Skip to main content

Home/ onlinelearning/ Group items tagged network

Rss Feed Group items tagged

Joh Fra03

Democracy Now! | Toll From Deadly, Coordinated Mumbai Attacks Tops 170, Two Top Indian ... - 0 views

  • ARUN JAITLEY: We must follow the example of what United States did after 9/11. We are more vulnerable them and we must be a tough state and not a soft state. Out intelligence network, our security response, our legal framework all need an overhaul and all need a strengthening. When all of them see the political establishment is weak on terrorism, each one of them collapses. That’s where the basic change is required.
  • Right when this was occurring, the relationship between 9/11 and Mumbai began to be made by the media.
  • It means the state has to then follow the playbook laid out by the Bush Administration right after it experienced of course its 9/11. Which is to say you then go and start a war against an adversary that you claim did the attack and simultaneously, you begin to create a security apparatus inside your state to restrict the civil liberties of all people who live within that country.
  • ...3 more annotations...
  • war against your own population. Where you start to restrict civil liberties far in excess of anything necessary
  • not trying to forecast the safety of the population into the near future
  • precisely because most of those attacks the have taken place in areas which afflicted the working poor, working-class, and middle-class people. This attack, for the first time, targeted places of the top elite.
  •  
    Scary b/c of our model
Joh Fra03

Journal for Asynchronous Learning Networks | The Sloan Consortium - 0 views

  •  
    1092-8235
Joh Fra03

On Privacy and web presence | Virtual Canuck - 0 views

  • In my own class, I am encouraging students to venture out beyond the protected walls of the institutional LMS and use blog posting and discussions to create “transactional presence” and sustain cooperative and collaborative learning. However, I note that most students confine reading permissions to others associated with the University or even exclusively to class mates, thereby eliminating exposure to search engines and external readers and communities. A safer, choice, but one that serves to minimize spontaneous and emergent connections and relationships with people outside of the institution
  • he first  use verbal and non verbal behaviours by which we invite others to enter or to leave our individual spaces. The second is built upon on environmental constraints and opportunities we build and inhabit such as doors, fences, passwords and speaking platforms. Finally, Altman notes cultural constraints such as  the type of questions that are appropriately asked, the loudness of voice and the amount of touching that we use to build and reinforce interpersonal boundaries that culturally define privacy spaces and practices.
  • hus, it  should come as no surprise that privacy issues are a major concern of all who use the net and perhaps especially so for those using social software tools for both formal and informal learning. No easy asnwers, but I don’t see any compelling reasons to attemopt to totally lockdown our or our students capacity to explore and gain control over their own emerging sense of privacy and security.
« First ‹ Previous 41 - 51 of 51
Showing 20 items per page