Skip to main content

Home/ metaAcademia/ Contents contributed and discussions participated by Ronda Wery

Contents contributed and discussions participated by Ronda Wery

Ronda Wery

Tracking News Life Cycles With Systems Like Media Cloud - NYTimes.com - 0 views

  •  
    Hot Story to Has-Been: Tracking News via Cyberspace
Ronda Wery

YouTube - Yochai Benkler: After Selfishness - Wikipedia 1, Hobbes 0 at Half Time - 0 views

shared by Ronda Wery on 10 Aug 09 - Cached
  •  
    Yochai Benkler: After Selfishness - Wikipedia 1, Hobbes 0 at Half Time
Ronda Wery

As Classrooms Go Digital, Textbooks May Become History - NYTimes.com - 0 views

  •  
    As Classrooms Go Digital, Textbooks Are History
Ronda Wery

apophenia: Teens Don't Tweet... Or Do They? - 0 views

  •  
    Teens Don't Tweet... Or Do They?
Ronda Wery

Papers in Current Issue - 0 views

  •  
    Web 2.0-Mediated Competence - Implicit Educational Demands on Learners
Ronda Wery

10 ways to learn anything on the Web - 0 views

  •  
    10 ways to learn anything on the Web Need help honing your business plan? Need to learn Mandarin for that big business trip next month? Or maybe you just want to learn how to do the Thriller dance and do an ollie on your skateboard. Whatever it is you need to learn, the Internet has a tutorial just waiting for your eyeballs - here's a list of some of the best.
Ronda Wery

50 Ways to Use Twitter in the College Classroom | Online Colleges - 0 views

  •  
    50 Ways to Use Twitter in the College Classroom
Ronda Wery

Credibility and Digital Media @ UCSB - 0 views

  • For the last decade we have been researching these issues, and much of that work is represented and described here. Most recently, we have undertaken a large-scale research project designed to assess people's understandings of credibility across the wide range of digital information resources available today, including new and emerging forms. Through this work our goal is to learn more about how people find and use online information that they believe to be credible, and to refine and develop appropriate theories of credibility assessment in the contemporary media environment. What we learn in this research will help to advance social science, improve how we educate people to think critically, and contribute to discussions of public policy development.
  •  
    For the last decade we have been researching these issues, and much of that work is represented and described here. Most recently, we have undertaken a large-scale research project designed to assess people's understandings of credibility across the wide range of digital information resources available today, including new and emerging forms. Through this work our goal is to learn more about how people find and use online information that they believe to be credible, and to refine and develop appropriate theories of credibility assessment in the contemporary media environment. What we learn in this research will help to advance social science, improve how we educate people to think critically, and contribute to discussions of public policy development.
Ronda Wery

The Genius Index: One Scientist's Crusade to Rewrite Reputation Rules - 0 views

  • After two years of number-crunching in his cluttered office at UC San Diego, Hirsch had it—an invention important enough to warrant publication in the (very prestigious) Proceedings of the National Academy of Sciences. In his 2005 article, Hirsch introduced the h-index (named after himself, of course). The key was focusing not on where you published but on how many times other researchers cited your work. In practice, you take all the papers you've published and rank them by how many times each has been cited. Say paper number one has been cited 10,000 times. Paper number two, 8,000 cites. Paper number 32 has 33 citations, but number 33 has received just 28. You've published 32 papers with more than 32 citations—your h-index is 32. Or to put it more technically, the h-index is the number n of a researcher's papers that have been cited by other papers at least n times. High numbers = important science = important scientist.
  • The Web of Knowledge now comprises 700 million cited references from 23,000 journals published since 1804. It's used by 20 million researchers in nearly 100 countries. Anyone—scientist, dean, lab director—can sort the entries and tell someone's fortune. Nothing approaches it for breadth and longevity. Though the Journal Impact Factor has competitors, it remains the gold standard. "You may not like the database, but it has not been replaced," Garfield says.
  •  
    After two years of number-crunching in his cluttered office at UC San Diego, Hirsch had it-an invention important enough to warrant publication in the (very prestigious) Proceedings of the National Academy of Sciences. In his 2005 article, Hirsch introduced the h-index (named after himself, of course). The key was focusing not on where you published but on how many times other researchers cited your work. In practice, you take all the papers you've published and rank them by how many times each has been cited. Say paper number one has been cited 10,000 times. Paper number two, 8,000 cites. Paper number 32 has 33 citations, but number 33 has received just 28. You've published 32 papers with more than 32 citations-your h-index is 32. Or to put it more technically, the h-index is the number n of a researcher's papers that have been cited by other papers at least n times. High numbers = important science = important scientist.
Ronda Wery

Social media takes to the streets - 0 views

  • The SoMo experience begins with tools like GPS that can identify where we are and where we are going in real time. GPS is further enhanced through the marking of actual physical locations -- geotagging. Geotagging can include everything from "soundprints" to video markers, and the tagging of locally relevant reviews and news. GeoGraffiti, for example, allows mobile phone users to record a message tied to a specific place that is later retrievable by anyone who finds themselves near the same location. Geotaggers can leave a virtual "Kilgore was here" tag at any place, freezing in time and making publicly available their location-specific activities, interactions and thoughts. Mobile social networking is also coming on strong with applications like Foursquare and Britekite. Mobile phone users can discover each other, both friends and strangers, via profiles they make available at a particular location. Such applications are good for networking on the fly and immediately finding out if your friends are nearby at a given time.
  •  
    The SoMo experience begins with tools like GPS that can identify where we are and where we are going in real time. GPS is further enhanced through the marking of actual physical locations -- geotagging. Geotagging can include everything from "soundprints" to video markers, and the tagging of locally relevant reviews and news. GeoGraffiti, for example, allows mobile phone users to record a message tied to a specific place that is later retrievable by anyone who finds themselves near the same location. Geotaggers can leave a virtual "Kilgore was here" tag at any place, freezing in time and making publicly available their location-specific activities, interactions and thoughts. Mobile social networking is also coming on strong with applications like Foursquare and Britekite. Mobile phone users can discover each other, both friends and strangers, via profiles they make available at a particular location. Such applications are good for networking on the fly and immediately finding out if your friends are nearby at a given time.
Ronda Wery

20 Visualizations to Understand Crime | FlowingData - 0 views

  • There's a lot of crime data. For almost every reported crime, there's a paper or digital record of it somewhere, which means hundreds of thousands of data points - number of thefts, break-ins, assaults, and homicides as well as where and when the incidents occurred. With all this data it's no surprise that the NYPD (and more recently, the LAPD) took a liking to COMPSTAT, an accountability management system driven by data. While a lot of this crime data is kept confidential to respect people's privacy, there's still plenty of publicly available records. Here we take a look at twenty visualization examples that explore this data.
  •  
    There's a lot of crime data. For almost every reported crime, there's a paper or digital record of it somewhere, which means hundreds of thousands of data points - number of thefts, break-ins, assaults, and homicides as well as where and when the incidents occurred. With all this data it's no surprise that the NYPD (and more recently, the LAPD) took a liking to COMPSTAT, an accountability management system driven by data. While a lot of this crime data is kept confidential to respect people's privacy, there's still plenty of publicly available records. Here we take a look at twenty visualization examples that explore this data.
Ronda Wery

Journalism Grads: 30 Things You Should Do This Summer :: 10,000 Words :: multimedia, on... - 0 views

  • You could spend this summer working on your killer tan... or you could use the downtime to get heads up on the thousands of other grads competing for journalism jobs. Use this checklist to improve your journalism skills and set yourself apart from the pack:
  •  
    You could spend this summer working on your killer tan... or you could use the downtime to get heads up on the thousands of other grads competing for journalism jobs. Use this checklist to improve your journalism skills and set yourself apart from the pack:
Ronda Wery

We the People are the Watchers | h+ Magazine - 0 views

  • Christine Peterson, VP of the Foresight Institute, coined the term “open source” in the late 1990s. She now proposes that this concept of peer-based collaboration and sharing can be applied to another emerging technology – sensors.   See Also h+ Magazine Current Issue Search (and Destroy) Engines Not So Quiet on the Cyber Front Hacking The Economy “The intent of the project is to take advantage of advances in sensing to improve both security and the environment, while preserving — even strengthening — privacy, freedom, and civil liberties,” says Peterson in a recent press release. h+ Magazine spoke with Ms. Peterson about this open-source style project, known as the Open Source Sensing initiative.
  •  
    Christine Peterson, VP of the Foresight Institute, coined the term "open source" in the late 1990s. She now proposes that this concept of peer-based collaboration and sharing can be applied to another emerging technology - sensors. See Also * h+ Magazine Current Issue * Search (and Destroy) Engines * Not So Quiet on the Cyber Front * Hacking The Economy "The intent of the project is to take advantage of advances in sensing to improve both security and the environment, while preserving - even strengthening - privacy, freedom, and civil liberties," says Peterson in a recent press release. h+ Magazine spoke with Ms. Peterson about this open-source style project, known as the Open Source Sensing initiative.
Ronda Wery

The Dark Side of Twittering a Revolution | Open The Future | Fast Company - 0 views

  • n noting the potential power of social networking tools for organizing mass change, I thought out loud for a moment about what kinds of dangers might emerge. It struck me, as I spoke, that there is a terrible analogy that might be applicable: the use of radio as a way of coordinating bloody attacks on rival ethnic communities during the Rwandan genocide in the early 1990s. I asked, out loud, whether Twitter could ever be used to trigger a genocide.
  • In a 1999 presentation for the Montreal Institute for Genocide and Human Rights Studies, Professor Frank Chalk noted five circumstances that would allow the maximum intensity of a media-driven response to a crisis: the introduction of a new medium of communication, such as radio [or Twitter]; the use of a completely new style of communication; the wide-spread perception that a crisis exists; a public with little knowledge of the situation from other sources of information, and a deep-seated habit of obeying authority among the target audience. All of these circumstances pertain to the promulgation of the genocide in Rwanda in 1994 and many of them are found in other cases of genocide and genocidal killings, as well. It's easy to see how well this model applies to the Iranian situation, too. This shouldn't be read as an indictment of social networking technologies in general, or of Twitter in particular. As I said at the outset, I'm thrilled at how critical this technology has been to the viability and potential success of the pro-democracy demonstrations. As the cat-and-mouse game around proxy servers further suggests, the only way for a state to entirely cut off the use of these kinds of tools is to kill its own information networks, blinding itself and effectively removing itself from the global economy. What I'm arguing, however, is that we shouldn't see the positive political successes of emerging social tools as being the sole model. We should be aware that, as these tools proliferate, they will inevitably be used for far more deadly goals.
  •  
    In a 1999 presentation for the Montreal Institute for Genocide and Human Rights Studies, Professor Frank Chalk noted five circumstances that would allow the maximum intensity of a media-driven response to a crisis: 1. the introduction of a new medium of communication, such as radio [or Twitter]; 2. the use of a completely new style of communication; 3. the wide-spread perception that a crisis exists; 4. a public with little knowledge of the situation from other sources of information, and 5. a deep-seated habit of obeying authority among the target audience. All of these circumstances pertain to the promulgation of the genocide in Rwanda in 1994 and many of them are found in other cases of genocide and genocidal killings, as well. It's easy to see how well this model applies to the Iranian situation, too. This shouldn't be read as an indictment of social networking technologies in general, or of Twitter in particular. As I said at the outset, I'm thrilled at how critical this technology has been to the viability and potential success of the pro-democracy demonstrations. As the cat-and-mouse game around proxy servers further suggests, the only way for a state to entirely cut off the use of these kinds of tools is to kill its own information networks, blinding itself and effectively removing itself from the global economy. What I'm arguing, however, is that we shouldn't see the positive political successes of emerging social tools as being the sole model. We should be aware that, as these tools proliferate, they will inevitably be used for far more deadly goals.
Ronda Wery

Mind Your BlackBerry or Mind Your Manners - NYTimes.com - 0 views

  • As Web-enabled smartphones have become standard on the belts and in the totes of executives, people in meetings are increasingly caving in to temptation to check e-mail, Facebook, Twitter, even (shhh!) ESPN.com. But a spirited debate about etiquette has broken out. Traditionalists say the use of BlackBerrys and iPhones in meetings is as gauche as ordering out for pizza. Techno-evangelists insist that to ignore real-time text messages in a need-it-yesterday world is to invite peril.
  • Despite resistance, the etiquette debate seems to be tilting in the favor of smartphone use, many executives said. Managing directors do it. Summer associates do it. It spans gender and generation, private and public sectors.
  • Still, the practice retains the potential to annoy.
  • ...3 more annotations...
  • “People mistakenly think that tapping is not as distracting as talking,” she said. “In fact, it can be every bit as much if not more distracting. And it’s pretty insulting to the speaker.” Still, business can be won or lost, executives say, depending on how responsive you are to an e-mail message. “Clients assume they can get you anytime, anywhere,” said David Brotherton, a media consultant in Seattle. “Consultants who aren’t readily available 24/7 tend to languish.”
  • Playful electronic bantering can stimulate creativity in meetings, in the view of Josh Rabinowitz, the director of music at Grey Group in New York, an advertising agency. In pitch meetings, Mr. Rabinowitz said, he often traded messages on his Palm Treo — jokes, ideas, questions — with colleagues, “things that you might not say out loud.” The chatter tends to loosen the proceedings. “It just seems to add to the productive energy,” he said.
  • To Jason Chan, a digital-strategy consultant in Manhattan, different rules apply for in-house meetings (where checking BlackBerrys seems an expression of informal collegiality) and those with clients, where the habit is likely to offend. There is safety in numbers, he added in an e-mail message: “The acceptability of checking devices is proportional to the number of people attending the meeting. The more people there are, the less noticeable your typing will be.”
  •  
    As Web-enabled smartphones have become standard on the belts and in the totes of executives, people in meetings are increasingly caving in to temptation to check e-mail, Facebook, Twitter, even (shhh!) ESPN.com. But a spirited debate about etiquette has broken out. Traditionalists say the use of BlackBerrys and iPhones in meetings is as gauche as ordering out for pizza. Techno-evangelists insist that to ignore real-time text messages in a need-it-yesterday world is to invite peril.
Ronda Wery

Hang Up & Drive: Hands-Free Phones Aren't Safer - 0 views

  • Hands-free legislation leads people to believe that it’s safe (or at least safer) to drive while talking on a cell phone with the aid of a hands-free device, reports Governing. Well, it’s not. Governing points to a 2006 study that found no difference between drivers talking on hand-held phones and those talking on hands-free devices—as soon as people started talking, they became more likely to rear end another car than a legally drunk driver. More recently, researchers found that simply talking on a phone cuts the brain activity devoted to driving nearly 40 percent.
  •  
    Hands-free legislation leads people to believe that it's safe (or at least safer) to drive while talking on a cell phone with the aid of a hands-free device, reports Governing. Well, it's not. Governing points to a 2006 study that found no difference between drivers talking on hand-held phones and those talking on hands-free devices-as soon as people started talking, they became more likely to rear end another car than a legally drunk driver. More recently, researchers found that simply talking on a phone cuts the brain activity devoted to driving nearly 40 percent.
Ronda Wery

FriendFeed, Syphilis And The Perfection Of Online Mobs - 0 views

  • But we note two trends that suggest a bleak future: the increase in non-anonymous mob participation and the evolution of online services towards ever more efficient and real time communication platforms that facilitate mob creation and growth like never before. Things are changing online way too fast for society and culture to adapt. Something will eventually break. I’m going to pick on FriendFeed in this post because I believe it is the nearest thing to Shangri-La for mob justice enthusiasts.
  •  
    But we note two trends that suggest a bleak future: the increase in non-anonymous mob participation and the evolution of online services towards ever more efficient and real time communication platforms that facilitate mob creation and growth like never before. Things are changing online way too fast for society and culture to adapt. Something will eventually break. I'm going to pick on FriendFeed in this post because I believe it is the nearest thing to Shangri-La for mob justice enthusiasts.
‹ Previous 21 - 40 of 146 Next › Last »
Showing 20 items per page