Presented at DIGITAL HUMANITIES AUSTRALASIA 2016: Working with Complexity, Hobart, Tasmania.
At some point in the future I am going to die. When this happens, I can donate my body to science but I’m currently unable to donate my data or even my metadata to research. I will present a scenario where an end of life service exists for people to donate their data.
'What do we know, or think we know, about domestic energy use and relationshi...South West Observatory
David Fletcher (Chief Executive, Energy Action Devon) and Emma Kate Brown talk to the SWO Energy Policy Seminar on 'What do we know, or think we know, about domestic energy use and relationships to health and well-being?'.
'What do we know, or think we know, about domestic energy use and relationshi...South West Observatory
David Fletcher (Chief Executive, Energy Action Devon) and Emma Kate Brown talk to the SWO Energy Policy Seminar on 'What do we know, or think we know, about domestic energy use and relationships to health and well-being?'.
Effective Strategies to Improve Engagement, Satisfaction and Retnetioneschonher
Find out what member engagement programs are working and not working. Find out why and what members are REALLY looking for in their membership. Learn how online communities can really drive engagement and increase renewal rates.
This presentation describes the structural issues that effect a small businesses information systems. The products and services provided by TechNecessities to address these issues are covered at a high level.
In this presentation given at the Social Media for Teaching and Learning event in Boston this fall, Jeff Borden of Pearson explains that as technology informs educational processes for delivery, assessment, content creation, and more, the evolution of that technology is transforming teaching and learning. But, as we shift from Web 2.0 to Web 3.0, education must filter through the glitz and "shiny objects" to best understand what actually works and what does not. This presentation will draw on educational best practices from past to present (and even look to the future). From Bloom to Kolb to Johnson and Johnson, rote memorization to authentic assessment, learning theory to practical application, the World Wide Web has tools that not only help educators promote sound pedagogy, but advance it.
This resource, compiled by Creating Excellence, contains case studies, tips, tools and contact details about localism in action. Includes:
> Participatory Budgeting
> Community Assets
> Community Led Planning
> Communities Taking the Lead.
http://www.creatingexcellence.org.uk/ceimages/Localism%20in%20Action%20Final.pdf
Data Mining Online Audiences with D8A GroupJon Gosier
Using a combination of the data-analysis products available from D8A Group, we’ve been monitoring the unfolding events in real-time to illustrate the ways our technology platforms can be used by companies, PR firms, marketing agencies, political groups, celebrities, and NGOs to make data informed decisions in real-time crisis scenarios.
In this case study document, we analyze breaking news scenarios involving Chris Christie's Brigegate scandal, Kerry Washington's appearance at the Golden Globes, and the Knight Foundation who we weren't aware had any news events at the time, but we quickly became aware of two through the use of our software.
The primary purpose of using technologies like the D8A suite of analytic products is to monitor and capture real-time data for analysis and research. They are also predictive, helping to surface trends, patterns, and happenings before one might find out about them otherwise. D8A’s products work across multiple communication channels.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
Effective Strategies to Improve Engagement, Satisfaction and Retnetioneschonher
Find out what member engagement programs are working and not working. Find out why and what members are REALLY looking for in their membership. Learn how online communities can really drive engagement and increase renewal rates.
This presentation describes the structural issues that effect a small businesses information systems. The products and services provided by TechNecessities to address these issues are covered at a high level.
In this presentation given at the Social Media for Teaching and Learning event in Boston this fall, Jeff Borden of Pearson explains that as technology informs educational processes for delivery, assessment, content creation, and more, the evolution of that technology is transforming teaching and learning. But, as we shift from Web 2.0 to Web 3.0, education must filter through the glitz and "shiny objects" to best understand what actually works and what does not. This presentation will draw on educational best practices from past to present (and even look to the future). From Bloom to Kolb to Johnson and Johnson, rote memorization to authentic assessment, learning theory to practical application, the World Wide Web has tools that not only help educators promote sound pedagogy, but advance it.
This resource, compiled by Creating Excellence, contains case studies, tips, tools and contact details about localism in action. Includes:
> Participatory Budgeting
> Community Assets
> Community Led Planning
> Communities Taking the Lead.
http://www.creatingexcellence.org.uk/ceimages/Localism%20in%20Action%20Final.pdf
Data Mining Online Audiences with D8A GroupJon Gosier
Using a combination of the data-analysis products available from D8A Group, we’ve been monitoring the unfolding events in real-time to illustrate the ways our technology platforms can be used by companies, PR firms, marketing agencies, political groups, celebrities, and NGOs to make data informed decisions in real-time crisis scenarios.
In this case study document, we analyze breaking news scenarios involving Chris Christie's Brigegate scandal, Kerry Washington's appearance at the Golden Globes, and the Knight Foundation who we weren't aware had any news events at the time, but we quickly became aware of two through the use of our software.
The primary purpose of using technologies like the D8A suite of analytic products is to monitor and capture real-time data for analysis and research. They are also predictive, helping to surface trends, patterns, and happenings before one might find out about them otherwise. D8A’s products work across multiple communication channels.
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
‘Personal data literacies’: A critical literacies approach to enhancing understandings of personal digital data. Luci Pangrazio
Deakin University, Australia
Neil Selwyn
Monash University, Australia
Abstract
The capacity to understand and control one’s personal data is now a crucial part of living in contemporary society. In this sense, traditional concerns over supporting the development of ‘digital literacy’ are now being usurped by concerns over citizens’ ‘data literacies’. In contrast to recent data safety and data science approaches, this article argues for a more critical form of ‘personal data literacies’ where digital data are understood as socially situated and context dependent. Drawing on the critical literacies tradition, the article outlines a range of salient socio-technical understandings of personal data generation and processing. Specifically, the article proposes a framework of ‘Personal Data Literacies’ that distinguishes five significant domains: (1) Data Identification, (2)
Data Understandings, (3) Data Reflexivity, (4) Data Uses, and (5) Data Tactics. The
article concludes by outlining the implications of this framework for future education and research around the area of individuals’ understandings of personal data.
The Role of Information Literacy for the Integration of RefugeesJuliane Stiller
Presentation given at the Information and Media Literacy Conference in Passau, 2018. It describes the importance of digital literacy skills for the job searching process of refugees. It also presents the component of a curriculum for digital skills for this target group.
This is a presentation given to the Annual Cooperative Congress in Cardiff on 29th June 2013. It introduces open data and also discusses why data needs representation and advocacy
From Information to Insight: Data Storytelling for OrganizationsThinking Machines
What kind of stories are best told with data? How do you take raw numbers and turn them into an engaging, meaningful story? Thinking Machines' content strategist Pia Faustino delivered this presentation on the data storytelling process at the "Humans + Machines: Using Artificial Intelligence to Power Your People" conference on February 19, 2016 in Bonifacio Global City, Taguig, Philippines.
Open Data Manchester's 'Data For Communities' presentation, given on 11 Oct 2019 for the Children's University. Demystifies data, explains what it is, what data is collected about us and our communities, and how we can use it for good.
As Librarians our roles are changing from being gatekeepers to a fortress of knowledge to becoming guides in a sea of information.
eResearch SA and three other Australian eResearch agencies are involved in the Access to Data for Culture & Communities research project. The aim of this project is to support the discovery and access (open or mediated) of datasets that underpin humanities, arts and social science research on national data storage services.
Pecha Kucha Night Adelaide Vol 13.
South Australia’s leaders in placemaking got together for a night of thought provoking reflection on Adelaide and South Australia’s past, present and visions for the future.
http://www.pechakucha.org/cities/adelaide/events/5423703cbfb6ff569e000001
Slide 1 – map and title
My name is Katie Hannan and I work at the State Library of South Australia as the Coordinator of Online Projects.
I love to tell stories.
Something that I love just as much as I love stories, are maps.
In story telling, maps do more than just give you context, they can help pirates find buried treasure and explorers document their journey from one side of a country to another.
Without maps we are lost....
Open access and the South Australian Red Cross Information Bureau: A case stu...Katie Hannan
A presentation for the University Libraries of South Australia Staff Development Working Group. 24 June, 2014.
What is the role of libraries in creating open access for public research, education and/or community information?
15th National Conference on Volunteering, presentation for State Library of South Australia about the projects we are coordinating that have volunteer involvement.
The Adelaide City Digital Hub is located at the Grote Street Library and aims to connect the community and city businesses with technology and the online world and get ready for the National Broadband Network (NBN).
The State Library of SA delivered two sessions at the Adelaide Digital Hub, social media explained and an introduction to Facebook.
Is it right to walk into a community in a developing country and establish library services based on the
idea of libraries in the developed world? For two young Australian librarians, 18 months spent working in Vanuatu and Samoa as AusAID volunteers provided insight into the world of acquisitions, information poverty, the nature of aid and book donations. This paper attempts to determine whether the traditional Western concept of libraries with our strong culture of recorded/printed information works in a world where oral language and culture is valued more than written, what types of materials should be collected and how they can be acquired.
Australian Youth Ambassadors for Development (AYAD) is an Australian Government Program funded by AusAID. Every year the program sends 400 young Australians into developing nations in the Asia Pacific Region. Epi High School is a secondary school on the island of Epi in the Shefa province of Vanuatu. The college enrols students from 11 to 16 years of age. In 2003 the school was severely damaged by Cyclone Ivy. With assistance from the Australian Government some new buildings were built, including a library building. The author worked for five months assisting the school librarian to establish the library; improving the libraries collection, developing budget guidelines and training the students and staff in using and maintaining a library effectively.During the course of this time, a myriad of challenges were faced and overcome.
Web 2.0 tools have changed the way that we interact with people and information online. Find out what Library 2.0 is and how the CSU Library is embracing new technology.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
3. What is my data?
It’s the “raw stuff, [it is] what is collected by
instrumentation or machinery”.
Pomerantz (2015, p.20)
4. Data collection aims
understand the public’s relationship with the concept of digital legacy
identify attitudes towards personal data donation
determine necessity for an end of life data donation service
inform understanding of personal data ownership
7. Personal information is information or an opinion about an identified individual,
or an individual who is reasonably identifiable.
Office of the Australian Information Commissioner, 2016.
8. End of Life Personal Metadata Store
Service Inclusions
Create a data will
Including nomination of data executor
Personal data audit
List locations and access methods
Prepare EOL triggered freedom of information requests where necessary
Data harvest
De-identification of data
15. Test cases
What do I buy?
Woolworths everyday rewards
Flybuys
Credit card statements…..
What does what I read say about me? Where could this information be?
Public Library
Book depository
Overdrive
16. Links
Paper - it’s a work in progress!
Research data - dx.doi.org/10.4226/66/576735696e4b0
References
At some point in the future I am going to die. If there is nothing in life that I am 100 % certain about, it is this. I can’t tell you when, or why, or even how?
What will happen to me?
I can donate my body to science but I’m currently unable to donate my data or even my metadata to research.
For a long time I’ve been almost afraid of death, afraid of becoming invisible, being forgotten. I’d even thought about how much it would cost to be cryogenically frozen then thawed out when there was a way that I could be cured, or fixed. Perhaps I could become a cyborg?
More recently I’ve been thinking about what will happen to digital footprint. What will happen to my data?
What exactly is ‘my data’? Pomerantz (2015) says that data is the “raw stuff, [it is] what is collected by instrumentation or machinery”.
Therefore, my data is all the digital files that I’ve created or that my computer, garmin, suunto watch, iphone, ipad, or digital camera has created.
Some of this may be classified as information or knowledge and much of this may have no meaning to anyone, not even me.
If we broaden the concept of “my data” then there’s also my personal metadata, but what exactly is this?
In order to begin to answer some of my questions, I conducted a short survey that ran over the course of a week (6-13 June 2016) and received 99 responses - c’mon 100th participant, where were you!?
Participants were recruited via social media and email (personal contacts and the Data Librarians Google+ group[1]).
My aim was to:
understand the relationship that members of the public have with the concept of digital legacy
identify respondents attitudes towards donating their personal data
determine the necessity for an end of life data donation service
and inform understanding of personal data ownership
[1] Data Librarians Google+ group https://plus.google.com/u/0/communities/105455769899183786145
The first question asked respondents to take into consideration this definition of metadata and explain what their understanding of the concept of personal metadata was.
Response analysis
Rather than read through all the responses myself (and due to time constraints) I decided to let the computer do the analysis for me.
I crowd sourced a tool to use (thanks twitter) and ended up selecting Voyant Tools.
I removed words included in the question (personal and metadata) to get a better understanding of the terms that respondents selected.
Social services that respondents said they used
If you could choose which aspects of this information you wanted to keep and make it available to your descendents how likely would you be to do so?
Likely ranges from somewhat likely to extremely likely
Unlikely ranges from somewhat unlikely to extremely unlikely
If you could collect this information (your personal metadata), make it anonymous and store it somewhere with minimal effort on your part, giving researchers the ability understand more about how people live in this modern digital age, how likely would you be to do so?
Likely ranges from somewhat likely to extremely likely
Unlikely ranges from somewhat unlikely to extremely unlikely
More questions - how likely, are the people who are interested in donating their bodies to science for research, to donate their personal metadata to research?
Seeing as I’m interested in being able to connect data, I asked the University of Adelaide a few questions about their Body Donation Program and this is what I found out. When you sign a consent form it is a “total and unconditional donation”. They do not give updates on how each body is used, but what if my body informed research? Is there a way for my estate to find this out? Could my physical remains be considered as research output and be listed with my universities institutional repository…. Is it not traditional research output?
What if the nature of my death was such that it required an autopsy? What if several people died from similar causes and autopsy results showed a pattern? What if we could mine personal metadata to discover links between similarities in how these people’s lives were conducted? What if they all shopped at a particular shop at a certain point in time and bought a particular product? How far can you take this information journey?
Personal information may be de-identified so that the information is no longer about an identifiable individual or an individual who is reasonably identifiable (s 6(1)). Data that has been successfully de-identified is not personal information.
De-identifying personal information for the purposes of big data activities means the information may be used, shared and published without jeopardising personal privacy. This enables organisations to maximise the utility and value of the information while safeguarding privacy. De-identifying information also lessens the risk that personal information will be compromised should a data breach occur.
There are a number of points during a big data activity when de-identification may occur.For example, de-identification may occur when the personal information is collected, prior to it being used for big data analytics, or before the analytical outcomes are presented.
Freedom of Information
What if the data is based overseas? What laws apply then? The law of the country that the data is located or the law for the country where the person lives who the data is concerning.
Important questions to ask in an online environment are, first, is it practicable to prescribe the specific length of time during which personal information may be retained by a collecting agency? And secondly, what is the most appropriate way to enforce legal limits on information retention? Modern technology facilitates and encourages the retention of customer information collected by e-commerce businesses for an indefinite period, rather than for the limited albeit loosely defined periods currently prescribed by many privacy laws. A related important question is how to best impose and enforce a right of deletion. (Corbett, 2013)
Should the exercise of the right to delete (also known as the “right to be forgotten”, “the right to erasure” and the “right to oblivion”) be controlled by the individual to whom the personal information pertains? Alternatively should the law mandate the use of automatic deletion and destruction technologies by the collecting agency after an appropriate time? (Corbett, 2013)
I'm interested in obtaining all of the information associated with my Woolworths Rewards card. Is this possible? Do you keep information about where I have shopped, what I have bought, where I have used the card for cheaper petrol?
Response
Thank you for contacting Woolworths Rewards regarding your account query.
You are able to retrieve all information regarding your account online, at www.woolworthsrewards.com.au. You will be able to view your transaction history dating back up to 30 days.
If you need us to send you a transaction statement, do let us know.
Thank you for your patience and for taking the time to contact us. Please feel free to contact us Katie, should you have any further questions. You can go to the “contact us” link through our website using either the email or our live chat option; or by calling us on 1300 10 1234. We’re open 8am until 8pm Monday-Friday and 9am-5pm Saturday-Sunday.
Your privacy is important to us. Please view our Privacy Policy for more information.
Logged into my online account and saw that I could actually access data that was up to 90 days old.
The Woolworths Group Privacy Policy (2016) states that they collect and hold the following kinds of personal information:
· Your personal details such as your name, addresses, telephone numbers, age and gender;
· Your customer reference number or loyalty card number;
· Whether you have taken up some of our other offerings, such as membership of our clubs and loyalty programs, our financial services products and our mobile applications;
· Any rewards and redemption details applicable to your membership of our loyalty programs; and
· Whether you have a connection with others whose personal information we may collect or hold, for example family members who may be linked to your loyalty program membership;
· What, how and when you buy from us or have expressed an interest in buying from us;
· Your stated or likely preferences, for example whether you may be interested in particular products or promotions.