Skip to main content

Home/ metaAcademia/ Group items tagged map

Rss Feed Group items tagged

Ronda Wery

Mindomo - Web-Based mind mapping software - 0 views

shared by Ronda Wery on 04 Aug 09 - Cached
  •  
    This looks good -- clickable links, favicons, maybe graphics -- my account is howardrheingold\n\nMindomo is a versatile Web-based mind mapping tool, delivering the capabilities of desktop mind mapping software in a Web browser - with no complex software to install or maintain.\n\nCreate, edit mind maps, and share them with your colleagues or your friends.
Ronda Wery

Skyeome.net » Blog Archive » Grassroots network mapping - 0 views

  •  
    I located a couple of interesting examples of people using networks as a grassroots tool to help stakeholders develop analysis of the power networks they are embedded in as a strategy tool. Also great to see such a low-tech solution.\n\nThe NetMap toolkit developed for IFPRI by Eva Schiffer makes use of boardgame-like tokens which can be used to represent the various actors, their relative power, positioning, and modes of power. Relationships (drawn as lines on paper) and positioning are determined by participants as part of the discussion. The resulting maps are recorded by the researcher. (Why do I waste my time writing software? ;-)
Ronda Wery

apophenia: Would the real social network please stand up? - 0 views

  • All too frequently, someone makes a comment about how a large number of Facebook Friends must mean a high degree of social capital. Or how we can determine who is closest to who by measuring their email messages. Or that the Dunbar number can explain the average number of Facebook friends. These are just three examples of how people mistakenly assume that 1) any social network that can be boiled down to a graph can be compared and 2) any theory of social networks is transitive to any graph representing connections between people. Such mistaken views result in broad misinterpretations of social networks and social network sites. Yet, time and time again, I hear problematic assumptions so let me start with some claims: Not all social networks are the same. You cannot assume network transitivity. You cannot assume that properties that hold for one network apply to other networks. To address this, I want to begin by mapping out three distinct ways of modeling a social network. These are not the only ways of modeling a social network, but they are three common ways that are often collapsed in public discourse.
  • Sociological "personal" networks. Sociologists have been working hard to measure people's personal networks and much of the theory of social networks stems from analysis done on these networks.
  • Most sociological theory stems from analyses of these personal networks. Social capital, weak ties, homophily, ... all of those theories you've heard about are based on personal networks. Given that these are typically measured by eliciting people's understandings of certain categories (e.g., "friend"), there's a strong overlap between everyday language around social networks and the categories being measured.
  • ...2 more annotations...
  • rticulated social networks are the social networks that you intentionally list. In some senses, this is what sociologists are eliciting, but people also articulate their social networks for other purposes. Address books and buddy lists are articulated social networks. So too are invitation lists. Most recently, this practice took a twist with the rise of social network sites that invite you to PUBLICLY articulate your social network. At this point, I would hope that most of us would realize that Friends != friends. In other words, who you connect to on Facebook or MySpace or Twitter is not the same list of people that you would say constitute your closest and dearest. The practice of publicly articulating one's social network can be quite fraught because there are social costs to the process of public articulation. Issues of reciprocity emerge and people find themselves doing a lot of face-work to navigate the sticky nature of having to account for their social relations in a publicly accountable way
  • These networks are NOT the same. Your mother may play a significant role in your personal network but, behaviorally, your strongest tie might be the person who works in the cube next to you. And neither of these folks might be links on your Facebook for any number of reasons.
  •  
    All too frequently, someone makes a comment about how a large number of Facebook Friends must mean a high degree of social capital. Or how we can determine who is closest to who by measuring their email messages. Or that the Dunbar number can explain the average number of Facebook friends. These are just three examples of how people mistakenly assume that 1) any social network that can be boiled down to a graph can be compared and 2) any theory of social networks is transitive to any graph representing connections between people. Such mistaken views result in broad misinterpretations of social networks and social network sites. Yet, time and time again, I hear problematic assumptions so let me start with some claims: 1. Not all social networks are the same. 2. You cannot assume network transitivity. 3. You cannot assume that properties that hold for one network apply to other networks. To address this, I want to begin by mapping out three distinct ways of modeling a social network. These are not the only ways of modeling a social network, but they are three common ways that are often collapsed in public discourse.
Ronda Wery

What educators can learn from brain research - 0 views

  •  
    As technology advances, new discoveries based on brain mapping are helping researchers understand how students learn. And those discoveries, in turn, are enriching and informing classroom practices in a growing number of schools.
Ronda Wery

Top 10 Vital Social Media Stories of the Week - 0 views

  • Social media was all over the map this week, but there was one theme that ran through many of this week’s stories: security. From Twitter’s meltdown to a gaping vulnerability Firefox 3.5, users saw the importance of security first-hand. Security’s also a huge issue with Internet Explorer 6, which we highlight in this week’s most popular story. There were a lot of useful resources published this week as well. Funny viral videos, social media business models, and iPhone apps that can save lives are just a few of the great things this week’s stories taught us. Here are most popular social media stories of the week.
  •  
    What This Blog is About In one phrase: Building Engaging Learning Experiences through Instructional Design and E-Learning I'm an instructional designer developing online learning, so that's primarily what I write about. * Instructional Design: This is what I do all day, and I'm always trying to learn how to do it better. * Higher Ed: The courses I create are graduate courses, so I'm interested in higher education. * K-12 Education: The participants in those courses are mostly K-12 educators, so I'm interested in what's important to my audience too. * Corporate E-Learning: Even though I'm in education, I know I can learn a lot from corporate e-learning. Besides, I'm employed by a for-profit company. * Lifelong Learning: It didn't start out to be a goal for my blog, but I've discovered that these tools help my own lifelong learning. I write about my discoveries: what works, what doesn't, what I'm thinking. * Technology: I write about technology, especially as it overlaps with any of the above areas. * Bookmarks: The Daily Bookmarks Posts are resources I find interesting or useful. You can view and search the complete list of bookmarks on Diigo or del.icio.us. On my Post Series and Recurring Themes page, I've collected some popular topics. This includes my liveblogged posts from the TCC 2008 conference and my series on instructional design careers. The top posts in the sidebar to the right are another great place to start reading.
Ronda Wery

20 Visualizations to Understand Crime | FlowingData - 0 views

  • There's a lot of crime data. For almost every reported crime, there's a paper or digital record of it somewhere, which means hundreds of thousands of data points - number of thefts, break-ins, assaults, and homicides as well as where and when the incidents occurred. With all this data it's no surprise that the NYPD (and more recently, the LAPD) took a liking to COMPSTAT, an accountability management system driven by data. While a lot of this crime data is kept confidential to respect people's privacy, there's still plenty of publicly available records. Here we take a look at twenty visualization examples that explore this data.
  •  
    There's a lot of crime data. For almost every reported crime, there's a paper or digital record of it somewhere, which means hundreds of thousands of data points - number of thefts, break-ins, assaults, and homicides as well as where and when the incidents occurred. With all this data it's no surprise that the NYPD (and more recently, the LAPD) took a liking to COMPSTAT, an accountability management system driven by data. While a lot of this crime data is kept confidential to respect people's privacy, there's still plenty of publicly available records. Here we take a look at twenty visualization examples that explore this data.
1 - 7 of 7
Showing 20 items per page