Notes On "Global Guidelines: Ethics in Learning Analytics"

Stephen Downes: Half an Hour

In my post referencing the ICDE's Global Guidelines: Ethics in Learning Analytics yesterday I said: This document summarizes the considerations of an ICDE working group on learning analytics. Regular communications to staff should help ensure that they understand the approach: the underlying values linked to the institution’s mission and strategy; the anticipated benefits for students; the limitations of data and its interpretation; guidelines for ethical practice.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The 2019 Artificial Intelligence Index

Irving Wladawsky-Berger

Accountability; Data Privacy and Reliability; and Robustness and Security were mentioned in over 60% of the documents. Nearly a third (32%) of the articles dealt with the various AI Frameworks and Guidelines proposed by governments and policy institutions around the world.

Data 201

Blockchain’s Potential for Environmental Applications

Irving Wladawsky-Berger

Blockchain technologies promise to significantly improve the efficiency and security of business transactions and data sharing among participants in a global ecosystem, such as supply chains, financial services, and similar complex applications involving multiple institutions.

Stockholm syndrome in strategy

Dave Snowden

Stockholm syndrome means that the hostages loose awareness of their position so they don’t fly out of the cage but come to love it for the false security it gives them.

Roots determine routes?

Dave Snowden

They have now secured funding for a longer term research programme in which large numbers of people will go through the same process over a longer period of time. Each individual causal pathway creates a prescriptive guideline. 10: Trying to get to a single causal line of reasoning.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

Supporting 100s of billions of IoT devices at radically lower costs requires a decentralized peer-to-peer architecture, capable of near unlimited scalability, privacy, security and the ability to handle trustless transactions. “In

Data 275

Don’t Ask and Don’t Tell Facebook

David Weinberger

The article implies the Pentagon accepts that military folks are going to use these sites, and there may even be some good that will come from it, but the military is concerned about security. The military is trying to devise policies to govern how our service people use social networking sites, according to a story by Julian Barnes in the LA Times.

[shorenstein] Farnaz Fassihi on Reporting from the Middle East

David Weinberger

Now journalists have security guards, and there are zones into which journalists simply don’t go. A: Security comes first. Q: Charlie Sennott ‘s GroundTruth project tries to set up guidelines for coverage.

Report 191

Business Social Media Benefits

Clark Quinn

First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution. If you’ve got a company with the right culture where the mission is clear and people are empowered, folks just don’t violate sensible guidelines. For the Australasian Talent Conference that will run in Sydney May 24-26 (where I’m speaking), they’ve been drumming up interest with a press release.

Micro-blogging can help build your organisational culture

Dan Pontefract

The latter may cause some concern from the vantage point of the Chief Security Office. Furthermore, if the service is not accompanied by an enterprise-wide guideline and learning plan, some employees may not fully understand the security implications of what they share.

The Art of the Ask

Seb Paquet

Secure food and hot beverages for collaborators. Also, it is quite possible that some breakout groups could use some guidance on how to conduct the discussion; guidelines or props might be made available for such cases.

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

That’s why it’s so unfair when people are profiled as financial or security risks based on only a few of their attributes, when a more extensive knowledge of who they are might lead to very different decisions. .

Data 276

Diamond in the rough

Mind Hacks

A diamond thief was caught by a security guard during a burglary and needed a free hand to fight him off, so he swallowed the precious stone. To keep the stone in a safe place during the battle with the security agent, the thief put the stone in his mouth and swallowed it.

Micro-blogging can help build your organisational culture

Dan Pontefract

The latter may cause some concern from the vantage point of the Chief Security Office. Furthermore, if the service is not accompanied by an enterprise-wide guideline and learning plan, some employees may not fully understand the security implications of what they share.

Making social media happen in government: case study of NSW Department of Education

Ross Dawson

Barriers to engagement include loss of control, staff performance, ROI, brand reputation, security, and poor understanding. DET released a 12 point social media guideline to all staff earlier this year, based on discussions with staff, unions, and professional bodies. I’m at the launch meeting of the social media community of practice set up by Institute of Public Administration NSW (IPAA).

What Universities Must Learn About Social Networks

Jay Cross

Others will never do that for reasons of security, lack of the ability to customize, limited feature sets, or the risk of relying on a wildcard like Mark Zuckerberg. Prepare simple guidelines for implementation so that participants know what’s expected of them.

Dan Pontefract: Open Thinking

Stephen Downes: Half an Hour

Security A. Notes from Dan Pontefract's talk at Focus 2018, Montreal Beginning with the idea of being distracted, rather than ruminating in thought. We have accepted that. That's what's happening in society - technology aids and abets it. Do we have to outsource our thinking to Siri or whatever? I'm not sure we have figured out what is the right amount of tech. Consider the problems created by distracted driving. Why is that happening? This is outsourced thinking.

Growth flows naturally from the inside

Martijn Linssen

The To Tweet Or ReTweet Flowchart Your Twitter security is an egg, not an onion "Social Influence tools" only measure Twitter use Do we need to behave differently on Twitter? Business or Pleasure? -

Let’s use the ‘No Track’ button we already have

Doc Searls

Here are some other stories, mostly gathered by Zemanta : White House offers online privacy guidelines for consumers mercurynews.com ). You: White House Outlines Online Privacy Guidelines nytimes.com ). ( Cross-posted from the ProjectVRM blog.).

Passwords on gRSShopper

Stephen Downes: Half an Hour

Passwords are in fact stored in the database, not lying around in some plain-text file, and the database is secure and protected against access. server onto HTTP Secure (https) so people can't pick your passwords out of wifi transmissions they're eavesdropping on (the https stuff he didn't mention but it has been on my mind for years).

Drupal 136

Social Media Implications for Business

Irving Wladawsky-Berger

They have access from work to the external versions everyone else uses, but in addition there are internal versions of these social media that run on the company's own IT systems that offer much more security for business discussions. In the spring of 2005, IBM used a wiki to create a set guidelines to provide practical advice for employees who wanted to blog. Since then, these guidelines have been extended to include other forms of social media.

Opening new common ground

Doc Searls

What means do we have for sharing or exchanging that data in secure and trustable ways? How can individual customers notify whole market categories of their intent to purchase a product, safely and securely, without inviting a torrent of promotional jive in response?

Jive 205

New Pew Research Report: The Future of Digital Life and Well-Being

Beth Kanter

Our well-being is directly tied to our sense of safety and security, which would be upended in these scenarios. Regulate: Governments and/or industries should create reforms through agreement on standards, guidelines, codes of conduct, and passage of laws and rules.

Open Practices

Stephen Downes: Half an Hour

There needs to be a space for confidentiality, and there needs to be a sense of security about the implications of being open. This post is a response to a request for my thoughts on the value of open practices and methodologies for putting them into practice.

Thoughts on privacy

Doc Searls

Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Many developers, enterprises and governments are now following her guidelines. In Here Is New York , E.B. White opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.”

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

Japan’s nuclear crisis could be foreseen – a view from 19 years ago

Ross Dawson

Japan’s obsession with energy independence, re-inforced by the 1970s oil crisis, has led it to embrace what it believes is the best means of increasing its energy security and to overlook the problems associated with this technology. A 1988 US-Japan agreement sets out guidelines for shipments of plutonium derived from nuclear fuel that originated in the US. In the early 1990s I worked for several years in Japan as a financial and business journalist.

stevenberlinjohnson.com: The Risk

Steven Berlin Johnson

Looking at all these images of endless security lines at the airports today, thanks to this foiled bombing plot, it occurs to me that the ideal solution would be the complete separation of passengers and their luggage. Blowing up a plane full of luggage -- with a body count of two -- wouldnt have the same PR value for the terrorists, and passengers would be able to fly entirely secure (though without their laptops and lattes.)

Web 2.0 Applications in Learning

Tony Karrer

I tried to capture things down as they were said, here are my notes: Firewalls IP Privacy / Confidentiality Security Control over Quality of Information Strict Control Over Policies – Accuracy Liability / Discoverability / Compliance Change Management – Ready for It / Culture Management Take it Seriously – Away from Work Education of Management Lack of Resources – Mobile Devices Push Back from Workforce - Adoption This is a pretty good list of commonly cited barriers.

Education Technology Strategies - Day Two

Stephen Downes: Half an Hour

Seven Ways to Make Sure Your Blog Gets Noticed

Beth Kanter

A blog carnival is a series of blog posts related to one theme, in this case, the promotion of USDA-proposed nutritional standards for snacks in schools, which coincided with a Kids’ Safe and Healthful Foods Project poll showing that most Americans support the guidelines.

Sample 102

A Nonprofit’s Legal Counsel Is The Social Media Manager’s Best Friend!

Beth Kanter

In our prep call, Daren clearly explained what to keep in mind when using social channels to engage with elected officials – and boils down to the distinction between elevating or educating about a policy issue and partisan support – the latter is not allowed by IRS guidelines.

Harnessing Ignorance to Spark Creativity - Bob Sutton

Bob Sutton

In this vein, Chapter 13 of Weird Ideas That Work offers some guidelines for harnessing innovation: During the early stages of a project, don’t study how the task has been approached in the company, industry, field, or region where you are working. Put the other way, being able to be vulnerable, being secure in your abilities but willing to show you don't know everything, is more likely to result in new ways of looking at things. Bob Sutton.

Irving Wladawsky-Berger: Reflections on Immigration

Irving Wladawsky-Berger

There is no doubt that the US needs a comprehensive immigration solution that properly takes into account various factors, including the security of our borders, the enforcement of workplace rules and labor demand and supply. Every company has to embody its legal, ethical and moral guidelines in its culture and its values, and express them in its brand. What's stopping us from decreasing tension and feeding our social security finances?

Applications and Theory of Educational Social Software

Stephen Downes: Half an Hour

Taxonomy of the 'many' - Group: conscious membership, leadership and organization, rules and guidelines, privacy controls, etc. What that community needs is some kind of dedicated space (sacred space) - it will do that filtering, it gives you a sense of security (you can just reach out). Discussion Terry - if it's safe secure sacred, how do you get into it? Summary of a panel discussion at CADE-AMTEC 2007 featuring Terry Anderson, george Siemens and Dave Cormier.

Irving Wladawsky-Berger: Reflections on Global Integration

Irving Wladawsky-Berger

Keeping track of local legistation on privacy, health and safety, or security is daunting and cries for intelligent data repositories and analysis engines. I cannot think of another organization on the face of the planet better positioned to architect centralized information, command and control, authority, and local execution with common guidelines than IBM.

Ethical Codes and Learning Analytics

Stephen Downes: Half an Hour

Security applications are common. To support physical security, facial and object recognition technology is being used in schools and institutions. Video recognition and biometrics are also used for security purposes and exam proctoring (Rodchua, 2017).

Harold Jarche » Wake up and smell the coffee

Harold Jarche

Home About Consulting Contact Key Posts Clients Toolbox Français Harold Jarche Entries RSS | Comments RSS Subscribe by e-mail Twitter Faves planetrussell: "Globalization creates interlocking fragility, while giving the appearance of stability."

PKM 130

My Digital Identity

Stephen Downes: Half an Hour

Some of them are more or less permanent, like your social security number. Even biometrics depend on the bearer’s motivation to keep the lock secure, on me not wanting somebody else to be able to successfully pose as me. Large-Scale Student Assessment: Guidelines for Policymakers.

e-Clippings (Learning As Art): Recent Podcasts from Harvard and Wesley Freyer on Innovation, Learning Orgs and IP

Mark Oehlert

Intellectual property law, Creative Commons licensed media, and the guidelines under which students can legally publish their ideas in a variety of multimedia formats on the OPEN WEB (accessible by anyone) are important issues for ALL teachers.

e-Clippings (Learning As Art): Oh.this does not bode well for Microsoft.

Mark Oehlert

The Security of Unix, with the Beauty of Apple. No, I see no barrier to switch; Apple even makes it easy with guidelines on their site for the ex-Windows folks.

The OER Debate, In Full

Stephen Downes: Half an Hour

Creative Commons posted a “Proposed Best Practice Guidelines To Clarify The Meaning Of ‘Noncommercial’ In The Creative Commons Licenses”which included the following logic: (1) Is the person making use of an NC-licensed work an “allowable NC user” under the noncommercial license condition? Creative Commons pulled the well-researched draft guidelines off their website. Over the last couple of weeks I participated in a debate on whether OER projects should favour commercial use.