background preloader

Information Ethics - Includes ITEC websites

Facebook Twitter

Gallery: How networks help us understand the world. As designer Manuel Lima points out in his TED Talk, A visual history of human knowledge, the network has become a powerful way to visualize much of what is going on in the world around us. “Networks really embody notions of decentralization, of interconnectedness, of interdependence,” says Lima. “This way of thinking is critical for us to solve many of the complex problems we are facing nowadays, from decoding the human brain to understanding the vast universe out there.” Here, Lima shares a few of his favorite network graphics. The Strengths of Nations This image shows the connections between scientific disciplines such as astrophysics, math and biochemistry. Visualizing the Bible This 2007 map by Chris Harrison shows 63,779 cross-references found in the Bible.

FlowerGarden This visualization by Greg Judelman and Maria Lantin shows the online discussion at a live event. Map of Science yFiles Although this looks like a piece of abstract art, there’s actually a lot going on here. Turnitin and SafeAssign plagiarism detection programs: Why are they all ineffective? Photo illustration by Juliana Jiménez. Photo by Chris Boswell/Thinkstock Plagiarism detection software from vendors such as Turnitin is often criticized for labeling clumsy student writing as plagiarism. Now a set of new tests suggests the software lets too many students get away with it. The data come from Susan E. Moreover, the results—while not a comprehensive overview of Turnitin's strengths and weaknesses—are likely to renew the debate among writing instructors about the value of plagiarism detection software in the classroom. Turnitin did not respond to multiple requests for comment. For the 2007 test, Schorn created six essays that copied and pasted text from 23 sources, which were chosen after asking librarians and faculty members to give examples of commonly cited works.

Blackboard’s SafeAssign (the product UT ended up choosing, as it was bundled with the university's learning management system) fared even worse. Susan M. Long Live the Web: A Call for Continued Open Standards and Neutrality. Digital Copyright. Internet, Social Media and Privacy Law Blog :: Published by Baltimore, Maryland Internet and Media Attorneys :: Silverman | Thompson | Slutkin | White LLC.

» A Speculative Post on the Idea of Algorithmic Authority Clay Shirky. Jack Balkin invited me to be on a panel yesterday at Yale’s Information Society Project conference, Journalism & The New Media Ecology, and I used my remarks to observe that one of the things up for grabs in the current news environment is the nature of authority. In particular, I noted that people trust new classes of aggregators and filters, whether Google or Twitter or Wikipedia (in its ‘breaking news’ mode.) I called this tendency algorithmic authority. I hadn’t used that phrase before yesterday, so it’s not well worked out (and I didn’t coin it — as Jeff Jarvis noted at the time, Google lists a hundred or so previous occurrences.) There’s a lot to be said on the subject, but as a placeholder for a well-worked-out post, I wanted to offer a rough and ready definition here.

As this is the first time I’ve written about this idea, this a bit of a ramble. Khotyn is a small town in Moldova. Do you trust me? And this is where authority begins to work its magic. The Baloney Detection Kit: Carl Sagan’s Rules for Bullshit-Busting and Critical Thinking. Carl Sagan (November 9, 1934–December 20, 1996) was many things — a cosmic sage, voracious reader, hopeless romantic, and brilliant philosopher. But above all, he endures as our era’s greatest patron saint of reason and critical thinking, a master of the vital balance between skepticism and openness. In The Demon-Haunted World: Science as a Candle in the Dark (public library) — the same indispensable volume that gave us Sagan’s timeless meditation on science and spirituality, published mere months before his death in 1996 — Sagan shares his secret to upholding the rites of reason, even in the face of society’s most shameless untruths and outrageous propaganda.

Through their training, scientists are equipped with what Sagan calls a “baloney detection kit” — a set of cognitive tools and techniques that fortify the mind against penetration by falsehoods: The kit is brought out as a matter of course whenever new ideas are offered for consideration. Web Literacy - Information Literacy Quiz. Critical-thinking - Taxonomy. Jamie Bartlett: How the mysterious dark net is going mainstream. LiveLinks - Research Strategies. Turnitin, "The Sources in Student Writing – Higher Education (White Paper)": 1.5 Information today – The state of the art 1.5.1 Books Google books, Google eBooks (now Google Play), Putting Google Play on Kindle Fire 7", Kindle Cloud Reader, Flip e-book video, Mike Matas next-generation digital book, Espresso Book Machine®, Open Library, Open Content Alliance, The Digital Public Library of America, The Digital Public Library of America's Bookshelf search interface, Online Books Page, 2. 3. 4.

The CRAAP Test | First-Year Seminar Program. About the Module The CRAAP Test module helps students learn the difference between appropriate and inappropriate sources for papers and bibliographies by prompting them to evaluate five basic elements of the sources: Currency, Relevance, Authority, Accuracy, and Purpose. Our hope is that this module will help your FSEM students find appropriate academic sources, thus enhancing their research. Below is an introductory video for the CRAAP module. Importing the Module The CRAAP module can be easily imported into your FSEM’s Canvas course. You can direct questions to Peter Catlin in Simpson Library at or to Leah Tams in the QEP Office at The Essential Skill of Crap Detecting | Morningside Center for Teaching Social Responsibility.

By Alan Shapiro "Warning: Several shipments of bananas from Costa Rica have been infected with necrotizing fasciitis, otherwise known as flesh-eating bacteria. Recently this disease has decimated the monkey population in Costa Rica...and has been able to graft itself to the skin of fruits in the region, most notably the banana....It is advised not to purchase bananas for the next three weeks.... "The skin infection from necrotizing fasciitis is very painful and eats two to three centimeters of flesh per hour. Amputation is likely, death is possible....The FDA has been reluctant to issue a countrywide warning because of fear of nationwide panic. They have secretly admitted that they feel upwards of 15,000 this will affect Americans but that these are acceptable numbers. Please forward this to as many people as you care about as possible as we do not feel 15,000 is an acceptable number.

-Manheim Research Institute, Center for Disease Control, Atlanta, Georgia. " Mathematics: English: History: Crap Detection 101 - City Brights: Howard Rheingold. “Every man should have a built-in automatic crap detector operating inside him.” Ernest Hemingway, 1954 The answer to almost any question is available within seconds, courtesy of the invention that has altered how we discover knowledge – the search engine. Materializing answers from the air turns out to be the easy part – the part a machine can do. The real difficulty kicks in when you click down into your search results. At that point, it’s up to you to sort the accurate bits from the misinfo, disinfo, spam, scams, urban legends, and hoaxes. “Crap detection,” as Hemingway called it half a century ago, is more important than ever before, now that the automation of crapcasting has generated its own word: “spamming.” The first thing we all need to know about information online is how to detect crap, a technical term I use for information tainted by ignorance, inept communication, or deliberate deception.

Today, just as it was back then, “Who is the author?” Know how to use online filters. EmeraldInsight. Craap_worksheet.pdf. Eval_websites.pdf. The CRAP test for evaluating sources | Lisa Gold: Research Maven. I frequently blog about evaluating sources— it was the subject of my very first post–so it should come as no surprise that I liked “Crap Detection, A 21st Century Literacy” from the Libraries and Transliteracy blog, which I found through the Librarian in Black. I wanted to point out two great items featured in the post: Howard Rheingold’s “Crap Detection 101,” and the librarian-created CRAP test for evaluating sources based on “Currency, Reliability, Authority and Purpose/Point of View”: CurrencyHow recent is the information? How recently has the website been updated? Is it current enough for your topic? Reliability What kind of information is included in the resource?

Though the questions are familiar (I put together a similar list for my research classes), I love the acronym CRAP, as it is descriptive and memorable. Like this: Like Loading... The CRAAP test - Evaluating Web Resources - LibGuides at North Carolina Agricultural & Technical State University. Currency: the timeliness of the information When was the information published or posted? Has the information been revised or updated? Is the information current or out-of date for your topic?

Are the links functional? Relevance: the importance of the information for your needs Does the information relate to your topic or answer your question? Authority: the source of the information Who is the author/publisher/source/sponsor? Accuracy: the reliability, truthfulness, and correctness of the content, and Where does the information come from? Purpose: the reason the information exists What is the purpose of the information? By scoring each category on a scale from 1 to 10 (1 = worst, 10=best possible) you can give each site a grade on a 50 point scale for how high-quality it is!

45 - 50 Excellent | 40 - 44 Good | 35 - 39 Average | 30 - 34 Borderline Acceptable | Below 30 - Unacceptable Note: the CRAAP test was developed by librarians at CSU Chico. Chucking the Checklist: A Contextual Approach to Teaching Undergraduates Web-Site Evaluation. Find using OpenURL Buy This Issue Chucking the Checklist: A Contextual Approach to Teaching Undergraduates Web-Site Evaluation Abstract This paper criticizes the checklist model approach (authority, accuracy, objectivity, currency, coverage) to teaching undergraduates how to evaluate Web sites.

Incorrect username or password. Please select your institution to authenticate with Shibboleth. PIP_Privacy_management_on_social_media_sites_022412.pdf. The Privacy Jungle: On the Market for Data Protection in Social Networks. Perspectives%20on%20Psychological%20Science-2012-Wilson-203-20.pdf. Internet and Surveillance: The Challenges of Web 2.0 and Social Media - Christian Fuchs, Kees Boersma, Anders Albrechtslund, Marisol Sandoval. p763-wang.pdf?ip=168.28.2. 16. Self-protection is behavior that seeks to prevent or reduce the likelihood of embarrassment, difficult questions, and feelings of vulnerability. Self-protection results in teenage patients avoiding mention of their diagnosis and treatment in their activities on Facebook. Self-protection has also a temporal dimension, as the need for protection changes over time (box 5).v Box 5 Self-protection Finding 14. Protection against uncaring Facebook friends and unwanted questions: “Well, I don't really think it is anyone's business on Facebook.

Finding 15. No it is not a secret. Finding 16. “It is another world. […] I go to the [game] and there is someone else playing a character and I go to that character that he is controlling and say ‘hello’. Finding 17. “[I don't like talking to someone who has the same] …. Finding 18. Finding 19. “Only at the start [I mentioned that I was in CHEO], but not any more.” Teens, Social Media, and Privacy. Teens, Social Media, and Privacy Teens share a wide range of information about themselves on social media sites; indeed the sites themselves are designed to encourage the sharing of information and the expansion of networks.

However, few teens embrace a fully public approach to social media. Instead, they take an array of steps to restrict and prune their profiles, and their patterns of reputation management on social media vary greatly according to their gender and network size. These are among the key findings from a new report based on a survey of 802 teens that examines teens’ privacy management on social media sites: Teens are sharing more information about themselves on social media sites than they did in the past. Teens are sharing more information about themselves on social media sites than they did in the past.

In addition to the trend questions, we also asked five new questions about the profile teens use most often and found that among teen social media users: JuncoClassStandingFBJADP. Facebook gets real with the kids over that privacy thing. Facebook is partnering with the National Association of Attorneys General in the US to launch a privacy awareness campaign for teenagers. This could well be a disaster in the making so Privacy Surgeon decided to create this helpful template and translation so out-of-touch executives and lawmakers can reach the right demographic. Bless-up dudes! (Translation: Dear Facebook user) We wanna do some real talk about the privacy thing.

The yute don’t want some wanksta jackin’ their info, so here’s some advice. (Translation: We are writing to talk to you about privacy. Young people like you don’t want personal information compromised by criminals. The yute don’t want some wanksta jackin’ their info, Chillax! Check out the privacy settings or epic fail! Don’t boost your scrilla or you’ll get pwned by some lame derp, fo sho. Use your head. The Privacy Blog - Privacy, Security, Cryptography, and Anonymity The Privacy Blog.

Helping Your Kids Understand Social Media Privacy Settings - Sue Scheff BlogSue Scheff Blog. Our kids are growing up in an age when sharing is ubiquitous and encouraged. But kids aren’t born understanding how to manage social media privacy settings or why it’s important to do so. It’s up to us as parents to guide them, just the same as teaching them how to cross the street or to stay away from strangers. How to Have the Conversation Begin the conversation with an attitude of respect. First, acknowledge the fun that is to be had on social media.

Next, compare their experience of social media friendship with colorful anecdotes from your own childhood friendships. After each step, stop talking. Now that they’re teens and keeping quiet, you want them to talk, right? Why Privacy Matters Talk about how photos and comments out of context can be misunderstood or used by those with ulterior motives. Forever Is Relative Teens have a hard time conceptualizing “forever.” Instead, try for short-term impact. Messer-Polis-jt-suppt-ltr-07062015.pdf. Privacy. Facebook Is Now Selling Your Web-Browsing Data To Advertisers. Access to Social Media Usernames and Passwords. Privacy and Social Media: It’s Complicated. Social Networking Advice for Teenagers: Protect your Privacy. Facebook, Instagram, and Social Parent Concern. Teaching Kids to Be Smart About Social Media. Social Networking Privacy. Privacy and Social Media: It’s Complicated. Facebook Privacy Tips. Welcome to Forbes. Data Science: What the Facebook Controversy is Really About - Sara M. Watson.

This Is Who Facebook Thinks You Are. How to Think about Privacy: An Interview with Jaron Lanier. Should Parents Post Pictures of Their Kids on Facebook? 11 ways to protect your privacy on Facebook. Use of Facebook and Twitter in social science research distorts studies - Technology - DIGITAL COMMERCE - As privacy grows scarcer on the Internet, people finally start to take notice. Privacy issues of social networking sites.

Social media research raises privacy and ethics issues. Kids' online privacy: Debate over sharing photos. Data Use Policy. Privacy Policy – Privacy & Terms – Google.