Giant Zero Journalism, cont’d

Doc Searls

While doing research on another topic, I ran across this post by Amy Gahran ( @agahran ) in Poynter , riffing off a March 2007 post on my old blog titled Giant Zero Journalism. Here’s the post: We’ll start with Corporations Co-opt Citizen Journalism , by Frank Beacham , who concludes, I predict that in a world overflowing with dreadful citizen-made images, talented photographers and videographers will survive. Good journalism may be hard, but technology is easy.

The problem for people isn’t advertising, and the problem for advertising isn’t blocking. The problem for both is tracking.

Doc Searls

adtech advertising Business Identity Internet Journalism Law marketing privacy problems publishing securityIn Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking , @JuliaAngwin and @ProPublica unpack what the subhead says well enough: “Google is the latest tech company to drop the longstanding wall between anonymous online ad tracking and user’s names.”

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Airport psych security: snake oil on a plane?

Mind Hacks

Nature has an extensive article on the 'deception detection training' that's been widely rolled out for airport security staff and anti-terrorism police despite that fact that is has barely been publicly tested. However, there is no convincing evidence that has been published in peer-reviewed journals to suggest it can actually improve the ability to pick up deception. Link to Nature 'Airport security: Intent to deceive

Do you really need all this personal information, @RollingStone?

Doc Searls

Existing law provides for the confidentiality of personal information in various contexts and requires a business or person that suffers a breach of security of computerized data that includes personal information, as defined, to disclose that breach, as specified.

The postal model of privacy

Doc Searls

government , which is clearly acting at variance with the Fourth Amendment of the Constitution , which says, The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

e-Clippings (Learning As Art): Soapbox for the Day: Academic Journals like Field Methods, that dont support things like access to their content

Mark Oehlert

eLearning Guilds Summer Seminar Series | Main | Off Topic: Lets look at this at this as a chance to learn about oil » June 19, 2008 Soapbox for the Day: Academic Journals like Field Methods, that dont support things like access to their content Honest to goodness, someone please respond to me so we can have an open conversation about this. There is a journal, Field Methods , with an editor - H. Have you researched Open Access Journals and found that model to be wanting?

Daily Outline

Doc Searls

Also What I think I know about journalism. And then we’ll see the old debates of PGP, encryption escrow and the Clipper chip reprised – this time with a much more powerful national security establishment at the helm and significantly more real threats on the horizon. Journalism Links Media. The Natives Are Feckless, Part 2. By Bob Garfield in MediaPost.

2013_07_18 Link pile

Doc Searls

It explains, Securely self-hosting your websites, email, files and more has never been easier (or cheaper!). Journalism, publishing. infrastructure Internet Journalism Links Markets. Why shouting about discounts won’t satisfy your customers , by Natalie Brandweiner in MyCustomer. From Disney to dishwashers: Digital CRM to change customer experience , by Ashley Smith in SearchCRM. Venture Capital Funding At Its Lowest Since 2010 — A By The Numbers Look.

e-Clippings (Learning As Art): "Games trainers play" (Washington Business Journal)

Mark Oehlert

e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Of General Interest to Edupatents | Main | Spyware Alert - Thx to DArcy Norman » April 18, 2007 "Games trainers play" (Washington Business Journal) Question: How self-referential can one get in blogging before you cross into the Dark Side?

FreedomLeaks

Doc Searls

It’s also why, even with COICA (the Combating Online Infringement and Counterfeits Act) still in its larval stage, Homeland Security can kill off websites for alleged copyright infringement without showing probable cause, issuing a warrant, or anything else so traditionally procedural. Business Future Journalism Places Politics Technology VRM infrastructure problemsWe’ll start with three essential posts on the Wikileaks matter.

Circular quoting

Doc Searls

Business Geology history Journalism Photography Places ResearchSo I’m writing about financialization. Kevin Phillips ‘ prophetic book on the subject, Bad Money , is open on my desk. (He He published it in early 2007, in advance of The Crash.) But it doesn’t contain the definitional quote that I need. So I turn to Wikipedia.

Write and Wrong

Doc Searls

The only real mistake would be to fire Gray in the name of Apple’s legendary impenetrable security, breached by the power of German beer and one single human error. Of course, what Gizmodo did was an example of investigative journalism at work. Mainstream journals and broadcasters sometimes pay for stories, leads, video and audio recordings, photographs. A couple decades later that lesson was enlarged by “Notes Toward a Journalism of Consciousness,&# by D.

Report 158

Peelings

Doc Searls

The Onion on the Inauguration: Security Measures For The Inauguration. Tags: Events Travel theoninon The Onion Places inauguration Life problems Bush Journalism obama News Art Politics No One At White House Knows What To Do With Old Pair Of Rumsfeld’s Pants. Most Frequently Heard Words In Obama’s Inauguration Speech. Obama Inauguration Speech Ruined By Incessant Jackhammering. Hillary Clinton Mouthing Along To Presidential Oath.

Toward no longer running naked through the digital world

Doc Searls

Take journalism, for example. In reverse chronological order, here’s just some what I’ve said on the topic: The first two podcasts we’ve done so far at Linux Journal. Privacy is still personal (4 May 2018 in Linux Journal ).

Department of Corrections

Doc Searls

In some cases it involve intermediaries, about which Matthew says this: Instead, such monitoring could be outsourced to a trusted third party, which could then require anyone who uses that data to comply with a privacy and information security code of conduct, and that’s what Kauffman thinks will occur. I especially like John Battelle ‘s thinking out loud about his work in both journalism and advertising, straddling publishing’s collapsed “Chinese wall.”

RFP 116

Institutions, Confidence, and the News Crisis ? Clay Shirky

Clay Shirky

Dean Starkman has written a lengthy piece in the Columbia Journalism Review, assessing the writings of a group of us he calls the “Future of News” movement. That essay, Confidence Game , focusses principally on Jay Rosen and me, both of NYU’s Carter Institute , and Jeff Jarvis of CUNY , though noting some similarity of vision with Emily Bell of Columbia, Dan Gillmor of Arizona, and John Paton , publisher of the Journal-Register Company. Clay Shirky.

News 57

One More Industry Where Employment is Dropping as Output Rises

Andy McAfee

Journal reported in 2011 that employment throughout the US wireless industry was falling even as revenues rose, thanks at least in part to “gains in productivity and the fact that more customers were going online to choose their phone and pay their bills, reducing the need for more call-center workers and salespeople.”

Blockchain Killer-Apps

Irving Wladawsky-Berger

In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. A recent WSJ CIO Journal article noted that blockchain seems poised to change how supply chains work.

A Framework for the Safe Management of Digital Identities and Data

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. But to reach a higher level of privacy and security, we need to establish trusted data ecosystems, which requires the exchange and sharing of data across a variety of institutions. However, safeguarding the data used to validate identities creates security and privacy issues of its own.

Data 142

e-Clippings (Learning As Art): Hey! Editors of "Educational Researcher".Get a FREAKING CLUE!!!!!

Mark Oehlert

Mallette.and anybody else directly involved with the choice to publish the journal " Educational Researcher " through SAGE. Why not follow the model of the Public Library of Science Journals ? Or Open Access Journals ?

Blockchain Killer-Apps

Irving Wladawsky-Berger

In my opinion, there will likely be two major kinds of blockchain killer-apps: those primarily aimed at reducing the friction and overheads in complex transaction involving multiple institutions; and those primarily aimed at strengthening the security and privacy of the Internet through identity management and data sharing. A recent WSJ CIO Journal article noted that blockchain seems poised to change how supply chains work.

Shaping the Future of the Internet

Irving Wladawsky-Berger

The Winter 2016 issue of Dædalus , the Journal of the American Academy of Arts and Sciences , is devoted to the Internet. As a result, there’s no one overall owner responsible for security , - arguably the biggest challenge facing the Internet. The responsibility for security is divided among several actors, making it significantly harder to achieve.

Data 159

A Framework for the Safe Management of Digital Identities and Data

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. But to reach a higher level of privacy and security, we need to establish trusted data ecosystems, which requires the exchange and sharing of data across a variety of institutions. However, safeguarding the data used to validate identities creates security and privacy issues of its own.

Data 100

Educational Research in Learning Technology

Stephen Downes: Half an Hour

For example, it is rare to find a study of "what is learned watching Vikings " in an educational journal. However, the systematic reviews conducted by Lundin et al and pretty much everyone else are of studies published in academic journals.

The Daily Tab for 2017_06_06

Doc Searls

The Wall Street Journal sticks it to non-paying readers and non-paying Google in one move. Errata Security : Your printers and files are designed to narc on you. Business Ideas Journalism News Uncategorized VRMRequired viewing: A Good American , a documentary on Bill Binney and the NSA by @FriedrichMoser. IMHO, this is the real Snowden movie. And I say that with full respect for Snowden. Please watch it.

Survey 109

networked social capital

Harold Jarche

Releasing the data was meant to preserve an important historical record, but analyzing it is the only way to understand what happened and bolster national security.”

The True Value of a Good Education: Adaptability to a Changing Environment

Irving Wladawsky-Berger

A recently published article on the non-academic employability of life science PhDs found that “A majority (82%) of professionals (PhD graduates and completed postdoctoral fellows) considered that their PhD helped secure their first position. In 2011, the science journal Nature published a special issue on The Future of the PhD.

A Reading List

Doc Searls

From Linux Journal —. Maintaining Independence and Privacy in a World of Security and Surveillance. I thought I’d assemble a reading list of blog posts and other stuff I’ve written or said recently, for Andreas Weigend ‘s Social Data Revolution class at the UC Berkeley School of Information , in which I participated a few days ago. So here goes. All this is stuff published roughly since The Intention Economy came out: From this blog —.

List 146

[liveblog] Noam Chomsky and Bart Gellman at Engaging Data

David Weinberger

For the most part what’s happening is that these security institutions genuinely believe most of the time that what they’re doing is protecting us from big threats that we don’t understand. That’s why you should be extremely cautious when you hear an appeal to security. I don’t doubt that the US security folks believe it, but it is without meaning. It’s right there in mainstream journals. Those are the real security threats.

Data 184

Losing interest in social media: there is no there there

George Siemens

The substance needs to exist somewhere else (an academic profile, journal articles, blogs, online courses). Maybe, despite the comfort and security that your job offers, you, too, have noticed cracks in the technotopian bubble. Google+ was a bit of a breaking point for me. After recreating my online social network ( largely based on blogs from early 2000) in Facebook, Twitter, Foursquare, and Quora, G+ was a chore.

How the Internet becomes the Content-o-net

Doc Searls

The Obama administration is negotiating a trade agreement with 34 other countries — the text of which it refuses to make public, citing national security concerns — that according to leaked reports would include increased liability for content hosting companies and service providers.

2013_06_30 Link Pile

Doc Searls

Beyond feudal security: what’s happening to online security and freedom. In the Louisville Courier-Journal. By Yuko Takeo in The Wall Street Journal. Lessin in The Wall Street Journal. Surveillance. By Cory Doctorow in BoingBoing. Freedom: The Big American Lie: The U.S. try hard to believe in the internet’s liberating power. Therefore the N.S.A. scandal is forgotten and a new movie is already playing. By Thomas Frank in Faz.net.

Some new ways to look at infrastructure

Doc Searls

Blogging clearly got OBSOLESCED, but—far more importantly—so did the rest of journalism. What used to be business of journalism is now the business of “content production,” because that’s what social media and its publishing co-dependents get paid by advertising robots to produce in the world. They write and post in journals of various kinds on social media.

Daily Outline

Doc Searls

The NSA-Reform Paradox: Stop Domestic Spying, Get More Security. ” Also by Bruce: The NSA is breaking most encryption on the Internet and NSA Surveillance: a guide to staying secure. Security and Pervasive Monitoring. Input on the privacy and security implications of the Internet of Things. Trsst: a distributed secure blog platform for the open web. ” The govt should stay out of journalism. The Net.

The Top Ten Emerging Technologies of 2017

Irving Wladawsky-Berger

In the security camera industry, [deep learning networks] are making it possible to understanding crowd behavior, which will make public places and airports safer. A few weeks ago, the Wall Street Journal published an interview with Microsoft’s co-founder and first CEO Bill Gates and its current CEO Satya Nadella that added fuel to my doubts about the maturity of quantum computing.

Reflecting on Learning Analytics and SoLAR

George Siemens

Simon Buckingham Shum and Dragan were critical in securing this relationship, and in many ways for the academic rigour now found in LAK. We had spent time in late 2011 discussing a journal, but didn’t get much traction on this until 2012. In early April, Dragan and Simon had put together an overview of the journal theme and it was approved by SoLAR executive and announced at LAK12. Shane and Dragan have been the main drivers of the Journal of Learning Analytics.

e-Clippings (Learning As Art): Thousands of people at IBM are already doing it.

Mark Oehlert

The Wall Street Journal on June 18 ran an article on social networking at IBM. e-Clippings (Learning As Art) Home Archives Subscribe About My Social Networks « Passively Multiplayer Online Game (PMOG) | Main | "New study examines how online games can teach business skills" (Red Herring) » June 28, 2007 Thousands of people at IBM are already doing it.

July Hot List: Mobile Learning Content

Nancy White

July 25, 2011 This American Life Asks Listeners to Text To Donate , July 25, 2011 Even More Secure Access to Accounts , July 19, 2011 Cuts to Social Security? Remembering the Social Contexts of Learning , July 12, 2011 3 Essential Themes for Mobile Learning Systems , July 4, 2011 Five Practical Mobile Learning Tips , July 26, 2011 New open journal #iJim issue is out on #mLearning topics , July 18, 2011 mLearning (649). Best of Mobile Learning.

List 142

Net Work Learning article

Harold Jarche

The New Security Learning Foundation held its conference just prior to Online Educa last year in Berlin. I wrote an article, called Net Work Learning, for the journal that is distributed to members and conference attendees.

Tab Sale. Pay with attention. Save your cash.

Doc Searls

And Just Like That, Facebook Became the Most Important Entity in Web Journalism – The Atlantic. Errata Security: Right-winger explains what’s wrong with ComputerCop. Political Polarization & Media Habits | Pew Research Center’s Journalism Project. – The COMRADITY Journal. Breaking up the pledge drive: Boston’s WBUR wants to build a new model for public media funding » Nieman Journalism Lab.

Micro-blogging can help build your organisational culture

Dan Pontefract

As a consequence and according to Gallup Management Journal , this disengaged and disconnected culture (in US-based organisations) is costing $300b per year in lost revenues alone. The latter may cause some concern from the vantage point of the Chief Security Office. Furthermore, if the service is not accompanied by an enterprise-wide guideline and learning plan, some employees may not fully understand the security implications of what they share.

SEC opens the gates to crowdfunding and a new structure of capitalism

Trends in the Living Networks

The Wall Street Journal has an interesting piece called SEC Boots Up for the Internet Age. The article begins: Federal securities regulators are weighing demands to make it easier for fast-growing companies to use social networks such as Facebook and Twitter to raise money by tapping thousands of investors for very small amounts of shares. The Securities and Exchange Commission is looking at adapting its rules to encourage Internet-age techniques for small companies raising capital.

What’s the Value of a Liberal Arts Education in Our 21st Century Digital Economy?

Irving Wladawsky-Berger

More recently, USC’s Annenberg School of Communications and Journalism conducted a study to better understand the key competencies companies were looking for, and whether their talent requirements were being adequately addressed by universities. A few years ago, I came across a very interesting article about the efforts of Roger Martin to transform business education. At the time, Martin was the Dean of the Rotman School of Management at the University of Toronto.