Notes On "Global Guidelines: Ethics in Learning Analytics"

Stephen Downes: Half an Hour

In my post referencing the ICDE's Global Guidelines: Ethics in Learning Analytics yesterday I said: This document summarizes the considerations of an ICDE working group on learning analytics. Regular communications to staff should help ensure that they understand the approach: the underlying values linked to the institution’s mission and strategy; the anticipated benefits for students; the limitations of data and its interpretation; guidelines for ethical practice.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Leveraging Cloud Computing to Enhance the Nation’s Cybersecurity

Irving Wladawsky-Berger

There’s clearly an urgent need to significantly improve the security and resilience of IT systems and applications in light of the growing threat of cyberattacks, which FBI director Christopher Wray recently compared to addressing the challenge of global terrorism following the 9/11 attack.

Recommendations for Good Practice Using AI in Learning

Stephen Downes: Half an Hour

There should be clear guidelines and standards for the evaluation of AI tools in learning. In secure government workplaces a certain degree of surveillance is required and expected, however, surveillance should be limited to cases where it is needed.

Data 277

The 2019 Artificial Intelligence Index

Irving Wladawsky-Berger

Accountability; Data Privacy and Reliability; and Robustness and Security were mentioned in over 60% of the documents. Nearly a third (32%) of the articles dealt with the various AI Frameworks and Guidelines proposed by governments and policy institutions around the world.

Data 201

Stockholm syndrome in strategy

Dave Snowden

Stockholm syndrome means that the hostages loose awareness of their position so they don’t fly out of the cage but come to love it for the false security it gives them. You may know that a conventional solution has never worked in the past, that a few small specialist consultancy firms could do a better job, that your managers do not need to be constrained by a set of rigid guidelines etc.

Blockchain’s Potential for Environmental Applications

Irving Wladawsky-Berger

Blockchain technologies promise to significantly improve the efficiency and security of business transactions and data sharing among participants in a global ecosystem, such as supply chains, financial services, and similar complex applications involving multiple institutions. Water security : “The world’s demand for water has grown by around 1% per year.

Roots determine routes?

Dave Snowden

They have now secured funding for a longer term research programme in which large numbers of people will go through the same process over a longer period of time. This type of research is key in public health to allow us to combine biological data with statistics before creating crude guidelines. Each individual causal pathway creates a prescriptive guideline. 10: Trying to get to a single causal line of reasoning.

Business Social Media Benefits

Clark Quinn

First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution. If you’ve got a company with the right culture where the mission is clear and people are empowered, folks just don’t violate sensible guidelines. For the Australasian Talent Conference that will run in Sydney May 24-26 (where I’m speaking), they’ve been drumming up interest with a press release.

The Evolution of the Internet of Very Smart Things

Irving Wladawsky-Berger

Supporting 100s of billions of IoT devices at radically lower costs requires a decentralized peer-to-peer architecture, capable of near unlimited scalability, privacy, security and the ability to handle trustless transactions. “In The paper offers a number of IoT business model guidelines, from unlocking the excess capacity of physical assets to digitally integrating value chains. “In

Data 209

APA facilitated CIA torture programme at highest levels

Mind Hacks

From page 9: Our investigation determined that key APA officials, principally the APA Ethics Director joined and supported at times by other APA officials, colluded with important DoD [Department of Defense] officials to have APA issue loose, high-level ethical guidelines that did not constrain DoD in any greater fashion than existing DoD interrogation guidelines.

Micro-blogging can help build your organisational culture

Dan Pontefract

The latter may cause some concern from the vantage point of the Chief Security Office. Furthermore, if the service is not accompanied by an enterprise-wide guideline and learning plan, some employees may not fully understand the security implications of what they share. Anything an organisation does to encourage intelligent and appropriate use of internal micro-blogging may help to counter security and ethical threats.

[shorenstein] Farnaz Fassihi on Reporting from the Middle East

David Weinberger

Now journalists have security guards, and there are zones into which journalists simply don’t go. A: Security comes first. Q: Charlie Sennott ‘s GroundTruth project tries to set up guidelines for coverage. But no matter how much security you have, if you’re surrounded by militants who are determined to behead you, you can’t really protect yourself. E.g., a wedding in Baghdad was made enormously difficult because of security.

Report 147

The Art of the Ask

Seb Paquet

Secure food and hot beverages for collaborators. Also, it is quite possible that some breakout groups could use some guidance on how to conduct the discussion; guidelines or props might be made available for such cases. Rob Gonsalves, "On the High Seas" Source: moillusions.com via Seb on Pinterest.

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

That’s why it’s so unfair when people are profiled as financial or security risks based on only a few of their attributes, when a more extensive knowledge of who they are might lead to very different decisions. . He has been working closely with the World Economic Forum (WEF) to help develop the proper guidelines for the collection and use of personal data in collaboration with private companies, government representatives, end user privacy and rights groups, academics and others.

Data 210

Diamond in the rough

Mind Hacks

A diamond thief was caught by a security guard during a burglary and needed a free hand to fight him off, so he swallowed the precious stone. A 36-year-old man involved in the burglary of a precious diamond was surprisingly found at the crime scene by a security agent while he was just holding in his hand the precious stone. To keep the stone in a safe place during the battle with the security agent, the thief put the stone in his mouth and swallowed it.

Making social media happen in government: case study of NSW Department of Education

Trends in the Living Networks

Barriers to engagement include loss of control, staff performance, ROI, brand reputation, security, and poor understanding. DET released a 12 point social media guideline to all staff earlier this year, based on discussions with staff, unions, and professional bodies. I’m at the launch meeting of the social media community of practice set up by Institute of Public Administration NSW (IPAA).

Micro-blogging can help build your organisational culture

Dan Pontefract

The latter may cause some concern from the vantage point of the Chief Security Office. Furthermore, if the service is not accompanied by an enterprise-wide guideline and learning plan, some employees may not fully understand the security implications of what they share. Anything an organisation does to encourage intelligent and appropriate use of internal micro-blogging may help to counter security and ethical threats.

Dan Pontefract: Open Thinking

Stephen Downes: Half an Hour

Security A. Notes from Dan Pontefract's talk at Focus 2018, Montreal Beginning with the idea of being distracted, rather than ruminating in thought. We have accepted that. That's what's happening in society - technology aids and abets it. Do we have to outsource our thinking to Siri or whatever? I'm not sure we have figured out what is the right amount of tech. Consider the problems created by distracted driving. Why is that happening? This is outsourced thinking.

What Universities Must Learn About Social Networks

Jay Cross

Others will never do that for reasons of security, lack of the ability to customize, limited feature sets, or the risk of relying on a wildcard like Mark Zuckerberg. While it may be easy to develop a rudimentary social networking system in-house, it is advisable for higher education institutions to bring in a contractor who can develop a specific type of network and protect its security and growth. What Universities Must Learning About Social Networks.

Passwords on gRSShopper

Stephen Downes: Half an Hour

Passwords are in fact stored in the database, not lying around in some plain-text file, and the database is secure and protected against access. server onto HTTP Secure (https) so people can't pick your passwords out of wifi transmissions they're eavesdropping on (the https stuff he didn't mention but it has been on my mind for years).

Drupal 133

Growth flows naturally from the inside

Martijn Linssen

Thus, out of fear, enterprises try to control the employee by binding him with social media guidelines, taking away his blog , and presenting him with a Business Ethics Code - not realising the employee is just growing the organisation into the right direction Once again, I see Proximity and Distance translated to very important phenomena: as Proximity enables Intimacy, it also means Growth. Business or Pleasure? -

Being There: What Presence Means in a Digital World.

Stephen Downes: Half an Hour

Security. About the need to have curricula guidelines. This is an unedited automated transcript produced by my Pixel 4 from this presentation: [link] Hi everyone. I'm Stephen Downs and I bring you greetings from my home office in Castleman, Ontario, Canada.

WebEx 160

Social Media Implications for Business

Irving Wladawsky-Berger

They have access from work to the external versions everyone else uses, but in addition there are internal versions of these social media that run on the company's own IT systems that offer much more security for business discussions. In the spring of 2005, IBM used a wiki to create a set guidelines to provide practical advice for employees who wanted to blog. Since then, these guidelines have been extended to include other forms of social media.

Let’s use the ‘No Track’ button we already have

Doc Searls

Here are some other stories, mostly gathered by Zemanta : White House offers online privacy guidelines for consumers mercurynews.com ). You: White House Outlines Online Privacy Guidelines nytimes.com ). Use Anti-Tracking Tools To Boost Your Browser Security And To Ward Off Google’s Spying googleexposed.wordpress.com ). ( Cross-posted from the ProjectVRM blog.).

Opening new common ground

Doc Searls

What means do we have for sharing or exchanging that data in secure and trustable ways? How can individual customers notify whole market categories of their intent to purchase a product, safely and securely, without inviting a torrent of promotional jive in response? There are hundreds of thousands of free and open source tools, protocols and other goods already in the world, ready to serve as free building materials and guidelines.

Jive 164

Thoughts on privacy

Doc Searls

Another speaker was Michael Tiffany , a “gentleman hacker” and CEO of WhiteOps , “an internet security company focused on the eradication of ad fraud.” Many developers, enterprises and governments are now following her guidelines. In Here Is New York , E.B. White opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.”

Education Technology Strategies - Day One

Stephen Downes: Half an Hour

New Pew Research Report: The Future of Digital Life and Well-Being

Beth Kanter

Our well-being is directly tied to our sense of safety and security, which would be upended in these scenarios. Regulate: Governments and/or industries should create reforms through agreement on standards, guidelines, codes of conduct, and passage of laws and rules. The Pew Research Center has released a research report called “ The Future of Digital Life and Well-Being.”

Open Practices

Stephen Downes: Half an Hour

There needs to be a space for confidentiality, and there needs to be a sense of security about the implications of being open. For example: when we were developing MuniMall (an online learning, resources and knowledge community for the municipal sector in Alberta) we asked town managers how they got answers to problems that would happen from day to day (where to send a grader for repair, new guidelines for sewer inspection, examples of planning law litigation, etc).

stevenberlinjohnson.com: The Risk

Steven Berlin Johnson

Looking at all these images of endless security lines at the airports today, thanks to this foiled bombing plot, it occurs to me that the ideal solution would be the complete separation of passengers and their luggage. Blowing up a plane full of luggage -- with a body count of two -- wouldnt have the same PR value for the terrorists, and passengers would be able to fly entirely secure (though without their laptops and lattes.)

Japan’s nuclear crisis could be foreseen – a view from 19 years ago

Trends in the Living Networks

Japan’s obsession with energy independence, re-inforced by the 1970s oil crisis, has led it to embrace what it believes is the best means of increasing its energy security and to overlook the problems associated with this technology. A 1988 US-Japan agreement sets out guidelines for shipments of plutonium derived from nuclear fuel that originated in the US. In the early 1990s I worked for several years in Japan as a financial and business journalist.

Web 2.0 Applications in Learning

Tony Karrer

I tried to capture things down as they were said, here are my notes: Firewalls IP Privacy / Confidentiality Security Control over Quality of Information Strict Control Over Policies – Accuracy Liability / Discoverability / Compliance Change Management – Ready for It / Culture Management Take it Seriously – Away from Work Education of Management Lack of Resources – Mobile Devices Push Back from Workforce - Adoption This is a pretty good list of commonly cited barriers.

Education Technology Strategies - Day Two

Stephen Downes: Half an Hour

Harnessing Ignorance to Spark Creativity - Bob Sutton

Bob Sutton

In this vein, Chapter 13 of Weird Ideas That Work offers some guidelines for harnessing innovation: During the early stages of a project, don’t study how the task has been approached in the company, industry, field, or region where you are working. Put the other way, being able to be vulnerable, being secure in your abilities but willing to show you don't know everything, is more likely to result in new ways of looking at things. Bob Sutton.

Seven Ways to Make Sure Your Blog Gets Noticed

Beth Kanter

A blog carnival is a series of blog posts related to one theme, in this case, the promotion of USDA-proposed nutritional standards for snacks in schools, which coincided with a Kids’ Safe and Healthful Foods Project poll showing that most Americans support the guidelines. million readers and more than a million members across the country advocating for policies related to family economic security, child health and ending discrimination against mothers. Flickr Photo by alshepmcr.

A Nonprofit’s Legal Counsel Is The Social Media Manager’s Best Friend!

Beth Kanter

In our prep call, Daren clearly explained what to keep in mind when using social channels to engage with elected officials – and boils down to the distinction between elevating or educating about a policy issue and partisan support – the latter is not allowed by IRS guidelines. Flicker Photo By Mike Willis. That headline isn’t a lawyer joke. And let me say upfront, I respect lawyers and legal issues that nonprofits and foundations have to navigate around social media.

Irving Wladawsky-Berger: Reflections on Immigration

Irving Wladawsky-Berger

There is no doubt that the US needs a comprehensive immigration solution that properly takes into account various factors, including the security of our borders, the enforcement of workplace rules and labor demand and supply. Every company has to embody its legal, ethical and moral guidelines in its culture and its values, and express them in its brand. What's stopping us from decreasing tension and feeding our social security finances?

Applications and Theory of Educational Social Software

Stephen Downes: Half an Hour

Taxonomy of the 'many' - Group: conscious membership, leadership and organization, rules and guidelines, privacy controls, etc. What that community needs is some kind of dedicated space (sacred space) - it will do that filtering, it gives you a sense of security (you can just reach out). Discussion Terry - if it's safe secure sacred, how do you get into it? Summary of a panel discussion at CADE-AMTEC 2007 featuring Terry Anderson, george Siemens and Dave Cormier.

Irving Wladawsky-Berger: Reflections on Global Integration

Irving Wladawsky-Berger

Keeping track of local legistation on privacy, health and safety, or security is daunting and cries for intelligent data repositories and analysis engines. I cannot think of another organization on the face of the planet better positioned to architect centralized information, command and control, authority, and local execution with common guidelines than IBM.

e-Clippings (Learning As Art): Recent Podcasts from Harvard and Wesley Freyer on Innovation, Learning Orgs and IP

Mark Oehlert

Intellectual property law, Creative Commons licensed media, and the guidelines under which students can legally publish their ideas in a variety of multimedia formats on the OPEN WEB (accessible by anyone) are important issues for ALL teachers.

Harold Jarche » Wake up and smell the coffee

Harold Jarche

ralphmercer: committees are place to lure great ideas to be killed while absolving everyone of the blame hjarche: innovation is something you create from thinking & doesn’t usually come from existing practices that others are following [link] hjarche: Our Future: Security, Consumption, Participation and/or Green?

PKM 100

My Digital Identity

Stephen Downes: Half an Hour

Some of them are more or less permanent, like your social security number. Bank cards work not because they’re super duper security – they are basically a simple password system, no more secure in a certain sense than a website – but because of my desire not to have the entire world able to withdraw funds from my bank account. Even biometrics depend on the bearer’s motivation to keep the lock secure, on me not wanting somebody else to be able to successfully pose as me.