  
    Howard Rheingold et al has created this Google Doc that is updated regularly with resources that help you detect "crap" onlline info. The resources are categorized into subjects: identity; political; consumer/business; medical, images; urban legends, hoaxes and emails; journalism; collective intelligence and user-based detection; academia and education; events; miscellaneous; web sites; web pages; twitter; video
Lisa Levinson

8 digital skills we must teach our children | World Economic Forum - 0 views

  •  
    Written by Yuhyun Park , the chair of infollutionZero Foundation. Great graphic of the digital literacies children must learn as "they spend, on average, 7 hours a day in front of screens from television and computers to mobile phones and various digital devices." He defines these skills as Digital Intelligence, or DQ: Digital Safety (behavior risks, content risks, contact risks), Digital Security (password protection, internet security, mobile security), Digital Emotional Intelligence (empathy, emotional awareness/regulation, social and emotional awareness), Digital Communication (online collaboration, online communication, digital footprint), digital literacy (computational thinking, content curation, critical thinking), digital rights (privacy, intellectual property rights, freedom of speech), digital identity (digital citizen, digital co-creator, digital entrepreneur), and Digital Use (screen time, digital health, community participation).
Doris Reeves-Lipscomb

How the golden years disappeared - Life stories - Salon.com - 0 views

  •  
    How the Golden Years Disappeared by Marc Freedman, Salon, April 2, 2012. This is an excerpt from the Big Shift, a book written by Marc Freedman, the man who started Civic Ventures about 10 years ago. Perhaps the WLStudio takes on this social imperative and this is how we get funding? "The new migration is across time and the life course, as tens of millions (8,000 a day, one every ten seconds, are turning sixty) reach the spot where middle age used to end and old age once began, the new territory where a resurgent purpose gap, and gulf in identity, stands. Opportunity is there as well. The surge of people into this new stage of life is one of the most important social phenomena of the new century. Never before have so many people had so much experience and the time and the capacity to do something significant with it. That's the gift of longevity, the great potential payoff on all the progress we've made in extending lives. Realizing these possibilities will require the courage to break from old and familiar patterns that once were our friends but just don't work any longer. It means considering ideas like "gap years" for grown ups, new kinds of internships and fellowships for Americans moving beyond midlife, remodelling higher education to help retrain people who have been working for 40 or 50 years, even the creation of new kinds of investment accounts to help cover the costs of transitioning to new careers. What we're facing is not a solo matter; it's a social imperative, an urgent one that must be solved as the great midlife migration gathers scale and momentum."
Doris Reeves-Lipscomb

Connected Learning: A New Research-Driven Initiative « User Generated Education - 0 views

  •  
    Connected Learning, a new research-driven initiative was introduced at the Digital Media and Learning Conference 2012. This blog post by Jackie Gerstein discusses its essence and includes TED video of Henry Jenkins and separate video of Mimi Ito. See excerpt on core values and principals of connected learning: At the core of connected learning are three values: Equity - when educational opportunity is available and accessible to all young people, it elevates the world we all live in. Full Participation - learning environments, communities, and civic life thrive when all members actively engage and contribute. Social connection - learning is meaningful when it is part of valued social relationships and shared practice, culture, and identity (http://connectedlearning.tv/connected-learning-principles). This initiative is being driven by the following design principles: Shared purpose - Connected learning environments are populated with adults and peers who share interests and are contributing to a common purpose. Today's social media and web-based communities provide exceptional opportunities for learners, parents, caring adults, teachers, and peers in diverse and specialized areas of interest to engage in shared projects and inquiry. Cross-generational learning and connection thrives when centered on common interests and goals. Production-centered - Connected learning environments are designed around production, providing tools and opportunities for learners to produce, circulate, curate, and comment on media. Learning that comes from actively creating, making, producing, experimenting, remixing, decoding, and designing, fosters skills and dispositions for lifelong learning and productive contributions to today's rapidly changing work and political conditions. Openly networked - Connected learning environments are designed around networks that link together institutions and groups across various sectors, including popula
Doris Reeves-Lipscomb

The Machine is Us/ing Us (Final Version) - YouTube - 0 views

  •  
    Four minute video by Michael Wesch in St. George, KS, an assistant professor of anthropology. His video chronicles the evolution of the technical internet through html, XML phases and how the current use of code enables us to share our ideas at an unprecedented rate because anyone can click to write and publish to the world with the simplicity of an off/on TV control. We are (re)creating something new every second and can build relationships with people we never knew existed before. It's now one degree of separation between internet residents even though people may be miles apart in location, employment, lifestyle, temperament, etc. We can choose to collaborate with anyone who agrees to work with us. In fact, we can learn from afar from anyone without affiliating with them or they with us if they have some presence on the internet. We must figure out how to organize the things that matter to us that we harvest from across the internet. Tagging helps us do this. The web 2.0 transition has already had and will have impacts on copyright laws and practices, self-identity in different contexts, privacy, relationships, etc. Are you ready? Am I ready?
Lisa Levinson

Women In Learning and Leadership (WILL) - 1 views

  •  
    Interesting org that strives to foster a deeper understanding of gender and its intersections with race, culture, class, sexuality and other aspects of social identity. This program provides opportunities for women to explore career and life choices in multiple disciplines that enable them to excel and realize their full potential. Connects students with each other and to a strong supportive network of critical thinking, intellectual curiosity, problem-solving and leadership skills.
  •  
    Although mostly for high school and college students, WILL has an international program and offers some wonderful learning opportunities.
anonymous

http://www.baycomm.ca/images/pdf/Article-Why-market-to-women-entrepreneurs.pdf - 0 views

  •  
    Here are five ways to successfully tap into the women's market: 1. Provide good quality information. Producing a newsletter and Web site are excellent ways to demonstrate your expertise and to keep your image in front of clients and prospects. Include plenty of strategies and tips that will help guide women to be more successful in running or growing their businesses. Conducting free seminars or workshops is another good strategy for imparting your knowledge and has the added benefit of serving as a networking forum. 2. Build relationship marketing strategies. Develop and sustain relationships with women and cultivate a sense of community. 3. Host networking events. Historically, women have not had the same opportunities to network as their male counterparts. You can create your own networking events for women clients and prospects. Featuring a guest speaker in your industry can be an excellent addition. Just be sure to build in enough time for networking as well. 4. Sponsor women's business associations or events. If you are looking to target this market and build awareness, consider sponsoring one of the many women's business associations and events. These range from something as specific as mentoring programs (such as the Step Ahead One-on-One Mentoring Program - www.stepaheadonline.com ) to associations for women exporters (such as the Organization of Women in International Trade - www.owit-toronto.ca ). Most hold regular meetings and special functions. Some provide opportunities for sponsors to speak and showcase their expertise. Contributing material to their newsletters, publications and Web sites is another good way to build your identity among members, as these associations often welcome good quality, educational submissions of interest to members. 5. Share core information on a regular basis. Email or mail information that is considered to be "in our mutual interest." News clippings, industry data, notes from indus
Doris Reeves-Lipscomb

Associations FAQ - Advocacy and Outreach - ASAE & The Center for Association Leadership - 0 views

  •  
    Center for Association Leadership, FAQ page ASAE members primarily represent trade associations, and individual membership organizations or professional societies, organized under Section 501(c)(6) of the tax code; and philanthropic organizations, organized under Section 501(c)(3). In 2009, there were 90,908 trade and professional associations, and 1,238,201 philanthropic or charitable organizations. Associations are organized for all types of purposes, but there are some recurring benefits they typically provide their members, including: Education / professional development Information, research, statistics Standards, codes of ethics, certification Forum (face to face or virtual) to discuss common problems and solutions Service / mission oriented - volunteerism and community service Provide a community, network, "home", identity, participation What is the role or connection between ASAE, and the association community at large? A: ASAE is often thought of as the gateway to associations, because it is the largest organization of its kind working to advance and promote the association profession. ASAE represents more than 21,000 association executives and industry partners representing 10,000 organizations. Our members manage leading trade associations, individual membership societies and voluntary organizations across the United States and in nearly 50 countries around the world. The promise ASAE makes to members is to provide exceptional experiences, a vibrant community, and essential tools that make them and their organization more successful.
Doris Reeves-Lipscomb

Whitepapers: Anecdote - 0 views

  •  
    White paper by Shawn Callahan, Mark Schenk, and Nancy White, April 21, 2008 on Building a collaborative workplace "THE ROLE OF LEADERSHIP Leadership is a keystone for establishing supportive collaboration cultures, especially in teams and communities. This is based on how leaders mainly embed their beliefs, values and assumptions in the fabric of their organisation. There are six main behaviours that leaders display that mould the organisation's culture.[3] What leaders pay attention to, measure, and control on a regular basis-are they paying attention to collaborative strategies and behaviours from team, community and network perspectives? How leaders react to critical incidents and organisational crises-are they sacrificing long-term goals for short-term fixes which sabotage collaboration? Does fear of connecting to the larger network keep them from tapping into it? How leaders allocate resources-are they investing in the collaboration capability? Is it attentive to all three types of collaboration? How leaders express their identity through deliberate role modelling, teaching, and coaching-as our leaders collaborate, so do we! How leaders allocate rewards and status-are your leaders rewarding individual or collaborative behaviours? Or both? How leaders recruit, select, promote, and excommunicate-are collaborative talents sought and nurtured?"
Doris Reeves-Lipscomb

A More Agile Approach to Strategic Planning | Leadership Learning Community - 0 views

  •  
    blog post by Natalia Castaneda, 8/28/14, at Leadership Learning Community. Good reminder of how to take strategic plan and use it as a guide to implement. "1.View planning as an ongoing process It may be that you have to focus on the process first, trying to see what is the best way to implement an agile strategic planning process in your unique context Set 90 day goals, to keep the process dynamic 2.Keep it simple: "Simplicity allows people to act"[2] The plan should have three main components: identity (organizational vision, mission and values), goals (strategies and goals), and implementation (the actual plan) In terms of the implementation, it is helpful to think about not only the team members who will be implementing a given task, but also a 'champion' who is basically a project manager who is responsible for ensuring that the task gets completed 3.Create accountability among the organization's leadership team Organizational leaders should make strategic planning part of their responsibilities and develop accountability systems to ensure that the process is running well"
Doris Reeves-Lipscomb

How Your Organization's CEO Can Use Social Media for Thought Leadership | LinkedIn - 0 views

  •  
    Very key point that Beth Kanter makes in her blog post on LinkedIn "But in today's world, those boundaries are pretty blurred. As employees of nonprofits increasingly interact with their professional contacts in online social networks that favor individual participation, such as Facebook or Twitter, they are likely to experience a collision of their professional and personal identities"
Doris Reeves-Lipscomb

Trends Over Time in Virtual Volunteering - NTEN - 0 views

  • Today’s ability to oh-so-easily see and hear each other online is a double-edged sword: it can make electronic communication more personable, but it can also inject offline prejudices evoked by how someone looks or sounds.
  • Now, a lot of online communication is done synchronously, or nearly so: volunteers are online together, at the same time, talking together, and staff supporting those volunteers is often seeing their volunteering activities in real time.
  • People do not communicate primarily via e-mail anymore; they now talk together via online social networks and in the comments section of blogs, photo-sharing sites, and video-sharing sites. Some people send far more SMS messages than email messages.
  • ...3 more annotations...
  • they can and do engage in service just about anywhere, not only with a laptop, but with a tablet or smart phone.
  • The most welcomed change in the last few years is that using the Internet to communicate with, engage, and support volunteers has been adopted in one way or another by a majority of nonprofit organizations in the USA. What hasn’t changed is that there are still thousands of organizations resisting any use of the Internet to support and involve volunteers, with thousands of other organizations involving online volunteers while still not understand that the involvement; I volunteered mostly online for a regional office of the Girl Scouts of the USA in 2010 and 2011, yet I would bet that office would say “no” to the question, “Do you engage in virtual volunteering?”
  • the elements for success in virtual volunteering are still largely the same as they have been for the last 20 years. What hasn’t changed? The importance of creating volunteering tasks that have real impact, of frequent communications with volunteers, of showing volunteers what impact their contributions have had, and of showing senior management at an organization what impact virtual volunteering is having. I’m relatively sure these recommendations will never change, even as technology does.
  •  
    article by Jayne Cravens, February 20, 2015 on virtual volunteering moving from asynchronous to synchronous interactions, virtual identities including pictures, lack of recognition by some nonprofits of how they are using virtual volunteers.
Doris Reeves-Lipscomb

Shatter Your Inner Glass Ceiling | LinkedIn - 0 views

  • If you take away only one thing from this article, let it be this:  the oppressive messages (spoken and unspoken) that you receive from others are based on their own faulty beliefs, perceptions and projections about women.  You have adopted those as your own incorrect beliefs and they have become part of your self-identity.  Internalized oppression is habitual negative thinking and beliefs that you use against yourself. 
  •  
    article by Shelly Darnutzer on how to overcome internal oppression that often started with external oppression, April 2016
Doris Reeves-Lipscomb

Why Women Lose Ambition | Shelly Darnutzer | LinkedIn - 0 views

  • As I reflected on my own experience over a 25-year career in technology, I realized that there is more to it than an oppressive male dominated environment and an unconscious bias in corporate cultures that hold us back. 
  • Personal power is the energy behind all your actions. 
  • It’s the way of putting your ideas, visions and inspirations out in the world.  When you’ve internalized negative beliefs and disempower yourself, you are shutting down the flow of energy to do meaningful work, to take action on your own behalf, and to trust your decision making process because you begin to live in a state of constant self-doubt and frustration.
  • ...3 more annotations...
  • The costs of self-doubt are huge: think of all the opportunities that have been lost, ideas not shared, important questions not raised, and the ways you’ve held back from experiencing life on a bigger scale.
  • Over time, the result is a self-imposed limitation and loss of connection to why you are doing what you’re doing.  It is not uncommon to experience a certain amount of “deadness”, a loss of confidence in your abilities, a reluctance to try new things, and even a loss of health and vitality.
  • Internalization is the unconscious mental process where characteristics, beliefs, feelings and attitudes of other people are assimilated into your own self identity.
  •  
    nice article on why women lose ambition from toxic environments and never fully recover, Shelly Darnutzer, March 9, 2016, LinkedIn Pulse via Twitter
1 - 20 of 25 Next ›
Showing 20 items per page