Using What They Know to Teach Them What They Need to KnowLucinda Rush
Conference Presentation
Georgia International Conference on Information Literacy
Lucinda Rush
Old Dominion University
Expropriation of social networking site consumer skills to aid students in mastering the ACRL Information Literacy Threshold Concepts.
Using What They Know to Teach Them What They Need to KnowLucinda Rush
Conference Presentation
Georgia International Conference on Information Literacy
Lucinda Rush
Old Dominion University
Expropriation of social networking site consumer skills to aid students in mastering the ACRL Information Literacy Threshold Concepts.
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...Julius Reimer
"Analysing User Comments in Online Journalism: a Systematic Literature Review", presentation at the International Communication Association's (ICA) 69th Annual Conference on May 28th, 2019 in Washington, D.C. (together with Volodymyr Biryuk, Marlo Haering, Wiebke Loosen, Walid Maalej and Lisa Merten).
The Basics of Science Communication - in a formulaJacopo Pasotti
I was invited to speak about science communication at a meeting of chemists, in Lion (France). Having short time to present such a huge field, I decided to condense it in a three elements formula (there is one element, you will notice, it has been introduced for the first time). This presentation has been changed (more text) hoping that it will be self-explaining. Glad if you download and thankful if you send me a notice!
Overcoming Challenges of Using Social Media for Outreach in an Academic Librarysociamigo
This tutorial addresses the challenges of using social media for outreach. Free MP3 Podcast reveals how to use social media to sell more stuff.
Find out more at www.sociamigo.com/mp3
Slides for my presentation at the Digital Sociology mini-conference at the annual meeting of the Eastern Sociological Society, March 17, 2016 in Boston, MA
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesJISC RSC Southeast
Accompaying presentation from Dr Fiona Duggan of the JISC Plagiarism Advisory Service, at the RSC SE / JISC PAS workshop - Identifying and preventing plagiarism: issues for HE tutors in FE Colleges. July 04th Northbrook College
Playing the Past, Seeing the Future: Game Design in the HumanitiesSeriousGamesAssoc
This session will explore the role of the humanities — history, literature, philosophy, civics, jurisprudence — in the practice of designing serious games. While serious games have long and storied history (no pun intended) with engaging the humanities, recent humanities-based games such as Assassin’s Creed Origins, 1979 Revolution, Walden, a game, and others have opened up new possibilities for not only reasserting game-based learning in humanities contexts, but also re-evaluating the design paradigms through which these games are made. This session will explore the process of designing games in the humanities, the challenges and affordances of doing so, and the possibilities for developing and producing humanities games through grant funding, including the National Endowment for the Humanities.
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
Reimer et al. 2019: Analysing User Comments in Online Journalism: a Systemati...Julius Reimer
"Analysing User Comments in Online Journalism: a Systematic Literature Review", presentation at the International Communication Association's (ICA) 69th Annual Conference on May 28th, 2019 in Washington, D.C. (together with Volodymyr Biryuk, Marlo Haering, Wiebke Loosen, Walid Maalej and Lisa Merten).
The Basics of Science Communication - in a formulaJacopo Pasotti
I was invited to speak about science communication at a meeting of chemists, in Lion (France). Having short time to present such a huge field, I decided to condense it in a three elements formula (there is one element, you will notice, it has been introduced for the first time). This presentation has been changed (more text) hoping that it will be self-explaining. Glad if you download and thankful if you send me a notice!
Overcoming Challenges of Using Social Media for Outreach in an Academic Librarysociamigo
This tutorial addresses the challenges of using social media for outreach. Free MP3 Podcast reveals how to use social media to sell more stuff.
Find out more at www.sociamigo.com/mp3
Slides for my presentation at the Digital Sociology mini-conference at the annual meeting of the Eastern Sociological Society, March 17, 2016 in Boston, MA
Identifying and preventing plagiarism: issues for HE tutors in FE CollegesJISC RSC Southeast
Accompaying presentation from Dr Fiona Duggan of the JISC Plagiarism Advisory Service, at the RSC SE / JISC PAS workshop - Identifying and preventing plagiarism: issues for HE tutors in FE Colleges. July 04th Northbrook College
Playing the Past, Seeing the Future: Game Design in the HumanitiesSeriousGamesAssoc
This session will explore the role of the humanities — history, literature, philosophy, civics, jurisprudence — in the practice of designing serious games. While serious games have long and storied history (no pun intended) with engaging the humanities, recent humanities-based games such as Assassin’s Creed Origins, 1979 Revolution, Walden, a game, and others have opened up new possibilities for not only reasserting game-based learning in humanities contexts, but also re-evaluating the design paradigms through which these games are made. This session will explore the process of designing games in the humanities, the challenges and affordances of doing so, and the possibilities for developing and producing humanities games through grant funding, including the National Endowment for the Humanities.
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
A brief introduction to network theory which introduces my COMM 620 MBA class to three different strands of research explaining the context within which digital tools are used.
A presentation to the World Nutrition Summit 2021 (Cape Town, March 4-6) on how low-carb activists and insulin resistance scholars can make responsible contributions through their digital voices.
Many experts say the rise of embedded and wearable computing will bring the next revolution in digital technology. They say the upsides are enhanced health, convenience, productivity, safety, and more useful information for people/organizations. At KMWorld Confererence, Lee Rainie shares the latest findings from Pew Research about the internet and puts it into organizational context with the expanding Internet of Things.
12 sept2013 imd network orchestration martha g russellMartha Russell
Presentation to the eMBA delegation of IMD on September 12, 2013 at Stanford University. Martha G Russell, Executive Director mediaX at Stanford University & Tony Lai, StartX.
Could social networking online help NEET young people gain employment?John Mowbray
This presentation is derived from work completed for a PhD research project, into the role of social networking, as supported by social media tools, on the job-search behaviours of those in the NEET (not in education, employment or training) category. It will be presented at the i3 conference hosted by Robert Gordon University in Aberdeen, in June 2015. The conference themes include information and its societal impact.
Scholars in the Open: Networked Identities vs. Institutional IdentitiesBonnie Stewart
The public presentation of self is identity work, but the networked practices by which scholars build a name and reputation for their work differ from the practices and strategies used - and recognized - within the academy. This presentation explores Bonnie Stewart's dissertation research into how networked scholars circulate identity and reputation in networked publics.
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...Cindy Regalado
This presentation briefly illustrates the state of citizen science our approach in Extreme Citizen Science. We present two examples under this research group at University College London: Publicly Initiated Scientific Research and the Socio-demographics of Volunteerism
Georgian Women 2011: Early analysis from the 2011 Caucasus Barometer by Katy Pearce is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
Based on a work at www.katypearce.net.
Permissions beyond the scope of this license may be available at http://www.katypearce.net/cv/georgia.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The French Revolution Class 9 Study Material pdf free download
Ica cs spanelv2
1. Emerging Research Agendas at the
Intersection of Communication
& Computational Social Science
DR. KATY PEARCE, UNIVERSITY OF WASHINGTON
@KATYPEARCE
Drawing constellations
amongst the stars:
Opportunities and
challenges of studying
vulnerable populations
via computational social
science
2. 1
SO WHAT?
• We all have to deal
with ethical issues in
computational social
science
• Looking at extreme
cases of vulnerable
populations can
illuminate issues
• I’m suggesting this is
helpful for those with
contextual knowledge
7. 6
Computational methods can allow to
see beyond the visible spectrum of
traditional analysis (Cioffi-Revilla,
2010) – this is rich, detailed,
interrelated, timely, and low-cost
data (Kitchin, 2013) that can reveal
patterns of individual and group
behavior (Lazer, et al., 2009)
ENTER
COMPUTATIONAL METHODS
8. 7
ACCESS
• Access is easy
• But perhaps
unethical
• Informed consent
(boyd & Crawford,
2012; Gleibs, 2014)
RISK
• Data collection
reduces risk greatly
• Analysis
introduces entirely
new risk (Oboler,
Welsh, & Cruz,
2012)
BLURRED
LINES
• The issue remains:
am I friend or foe
or merely a
researcher?
CREDIBILITY
• Computational
analysis may seem
“creepy”
COMPUTATIONAL &
AUTHORITARIAN STATES
9. • Hard to access participants
• Everyone is at risk
• Credibility and blurred lines
are always an issue
• Computational methods
give me something and
complements other
methods
• Less risky to access
• Analysis is probably putting
people at greater risk
AT STAKE
CHALLENGES OPPORTUNITIES
WHAT HAVE I DONE AND WHAT SHOULD I DO?
78
10.
11.
12.
13.
14.
15.
16.
17.
18. • Busting “bad guys” feels good
• Oppositionists ask me to do
these analyses to determine if
campaigns were successful, to
identify powerful nodes, and
to identify new allies
• Embassy staff find analyses
useful
• If oppositionists and embassy
staff find analyses useful, so
does the regime
• Regime probably knows some
of this, but not everything
– Example: after analyses
where I determined a
young photographer to be
the most powerful social
media player, increased
threats to him and regular
blocking of his accounts
• Retaliatory society
WHAT TO DO?
HELPFUL HARMFUL
1
7
19. TAKEAWAYS
The Internet and especially computational methods solve many of
the issues related to research in authoritarian states
But it creates many new problems
Given the challenges related to privacy and consent in
computational social science, how should we be thinking about
vulnerable populations?
1
8
22. 1
RESEARCH IN AUTHORITARIAN
STATES IS NOT FOR THE MEEK
AUTHORITARIAN STATES
ACCESS
•Researchers face access
barriers – getting visas,
funding to do fieldwork,
language and culture
differences, finding willing
participants, building
rapport
RISK
• Participants can take on
great risk to speak to a
researcher
• IRB cares more about
participants than researcher
• Researcher can easily risk
denial of visa or slanderous
content
BLURRED
LINES
• Friendships or relations in
an authoritarian state
increase risk for all involved
• When does friendship
begin and research end?
CREDIBILITY
• Make or break
• Very difficult to establish
• Researchers are assumed to
be spies
• Trust and credibility can be
helped by demonstrating
specific knowledge
• Using connections and
dropping names can help
23. 1
INTERNET AFFORDANCES
ACCESS
• Easier to find individuals,
easier to find time to
conduct interviews
• Allows for participants to
have greater reflection than
in a face-to-face interview
RISK
• Digital traces can increase
likelihood of information
getting out
• Research in a digital space
may not be considered as
authentic
BLURRED
LINES
• Online contexts and social
media blur lines between
friend and researcher
• If a research subject is a
“friend” and posts things
online, where is the
informed consent?
CREDIBILITY
• Difficult to demonstrate
authenticity in a mediated
environment
• Rapport can be build online
in a different way
• Self-presentation online can
be carefully crafted
• Researchers can make
credentials available online
WHAT CAN THE INTERNET DO FOR
YOU?
Editor's Notes
Access
Researchers face access barriers –
getting visas,
funding to do fieldwork,
language and culture differences,
finding willing participants,
building rapport
Risk
Participants can take on great risk to speak to a researcher
IRB cares more about participants than researcher
Researcher can easily risk denial of visa or slanderous content
Credibility
Make or break
Very difficult to establish
Researchers are assumed to be spies
Trust and credibility can be helped by demonstrating specific knowledge
Using connections and dropping names can help
Blurred lines
Friendships or relations in an authoritarian state increase risk for all involved
When does friendship begin and research end?
Access
Easier to find individuals, easier to find time to conduct interviews
Allows for participants to have greater reflection than in a face-to-face interview
Risk
Digital traces can increase likelihood of information getting out
Research in a digital space may not be considered as authentic
Credibility
Difficult to demonstrate authenticity in a mediated environment
Rapport can be build online in a different way
Self-presentation online can be carefully crafted
Researchers can make credentials available online
Blurred Lines
Online contexts and social media blur lines between friend and researcher
If a research subject is a “friend” and posts things online, where is the informed consent?
Access
Access issues are aided by the Internet
A question of representativeness arises
Risk
Digital-based research may reduce risks for researchers
Outcomes of angering governments do not differ
Digital may make risks to participants seem less, but may increase risk because of digital records
Digital research is safer, but not completely safe
Credibility
Have trusted connections introduce researcher online
Let Facebook be your character witness
Thus, authoritarian + digital can make for an easier path to trust building, although it also presents new challenges
Blurred Lines
Should a researcher have a disclaimer or consent agreement when accepting friend requests? How does the digital space differ from face-to-face?
Computational methods can allow to see beyond the visible spectrum of traditional analysis (Cioffi-Revilla, 2010) – this is rich, detailed, interrelated, timely, and low-cost data (Kitchin, 2013) that can reveal patterns of individual and group behavior (Lazer, et al., 2009).
These are patterns that would not be seen without computational tools as well as interpretation that is build on a theoretical base and contextual scholarly and applied knowledge.
Context matters (boyd & Crawford, 2012)
The ethics of the collection and analysis of social media data are up for debate (boyd & Crawford, 2012). Gleibs (2014) argues that social media data is not public and requires informed consent – social media users unwittingly become “human subjects” when their data is used in computational analysis and those users had an expectation of privacy, even if technically all this information is “public”. Researchers are not in the imagined audience (boyd & Crawford, 2012).
Can these patterns, analysis, and interpretation put individuals at risk? Oboler, Welsh, and Cruz (2012) suggest yes. When those being analyzed are living in an authoritarian regime, and thus under greater risk already, this can be even worse.
For me, as a researcher and as someone who cares about democracy in my fieldsite, I am conflicted. I know that some oppositionists have found my analyses useful. For example, being able to say that a hashtag campaign was “successful” because they saw the reach in my analysis can help a movement. My identifying government zombie social media accounts may raise morale amongst oppositionists. Embassy employees often tell me how much they appreciate these analyses as it gives them a new perspective on a situation – especially a protest or a campaign.
But if oppositionists and embassy staff are reading my blog analyses, the regime itself probably is too.
Can these patterns, analysis, and interpretation put individuals at risk? Oboler, Welsh, and Cruz (2012) suggest yes. When those being analyzed are living in an authoritarian regime, and thus under greater risk already, this can be even worse.
For me, as a researcher and as someone who cares about democracy in my fieldsite, I am conflicted. I know that some oppositionists have found my analyses useful. For example, being able to say that a hashtag campaign was “successful” because they saw the reach in my analysis can help a movement. My identifying government zombie social media accounts may raise morale amongst oppositionists. Embassy employees often tell me how much they appreciate these analyses as it gives them a new perspective on a situation – especially a protest or a campaign.
But if oppositionists and embassy staff are reading my blog analyses, the regime itself probably is too.
Access
Researchers face access barriers –
getting visas,
funding to do fieldwork,
language and culture differences,
finding willing participants,
building rapport
Risk
Participants can take on great risk to speak to a researcher
IRB cares more about participants than researcher
Researcher can easily risk denial of visa or slanderous content
Credibility
Make or break
Very difficult to establish
Researchers are assumed to be spies
Trust and credibility can be helped by demonstrating specific knowledge
Using connections and dropping names can help
Blurred lines
Friendships or relations in an authoritarian state increase risk for all involved
When does friendship begin and research end?