SlideShare a Scribd company logo
Information Ecology
Business Definition
“Rather than a narrow focus on technology, information
ecology puts how people create, distribute, understand, and
use information at its center. Managers who take an
ecological approach believe that
• Information is not easily stored on computers and is not
“data”;
• The more complex an information model, the useful it will
be;
• Information can take on many meanings in an
organization;
• Technology is only one component of the information
environment and often not the right way to create change.
Davenport, T. H., & Prusak, L. (1997).Information ecology: Mastering the information
Tech Definition
Four Main Components of an Ecology
1. Life Forms: Devices
2. The Currency: Information Itself
3. The Architecture: both device and information
aspects
4. The environment: Human Culture
Lucas, P., Ballay, J., & McManus, M. (2012). Trillions: Thriving in the emerging
information ecology. Hoboken, N.J: John Wiley.
Taken from ch 8. Available through King Library Digital Editions.
Librarian Definition
“a system of people, practices, values, and
technologies in a particular local environment. In
information ecologies, the spotlight is not on
technology, but on human activities that are served
by technology[…] Information ecosystems have
“strong interrelationships and dependencies among
its different parts” (49, 51)
Nardi, B. A., & O'Day, V. (1999). Information ecologies: Using technology with
heart. Cambridge, Mass: MIT Press.
Bigger Picture
Information has always existed in a particular
context with various “species” in that context playing
discreet roles. Consider medieval Europe where
priests and royalty were accepted as “dominant
species” in that ecosystem.
Our current ecosystem is in chaos as various
species vie for control of the emerging ecosystem.
Librarians’ place and role in that ecosystem is in no
way established or guaranteed.
Exercise
I developed the following exercise as a way to
understand just how chaotic our current ecosystem
is. The point is simple, but the current chaotic and
tribalistic tendencies emerging represent significant
challenges for librarians, academics, and other
gatekeepers of information.
In the exercise I will give you a series of facts, and
allow you to deduce the context. I start with one
fact, and add one new fact at a time. Proceed to the
next slide to begin.
First term United States president begins war
First term United States president begins war
War drags on and seems endless
First term United States president begins war
War drags on and seems endless
Charges of incompetence and failure build up
First term United States president begins war
War drags on and seems endless
Charges of incompetence and failure build up
President barely wins hard fought re-election
First term United States president begins war
War drags on and seems endless
Charges of incompetence and failure build up
President barely wins hard fought re-election
Then- John Wilkes Booth assassinates him
Obviously, most people are thinking George W.
Bush, but the “facts” also fit Abraham Lincoln- to a
point.
I am not making a political point, but rather
one about the ecological constraints of
Information. Consider the following
hierarchy I have developed to illustrate the
dangers illustrated in the previous exercise.
Information Hierarchy
Wisdom
knowledge
Facts
data
Data: the rawest and least valuable form of
information. Data must be
compiled, organized, studied, assessed, compared,
etc for it to have any value. It is the lowest on the
hierarchy.
Facts: Facts are useful, but extremely dangerous,
because as we saw in my exercise they can be very
misleading. This is what Twain meant in his famous
axiom, “There are lies, damned lies, and statistics.”
Statistics are facts, but not very useful without
enough context and qualifying, related facts. It is
very easy to deceive using facts.
Knowledge: when facts become useful for human
judgment and decision making. You gained
knowledge in my exercise after I gave you the
qualifying fact that John Wilkes Booth assassinated
the president I was referring to. This is a valuable
currency in any information environment.
Wisdom: the historic goal of western, classical
liberalism. For our purposes, it is applying
knowledge to difficult decisions. “Is war justifiable in
x scenario?” I like my exercise because most
Americans have very different opinions about the
Civil War than the Iraq war- even though the Civil
War was significantly bloodier.
Characteristics of Current Info
Ecosystem
Fact and data driven
Decontextualized
Information is commodified and devalued
Dominant species are private entities, powerful
special interests, or ideologically sealed off
(tribalistic)
Chaos and competition for dominance/control
Devolution
Wisdom
knowledge
Facts
data
A downward trend
exists in our current
ecosystem away from
wisdom/knowledge
towards facts/data.
Traditional species
(including librarians)
have always sought to
operate in this section
of the ecosystem, but
current trends place
them at odds with
patron behavior and
preferences.
Realm of the “sound bite”
(byte?)
and “news bite.”
Consumable, commodified
information.
Conclusion
From the perspective of Information Ecology social
media has some very detrimental components.
Many gatekeepers see it as a sort of collaborative
ignorance where experts and professionals are less
important the Facebook friends.
But social media is merely a tool and a response to
Information Overload. It is not necessarily ethically
bound; rather humans do what they will with it- for
better or for worse.

More Related Content

What's hot

Heritage tourism and sustainable development
Heritage tourism and sustainable developmentHeritage tourism and sustainable development
Présentation CRT 11 décembre 2014
Présentation CRT 11 décembre 2014Présentation CRT 11 décembre 2014
Présentation CRT 11 décembre 2014
Hafedh Ben miled
 
BBA 1st sem basic of tourism unit 2.pptx
BBA 1st sem basic of tourism unit 2.pptxBBA 1st sem basic of tourism unit 2.pptx
BBA 1st sem basic of tourism unit 2.pptx
YuvrajsinghParmar5
 
Economic Development and Tourism
Economic Development and Tourism Economic Development and Tourism
Economic Development and Tourism
Aileen Murray
 
Tourism and religion
Tourism and religionTourism and religion
Tourism and religion
Ma E.C.C.
 
Lesson 2 - HFRONTSERV1
Lesson 2 - HFRONTSERV1Lesson 2 - HFRONTSERV1
Lesson 2 - HFRONTSERV1
Mervyn Maico Aldana
 
Tourism Marketing Chapter 1
Tourism Marketing Chapter 1Tourism Marketing Chapter 1
Tourism Marketing Chapter 1
Sha Zabala-Batin
 
Tourism market segmentation in context of nepal
Tourism market segmentation in context of nepalTourism market segmentation in context of nepal
Tourism market segmentation in context of nepal
Jivan Nepali
 
Tourism & Sustainable Development Goals. Steve Noakes March 2015.
Tourism & Sustainable Development Goals. Steve Noakes March 2015.Tourism & Sustainable Development Goals. Steve Noakes March 2015.
Tourism & Sustainable Development Goals. Steve Noakes March 2015.
Pacific Asia Tourism Pty Ltd
 
Strategies in Cavite City II
Strategies in Cavite City IIStrategies in Cavite City II
Strategies in Cavite City II
Kate Sevilla
 
Chapter 1
Chapter 1Chapter 1
Tourism Planning
Tourism PlanningTourism Planning
Tourism Planning
Sha Zabala-Batin
 
CUADERNILLO CENMA TURISMO
CUADERNILLO CENMA TURISMOCUADERNILLO CENMA TURISMO
CUADERNILLO CENMA TURISMO
IPEM 268
 
Marketing for hospitality and tourism chapter 7 organizational buyer behavior...
Marketing for hospitality and tourism chapter 7 organizational buyer behavior...Marketing for hospitality and tourism chapter 7 organizational buyer behavior...
Marketing for hospitality and tourism chapter 7 organizational buyer behavior...
Dr. John V. Padua
 
Technocultures
TechnoculturesTechnocultures
Technocultures
Bahar Anahmias
 
Factors effecting growth of hospitality
Factors effecting growth of hospitalityFactors effecting growth of hospitality
Factors effecting growth of hospitality
ASIFUDDIN MOHAMMED
 
The Propaganda Model (Chomsky) -ZK
The Propaganda Model (Chomsky) -ZKThe Propaganda Model (Chomsky) -ZK
The Propaganda Model (Chomsky) -ZK
Zareen Khan
 
Tourism kq3 ppt
Tourism kq3 pptTourism kq3 ppt
Tourism kq3 ppt
Lily Lee
 
Tourismmarketing and promotion
Tourismmarketing and promotionTourismmarketing and promotion
Tourismmarketing and promotion
mscaryl
 
Introduction to tourism business
Introduction to tourism businessIntroduction to tourism business
Introduction to tourism business
AMALDASKH
 

What's hot (20)

Heritage tourism and sustainable development
Heritage tourism and sustainable developmentHeritage tourism and sustainable development
Heritage tourism and sustainable development
 
Présentation CRT 11 décembre 2014
Présentation CRT 11 décembre 2014Présentation CRT 11 décembre 2014
Présentation CRT 11 décembre 2014
 
BBA 1st sem basic of tourism unit 2.pptx
BBA 1st sem basic of tourism unit 2.pptxBBA 1st sem basic of tourism unit 2.pptx
BBA 1st sem basic of tourism unit 2.pptx
 
Economic Development and Tourism
Economic Development and Tourism Economic Development and Tourism
Economic Development and Tourism
 
Tourism and religion
Tourism and religionTourism and religion
Tourism and religion
 
Lesson 2 - HFRONTSERV1
Lesson 2 - HFRONTSERV1Lesson 2 - HFRONTSERV1
Lesson 2 - HFRONTSERV1
 
Tourism Marketing Chapter 1
Tourism Marketing Chapter 1Tourism Marketing Chapter 1
Tourism Marketing Chapter 1
 
Tourism market segmentation in context of nepal
Tourism market segmentation in context of nepalTourism market segmentation in context of nepal
Tourism market segmentation in context of nepal
 
Tourism & Sustainable Development Goals. Steve Noakes March 2015.
Tourism & Sustainable Development Goals. Steve Noakes March 2015.Tourism & Sustainable Development Goals. Steve Noakes March 2015.
Tourism & Sustainable Development Goals. Steve Noakes March 2015.
 
Strategies in Cavite City II
Strategies in Cavite City IIStrategies in Cavite City II
Strategies in Cavite City II
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Tourism Planning
Tourism PlanningTourism Planning
Tourism Planning
 
CUADERNILLO CENMA TURISMO
CUADERNILLO CENMA TURISMOCUADERNILLO CENMA TURISMO
CUADERNILLO CENMA TURISMO
 
Marketing for hospitality and tourism chapter 7 organizational buyer behavior...
Marketing for hospitality and tourism chapter 7 organizational buyer behavior...Marketing for hospitality and tourism chapter 7 organizational buyer behavior...
Marketing for hospitality and tourism chapter 7 organizational buyer behavior...
 
Technocultures
TechnoculturesTechnocultures
Technocultures
 
Factors effecting growth of hospitality
Factors effecting growth of hospitalityFactors effecting growth of hospitality
Factors effecting growth of hospitality
 
The Propaganda Model (Chomsky) -ZK
The Propaganda Model (Chomsky) -ZKThe Propaganda Model (Chomsky) -ZK
The Propaganda Model (Chomsky) -ZK
 
Tourism kq3 ppt
Tourism kq3 pptTourism kq3 ppt
Tourism kq3 ppt
 
Tourismmarketing and promotion
Tourismmarketing and promotionTourismmarketing and promotion
Tourismmarketing and promotion
 
Introduction to tourism business
Introduction to tourism businessIntroduction to tourism business
Introduction to tourism business
 

Viewers also liked

Traversing Networks of Complexity
Traversing Networks of ComplexityTraversing Networks of Complexity
Traversing Networks of Complexity
fwiencek
 
Introduction To Ecology
Introduction To EcologyIntroduction To Ecology
Introduction To Ecology
sacklax40
 
Create Value In Projects Through Information Ecology1
Create Value In Projects Through Information Ecology1Create Value In Projects Through Information Ecology1
Create Value In Projects Through Information Ecology1
guest7471d9a
 
The declaration of independence
The declaration of independenceThe declaration of independence
The declaration of independence
JosnaAndrews
 
Civil Liberties And Civil Rights
Civil Liberties And Civil RightsCivil Liberties And Civil Rights
Civil Liberties And Civil Rights
Brian Shuman
 
Not by scientists alone: scientific (dis) information and the contribution of...
Not by scientists alone: scientific (dis) information and the contribution of...Not by scientists alone: scientific (dis) information and the contribution of...
Not by scientists alone: scientific (dis) information and the contribution of...
CIFOR-ICRAF
 
Self actualization
Self actualizationSelf actualization
Self actualization
Monica Smith
 
Maslow's theory
Maslow's theoryMaslow's theory
Maslow's theory
Vinod Kumar Nehta
 
Why we need strategy for information system and information technology?
Why we need strategy for information system and information technology?Why we need strategy for information system and information technology?
Why we need strategy for information system and information technology?
Uva Wellassa University Of Sri Lanka
 
Ecological pyramids
Ecological pyramidsEcological pyramids
Ecological pyramids
Angela Maria
 
Self Actualization
Self ActualizationSelf Actualization
Self Actualization
Danish Ali
 
Human impact on ecology
Human impact on ecologyHuman impact on ecology
Human impact on ecology
guest6dbeb7
 
Ecology
EcologyEcology
Ecology
Monika Sharma
 
Food Chains and Food Webs (PowerPoint)
Food Chains and Food Webs (PowerPoint)Food Chains and Food Webs (PowerPoint)
Food Chains and Food Webs (PowerPoint)
ConnerJanaG
 
Ecological pyramids
Ecological pyramidsEcological pyramids
Ecological pyramids
tangytangling
 
Structure and function of ecosystem 1
Structure and function of ecosystem 1Structure and function of ecosystem 1
Structure and function of ecosystem 1
Daxa Halai
 
Fundamental rights of indian constitution
Fundamental rights of indian constitutionFundamental rights of indian constitution
Fundamental rights of indian constitution
Naveen Sihag
 
ADM - O ambiente organizacional
ADM - O ambiente organizacionalADM - O ambiente organizacional
ADM - O ambiente organizacional
Gabriel Faustino
 
Ecology notes ppt
Ecology notes pptEcology notes ppt
Ecology notes ppt
farrellw
 
Conflict Management
Conflict ManagementConflict Management
Conflict Management
Management Contributor
 

Viewers also liked (20)

Traversing Networks of Complexity
Traversing Networks of ComplexityTraversing Networks of Complexity
Traversing Networks of Complexity
 
Introduction To Ecology
Introduction To EcologyIntroduction To Ecology
Introduction To Ecology
 
Create Value In Projects Through Information Ecology1
Create Value In Projects Through Information Ecology1Create Value In Projects Through Information Ecology1
Create Value In Projects Through Information Ecology1
 
The declaration of independence
The declaration of independenceThe declaration of independence
The declaration of independence
 
Civil Liberties And Civil Rights
Civil Liberties And Civil RightsCivil Liberties And Civil Rights
Civil Liberties And Civil Rights
 
Not by scientists alone: scientific (dis) information and the contribution of...
Not by scientists alone: scientific (dis) information and the contribution of...Not by scientists alone: scientific (dis) information and the contribution of...
Not by scientists alone: scientific (dis) information and the contribution of...
 
Self actualization
Self actualizationSelf actualization
Self actualization
 
Maslow's theory
Maslow's theoryMaslow's theory
Maslow's theory
 
Why we need strategy for information system and information technology?
Why we need strategy for information system and information technology?Why we need strategy for information system and information technology?
Why we need strategy for information system and information technology?
 
Ecological pyramids
Ecological pyramidsEcological pyramids
Ecological pyramids
 
Self Actualization
Self ActualizationSelf Actualization
Self Actualization
 
Human impact on ecology
Human impact on ecologyHuman impact on ecology
Human impact on ecology
 
Ecology
EcologyEcology
Ecology
 
Food Chains and Food Webs (PowerPoint)
Food Chains and Food Webs (PowerPoint)Food Chains and Food Webs (PowerPoint)
Food Chains and Food Webs (PowerPoint)
 
Ecological pyramids
Ecological pyramidsEcological pyramids
Ecological pyramids
 
Structure and function of ecosystem 1
Structure and function of ecosystem 1Structure and function of ecosystem 1
Structure and function of ecosystem 1
 
Fundamental rights of indian constitution
Fundamental rights of indian constitutionFundamental rights of indian constitution
Fundamental rights of indian constitution
 
ADM - O ambiente organizacional
ADM - O ambiente organizacionalADM - O ambiente organizacional
ADM - O ambiente organizacional
 
Ecology notes ppt
Ecology notes pptEcology notes ppt
Ecology notes ppt
 
Conflict Management
Conflict ManagementConflict Management
Conflict Management
 

Similar to Information ecology

Population Essays
Population EssaysPopulation Essays
Population Essays
Lindsay Adams
 
Lambs to Slaughter
Lambs to SlaughterLambs to Slaughter
Lambs to Slaughter
Jamie Zang
 
Bocconi infosfera
Bocconi infosferaBocconi infosfera
Bocconi infosfera
Luca De Biase
 
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docx
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docxModule 1 - CaseInformation Networking as Technology Tools, Uses, .docx
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docx
bunnyfinney
 
Proposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideas
Proposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideasProposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideas
Proposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideas
Heidi Andrews
 
An Introduction to the introduction of sociology
An Introduction to the introduction of sociologyAn Introduction to the introduction of sociology
An Introduction to the introduction of sociology
Eric Strayer
 
Reconstruction Era Essay
Reconstruction Era EssayReconstruction Era Essay
Reconstruction Era Essay
dd9bh40n
 
Information
InformationInformation
Information
brisso99
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health Essay
Elizabeth Lewis
 
What is news
What is newsWhat is news
Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...
Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...
Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...
Tamara Jackson
 
Week 4
Week 4Week 4
Week 4
Leslie Hitch
 
Reconstruction After The Civil War Essay.pdf
Reconstruction After The Civil War Essay.pdfReconstruction After The Civil War Essay.pdf
Reconstruction After The Civil War Essay.pdf
Melissa Bailey
 
Wikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liuWikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liu
Terry Flew
 
Barthes Essay Death Of The Author
Barthes Essay Death Of The AuthorBarthes Essay Death Of The Author
Barthes Essay Death Of The Author
Christina Roy
 
Comprehension Essay.pdf
Comprehension Essay.pdfComprehension Essay.pdf
Comprehension Essay.pdf
Laura Cappabianca
 

Similar to Information ecology (16)

Population Essays
Population EssaysPopulation Essays
Population Essays
 
Lambs to Slaughter
Lambs to SlaughterLambs to Slaughter
Lambs to Slaughter
 
Bocconi infosfera
Bocconi infosferaBocconi infosfera
Bocconi infosfera
 
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docx
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docxModule 1 - CaseInformation Networking as Technology Tools, Uses, .docx
Module 1 - CaseInformation Networking as Technology Tools, Uses, .docx
 
Proposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideas
Proposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideasProposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideas
Proposal Essay Topics Ideas. Reflection Essay: Proposing a solution essay ideas
 
An Introduction to the introduction of sociology
An Introduction to the introduction of sociologyAn Introduction to the introduction of sociology
An Introduction to the introduction of sociology
 
Reconstruction Era Essay
Reconstruction Era EssayReconstruction Era Essay
Reconstruction Era Essay
 
Information
InformationInformation
Information
 
Importance Of Good Health Essay
Importance Of Good Health EssayImportance Of Good Health Essay
Importance Of Good Health Essay
 
What is news
What is newsWhat is news
What is news
 
Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...
Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...
Good Hooks For Persuasive Essays. How to write a hook for a persuasive essay ...
 
Week 4
Week 4Week 4
Week 4
 
Reconstruction After The Civil War Essay.pdf
Reconstruction After The Civil War Essay.pdfReconstruction After The Civil War Essay.pdf
Reconstruction After The Civil War Essay.pdf
 
Wikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liuWikileaks anzca 11 6 july_flew and liu
Wikileaks anzca 11 6 july_flew and liu
 
Barthes Essay Death Of The Author
Barthes Essay Death Of The AuthorBarthes Essay Death Of The Author
Barthes Essay Death Of The Author
 
Comprehension Essay.pdf
Comprehension Essay.pdfComprehension Essay.pdf
Comprehension Essay.pdf
 

Recently uploaded

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Information ecology

  • 2. Business Definition “Rather than a narrow focus on technology, information ecology puts how people create, distribute, understand, and use information at its center. Managers who take an ecological approach believe that • Information is not easily stored on computers and is not “data”; • The more complex an information model, the useful it will be; • Information can take on many meanings in an organization; • Technology is only one component of the information environment and often not the right way to create change. Davenport, T. H., & Prusak, L. (1997).Information ecology: Mastering the information
  • 3. Tech Definition Four Main Components of an Ecology 1. Life Forms: Devices 2. The Currency: Information Itself 3. The Architecture: both device and information aspects 4. The environment: Human Culture Lucas, P., Ballay, J., & McManus, M. (2012). Trillions: Thriving in the emerging information ecology. Hoboken, N.J: John Wiley. Taken from ch 8. Available through King Library Digital Editions.
  • 4. Librarian Definition “a system of people, practices, values, and technologies in a particular local environment. In information ecologies, the spotlight is not on technology, but on human activities that are served by technology[…] Information ecosystems have “strong interrelationships and dependencies among its different parts” (49, 51) Nardi, B. A., & O'Day, V. (1999). Information ecologies: Using technology with heart. Cambridge, Mass: MIT Press.
  • 5. Bigger Picture Information has always existed in a particular context with various “species” in that context playing discreet roles. Consider medieval Europe where priests and royalty were accepted as “dominant species” in that ecosystem. Our current ecosystem is in chaos as various species vie for control of the emerging ecosystem. Librarians’ place and role in that ecosystem is in no way established or guaranteed.
  • 6. Exercise I developed the following exercise as a way to understand just how chaotic our current ecosystem is. The point is simple, but the current chaotic and tribalistic tendencies emerging represent significant challenges for librarians, academics, and other gatekeepers of information. In the exercise I will give you a series of facts, and allow you to deduce the context. I start with one fact, and add one new fact at a time. Proceed to the next slide to begin.
  • 7. First term United States president begins war
  • 8. First term United States president begins war War drags on and seems endless
  • 9. First term United States president begins war War drags on and seems endless Charges of incompetence and failure build up
  • 10. First term United States president begins war War drags on and seems endless Charges of incompetence and failure build up President barely wins hard fought re-election
  • 11. First term United States president begins war War drags on and seems endless Charges of incompetence and failure build up President barely wins hard fought re-election Then- John Wilkes Booth assassinates him
  • 12. Obviously, most people are thinking George W. Bush, but the “facts” also fit Abraham Lincoln- to a point.
  • 13. I am not making a political point, but rather one about the ecological constraints of Information. Consider the following hierarchy I have developed to illustrate the dangers illustrated in the previous exercise.
  • 15. Data: the rawest and least valuable form of information. Data must be compiled, organized, studied, assessed, compared, etc for it to have any value. It is the lowest on the hierarchy.
  • 16. Facts: Facts are useful, but extremely dangerous, because as we saw in my exercise they can be very misleading. This is what Twain meant in his famous axiom, “There are lies, damned lies, and statistics.” Statistics are facts, but not very useful without enough context and qualifying, related facts. It is very easy to deceive using facts.
  • 17. Knowledge: when facts become useful for human judgment and decision making. You gained knowledge in my exercise after I gave you the qualifying fact that John Wilkes Booth assassinated the president I was referring to. This is a valuable currency in any information environment.
  • 18. Wisdom: the historic goal of western, classical liberalism. For our purposes, it is applying knowledge to difficult decisions. “Is war justifiable in x scenario?” I like my exercise because most Americans have very different opinions about the Civil War than the Iraq war- even though the Civil War was significantly bloodier.
  • 19. Characteristics of Current Info Ecosystem Fact and data driven Decontextualized Information is commodified and devalued Dominant species are private entities, powerful special interests, or ideologically sealed off (tribalistic) Chaos and competition for dominance/control
  • 20. Devolution Wisdom knowledge Facts data A downward trend exists in our current ecosystem away from wisdom/knowledge towards facts/data. Traditional species (including librarians) have always sought to operate in this section of the ecosystem, but current trends place them at odds with patron behavior and preferences. Realm of the “sound bite” (byte?) and “news bite.” Consumable, commodified information.
  • 21. Conclusion From the perspective of Information Ecology social media has some very detrimental components. Many gatekeepers see it as a sort of collaborative ignorance where experts and professionals are less important the Facebook friends. But social media is merely a tool and a response to Information Overload. It is not necessarily ethically bound; rather humans do what they will with it- for better or for worse.