Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Beyond ePortfolio - Identity construction in a digitally extended world

2,377 views

Published on

Presentation on ePortfolio and identity construction at AAEEBL conference, Boston, 20-22 July 2010

Published in: Education
  • Be the first to comment

Beyond ePortfolio - Identity construction in a digitally extended world

  1. 1. Beyond ePortfolios identity construction in a digitally extended world
  2. 2. ePortfolio
  3. 3. Identity
  4. 4. “The overwhelming feelings of crisis (in education), of ‘living at the crossroads’, …have little to do with the faults, errors or negligence of the professional pedagogues or the failures of educational theory, but quite a lot to do with the de-regulation and privatization of the identity-formation processes, the dispersal of authorities , the polyphony of value messages and the ensuring fragmentation of life… Beyond all this slicing and spicing, one can sense the crumbling of time. (Crisis) plays havoc with all the rules … the fragmentary life is lived in fragmentary time. Zygmunt Bauman, The Individualized Society, 2001
  5. 5. “The overwhelming feelings of crisis (in education), of ‘living at the crossroads’, …have little to do with the faults, errors or negligence of the professional pedagogues or the failures of educational theory, but Fragmentation quite a lot to do with the de-regulation and privatization of the identity-formation processes, the dispersal of authorities , the polyphony of value messages and the ensuring fragmentation of life… Beyond all this slicing and spicing, one can sense the crumbling of time. (Crisis) plays havoc with all the rules … the fragmentary life is lived in fragmentary time. Zygmunt Bauman, The Individualized Society, 2001
  6. 6. “[...] Most research on identity question the past or the present ( "Where are you from?" and "Who are you?"), while the concern with identity is actually mostly connected to the invention of self. Ordinary dreams prepare the future, including the immediate future. The self-concept is an instrument of action and change.”
  7. 7. “[...] Most research on identity question the past or the present ( "Where are you from?" and "Who are you?"), while the concern with identity is actually mostly connected to the invention of self. Ordinary dreams prepare the future, including the immediate future. The self-concept is an instrument of action and change.”
  8. 8. I D E N T I T Y PORTFOLIO
  9. 9. I D E N T I T Y PORTFOLIO
  10. 10. narration invention I D E N T I T Y PORTFOLIO Archives Projections Traces Plans Past Future Telling stories Dreaming
  11. 11. External Past I Future Me Internal
  12. 12. External Past I Me Future Internal
  13. 13. narration action invention External Past I Me Future Internal reflection
  14. 14. We External Past I Future Me Us Internal
  15. 15. “Every relationship. . . implies a definition of self by others and other by self. . . A person's 'own' identity can never be completely abstracted from his identity-for-others. Ronald Laing, Self and Others, 1961
  16. 16. “If I am I, simply because I am I, and thou art thou simply because thou art thou, then I am I and thou art thou. But if I am I because thou art thou, and thou art thou because I am I, then I am not I and thou art not thou.” Rabbi Mendel of Kotsk (quoted in Ethos and Identity, Epstein, 1978)
  17. 17. Identity construction
  18. 18. Individual Society
  19. 19. Individual Society Government Organisations Businesses ...
  20. 20. “Identity is a historical process which, after a transition phase where it was directed from above by the State, has fully emerged at the individual level from less than half a century as self-invention.”
  21. 21. “Self identity is not a set of traits or observable characteristics. It is a person's own reflexive understanding of their biography. Self- identity has continuity, but that continuity is only a product of the person's reflexive beliefs about their own biography. It explains the past and is oriented towards anticipated future.
  22. 22. Reputation Construction Construction Reflection Services Reflection Me Others Control Exploitation
  23. 23. People Organisations Networks Competency Competency Status Reputation profile management Project Activities Contributions management Collaboration Assets / Capital Knowledge Knowledge Audience management Professional Learning Learning Transformation development organisation community Adapted from Fred Cavazza: http://www.fredcavazza.net/index.php?2006/10/22/1310-quest-ce-que-lindente-numerique
  24. 24. What are the problems with identity technologies?
  25. 25. Where is the identity we have lost in digital identity?
  26. 26. 3 41,76 8,015Saturday , 24 Janu is the total aryng 09 nsitive An NHS t s containi 20 se- B ecTOdr 22 s ugust pe 0 n S rN r ofWrOesohas ust Aenvng vedpi: Thousands o numbe al rvi i critol 20o 7le across sout f names, ptorne atimnnrs, acided ho m nubebeo rs idef ails of aboe n onal the in s e-aft ce ddre in il a s h smaer a laptoses stored by pe Intesnin uthe0UaS.htsite Aberche r et jo atawe B 5, e . c t b-s00rpa ie M p with se curity bre en stolen asopgrt of a nts wersterolen. have be Trus5 wa ro M ra a on e .com st 00hteme. found to nnwgcUniversitonline fraud January 2 rsc s omplex y NHS p otection hav Si m l,aws. The e breached data patyenantec a securitcommpany, dis t medica y coputer, l e we ds breach over threcorekeo whicclosed the encrypte d, was st nn iafteri oneh had d t wh c reeearchers fouold n fao a offic s. h wore n e f its n e th r t m server computeot an unloc Ukraine held 1.6 million ked r in records stolen from Monster, a New York com pany.
  27. 27. Identification to Identification of
  28. 28. Identifier I d e n t i t y
  29. 29. R el atio n sh ips Attributes
  30. 30. Priva c y Intimacy
  31. 31. Tr u s t Walls
  32. 32. Closed society Open Society Architecture Integration Aggregation Systems Disconnected Networked Security Walls Trust Data Hiden Discoverable Identity External constraints Inner potential
  33. 33. Identity systems do not use the properties of the network topography
  34. 34. What are the problems with ePortfolios?
  35. 35. Assessment Focus Learning
  36. 36. Accountability Focus Employability
  37. 37. Individual Learning Community
  38. 38. Institution Ownership Individual
  39. 39. L e a r n e r Driver Te a c h e r
  40. 40. Services Institutions Interoperability across silos
  41. 41. ePortfolios are personal information silos
  42. 42. ePortfolios are personal information silos hosted in information silos (ePortfolio platforms)
  43. 43. ePortfolios are personal information silos hosted in information silos (ePortfolio platforms) managed by fragmented institutional silos
  44. 44. 10 ePortfolio challenges 2009
  45. 45. ePortfolio challenge
  46. 46. ePortfolio 1. Universal ePortfolio Repository 2. Universal Competency Identifiers 3. ePortfolio social 4. ePortfolio semantic editors 5. ePortfolio Readers challenge 6. Open & Trusted Service Architecture 7. ePortfolio based performance support system 8. ePortfolio discovery mechanism 9. URIs as tags 10. Universal Metadata
  47. 47. What are the problems with employability ePortfolios?
  48. 48. ‘Classical’ View Candidate Employer Profile Match Profile
  49. 49. Less ‘Classical’ View Candidate Employer Profile Profile Sole trader Match Entrepreneur Partners Profile Profile Profile Clients Needs
  50. 50. Are there domains experiencing issues similar to ePortfolios?
  51. 51. Curriculum Vitæ
  52. 52. CRM vs CRM
  53. 53. Personal health records
  54. 54. "The vision for the future of health care starts with the premise that consumers should own their own total personal health and wellness data and that only consumers, not insurers, not the government, not employers and not even doctors, but only consumers should have complete control over how it is used" Adam Bosworth, Google Vice- President speech to the 2007 AMIA (American Medical Informatics Association)
  55. 55. Is there a solution for ePortfolios?
  56. 56. Is it possible to have a system supporting simultaneously accountability, employability and learning? learning individuals, communities and organisations? ownership by individuals, communities and institutions? interoperability across applications and organisations?
  57. 57. Is it possible to have a system supporting simultaneously YES! accountability, employability and learning? learning individuals, communities and organisations? ownership by individuals, communities and institutions? interoperability across applications and organisations?
  58. 58. It is an architecture, not an application
  59. 59. Based on a simple principle...
  60. 60. Free personal data!
  61. 61. While the centre of gravity of information systems is moving from organisations towards individuals...
  62. 62. While the centre of gravity of information systems is moving from organisations towards individuals... Yet, we can observe an increasing fragmentation of personal data
  63. 63. Yet, we can observe an increasing fragmentation of personal data Source du graphique : Fred Cavazza
  64. 64. Yet, we can observe an increasing fragmentation of personal data Source du graphique : Fred Cavazza
  65. 65. We are not in control on how our personal data is being used
  66. 66. Enslaved personal data affects our ability to freely construct our identity
  67. 67. FROM Applications, the masters of my data
  68. 68. TO Applications, the servants of my data
  69. 69. How?
  70. 70. Splitting data, metadata & services in a trustworthy environment
  71. 71. Service Service Metadata Metadata Me Data Data
  72. 72. Service Service Service Service Service Service Metadata Metadata Metadata Data Data
  73. 73. Service Service Service Service Service Service Metadata Metadata Metadata Data Data Trust Architecture
  74. 74. Service Service Service Service Service Service Metadata Metadata Metadata Data Data Trust Architecture
  75. 75. IoS compliant IoS Infrastructure Business Services Business directories Dashboards Quality Control VRM Application (trust monitor/ enforcing agents) P er s on a l Social Networks D ata S t ore s Career Management Shared D i str i b u te d User User VRM Application Web Services Re p o s it o r y Healthcare (AIM, calendars, User directories, harvesting, (privacy protection) Learning Services publication, search engine, ... etc.) IoS Architecture
  76. 76. IoS compliant IoS Infrastructure Business Services Business directories Dashboards Quality Control VRM Application (trust monitor/ enforcing agents) P er s on a l Social Networks D ata St ore s Career Management Shared D i str i but e d User VRM Application Web Services Re p osi t ory User Healthcare (AIM, calendars, directories, harvesting, (privacy protection) User Learning Services publication, search engine, ... etc.) IoS Architecture
  77. 77. IoS compliant IoS Infrastructure Business Services Dashboard Business directories Quality Control P er s ona l D a ta Sto re Web Services VRM Application Shared Social Networks Dashboard Dashboard Career Management P e rs o n al Data VRM Application Store User User Healthcare Learning Services P e rs o n al Data User ... Store IoS Architecture
  78. 78. IoS compliant The society of Subjects Business Services Business directories S u bj e ct S u bj ect S u bj ect S u bj ect Quality Control VRM Application Social Networks S u bj e ct S u bj ect S u bj ect S u bj ect Career Management User VRM Application S u bj e ct S u bj ect S u bj ect S u bj ect User Healthcare Learning Services User S u bj e ct S u bj ect S u bj ect S u bj ect ... IoS Architecture
  79. 79. Service Ser vice Provi sion Provision D ata Data My Data Data Provision Our Data Data Pro vis ion Consumpt ion Consumption My Dashboard Our Dashboard Personal Proxy Business /Network Proxy S e rv i c e S erv ice S e r vi c e S e r vi c e S er v ic e Pro v i si o n Provision P ro vi sion P ro vis io n P rov i s i o Data D at a Da ta Data D a ta D a ta D a ta Da t a D at a M y D a ta M y Data M y Da ta M y Da ta My D a t s umpti o n Pro vi s io n C onsump tion Provision C on su m p tio n P ro vis io n C on su m p tio n P ro v is i o n Co n s u m p t i on My My My My My D a s h bo a rd Dashb oard D a sh bo a rd D a sh bo a rd D as h b oa S e rv i c e S erv ice S e r vi c e S e r vi c e S er v ic e Pro v i si o n Provision P ro vi sion P ro vis io n P rov i s i o Data D at a Da ta Data D a ta D a ta D a ta Da t a D at a M y D a ta M y Data M y Da ta M y Da ta My D a t s umpti o n Pro vi s io n C onsump tion Provision C on su m p tio n P ro vis io n C on su m p tio n P ro v is i o n Co n s u m p t i on My My My My My D a s h bo a rd Dashb oard D a sh bo a rd D a sh bo a rd D as h b oa
  80. 80. Structure of a PDS
  81. 81. All by me All by us All about me All about us All by me All by me All about me All about me
  82. 82. Paradigm shift
  83. 83. Individual Corporation
  84. 84. Individual Corporation
  85. 85. Individual Corporation
  86. 86. Individual Corporation
  87. 87. Corporation Individual
  88. 88. Corporation Individual
  89. 89. Corporation Individual Business Privacy enabler enforcer
  90. 90. me me me me me
  91. 91. me me me me me
  92. 92. me me me me me
  93. 93. me
  94. 94. me
  95. 95. I am in full control
  96. 96. I am in full control I can be discovered
  97. 97. I can be discovered I am in I full control can hide
  98. 98. I can be discovered I am in full control I can hide I can share
  99. 99. How can services interact with PDS?
  100. 100. Query Metadata harvested in PDS Return numbers of matching profiles Notify subjects that they have been searched Subjects decide to connect (or not) anynomously to query Query maker can push information to connected profiles
  101. 101. Benefit #1
  102. 102. Reduce asymetry of information access / broadcast
  103. 103. Benefit #2
  104. 104. Meaningful anonymous interaction
  105. 105. Prospects can stay anonymous while their needs are visible
  106. 106. The 7 Rules of the IoS
  107. 107. 1. Personnal control 7 Rules 2. Discoverability 3. Instant Social Networking 4. Ubiquity 5. Symmetry 6. Minimisation 7. Accountability
  108. 108. New manifesto
  109. 109. Now, imagine....
  110. 110. Imagine a network made up of personal data stores, where identity data and personal information systems representing individuals are at the very centre of the architecture. Imagine a situation where online connections to people, services, and to documents are seamless, rather than being fragmented over a number of services. Imagine a scenario where personal identities are securely held in one logical space and shared dynamically across a number of communities.
  111. 111. Use cases
  112. 112. Lifelong learning Lifelong & life wide learning portfolios Informal learning recognition
  113. 113. Healthcare Sharing and augmenting personal health records Creating an AA group Analysys of buying patterns
  114. 114. Policies Citizen dashboards Learning / intelligent territories Accountability
  115. 115. Business Create instantly a competitor to Facebook Get competitive business offers Vendor Relationship Management
  116. 116. M I S S I O N Put people back into control of their personal data: creating the technical and organisational conditions for individuals to be able to reunite their personal data and take over control and their exploitation.
  117. 117. M I S S I O N Put people back into control of their personal data: creating the technical and organisational conditions for individuals to be able to reunite their personal data and take over control and their exploitation. Support research on identity construction: inviting all fields of knowledge to confront current identity theories and practices across cultures, worldwide, to the new reality of a digitally expanded world.
  118. 118. And now?
  119. 119. y r Francis Maude, toda Cabinet Office Ministe ship called for a radic al shift in the relation g the state, when deliverin between citizens and rities, his first keynote spe ech to leaders of cha ses. voluntary grou ps and social enterpri
  120. 120. “The real danger is not that computers will begin to think like men, but that men will begin to think like computers.” Sydney J. Harris
  121. 121. “I find television very educational. Every time someone switches it on I go into another room and read a good book.” Groucho Marx
  122. 122. OfSUBJECTS INTERNET Merci www.iosf.org serge.ravet@iosf.org

×