294 resultados para LACUNY listserv
Resumo:
The Oceanic Conference for International Studies (OCIS) has grown from a small, mostly Australian and New Zealand, affair to an international biennial gathering of scholars from North America, Europe, Asia and the Pacific. Established by a small organising committee drawn from universities across Australia and New Zealand, the principal aim of OCIS was to bring together the Oceanic International Relations (IR) community in an organic and inclusive fashion. There would be no secretariat, minimal bureaucracy, costs would be kept as low as possible, and assistance provided to graduate students. The first OCIS, held at the Australian National University in 2004, proved more successful than the organisers had envisaged. The conference continued to grow at its subsequent meetings at the University of Melbourne (2006) and the University of Queensland (2008). With each conference, a new organising committee was established to take carriage of OCIS. At the 2008 meeting, the question of creating a permanent organising meeting and beginning the transition towards a professional association was discussed in detail. If the transition happens at all, it will be gradual, organic, inclusive, and will prioritise the maintenance of the sense of community OCIS has helped establish. Whilst OCIS itself has flourished, associated initiatives such as OCIS working groups and the OCIS newsletter and listserv have withered on the vine, confirming the original organising committee’s view that endeavours such as this will only prosper to the extent that they are derived and driven from the community as a whole. In 2010, OCIS will hold its first conference in New Zealand, hosted by the University of Auckland...
Resumo:
The article explores the importance for young individuals to have a powerful disposition to be self-managing learners after completing their schooling. It presents several propositions which aim to unlearn the best educational experience a school principal can give for young people and their teachers. The use of digital technologies is mentioned.
Resumo:
The oz-Teachers listserv, an email list for teachers, ran continuously for 20 years, from 1995 to 2015. It provided the technical infrastructure for professional communication with the majority of its members being Australian teachers based in classrooms across the country. An analysis of the list archives provides us with interesting insights as to how teachers learn from and within communities of their peers and how such communities offer social and educational affordances to allow teachers to generate and enhance their own learning. This paper begins with a brief review of the response to the announcement of the list’s closure. It then moves to a report of the types of communication which emerged from the list over time with comparisons drawn from extant research, namely, an early analysis of email lists and a more contemporary study of teacher communication through microblogging. We identified 14 categories with eight of these being paired, namely, as asking/seeking and responding/giving. The key finding of this analysis was that the list, and its professional discussions, were sustained through reciprocity and collective intelligence, that is, sharing of information and resources and that this was evident through the life of the listserv.
Resumo:
It is often assumed that teachers in rural and remote schools are at a disadvantage when it comes to accessing professional development. But is there sufficient evidence to support this assumption? This paper reports findings from two national surveys comparing the professional development priorities of primary and secondary science teachers from metropolitan, provincial and remote schools. The research found that while teachers' unmet needs for some PD opportunities increased significantly with school remoteness, this was not the case for all opportunities. In teasing out the different PD priorities of primary and secondary science teachers, the paper provides evidence to help education authorities and professional organisations address the specific needs of teachers in different locations.
Resumo:
The subject of the Internet's potential to foster a public sphere has become a growing area of research in the social sciences in the last two decades. My research explores comments made by participants on the CBC News online politics forum during the May 2011 federal election in Canada. Based on conditions proposed by Jurgen Habermas in his concept of the public sphere and operationalized by Lincoln Dahlberg in his pioneering study of the Minnesota e-Democracy listserv, my thesis explores the potential for the CBC News online forum to foster a public sphere for Canadians. While examining the CBC News online forum against the criteria of the public sphere, I also interrogate Habermas' concept of a universal public sphere using the works of Nancy Fraser and other scholars, who argue for multiple public spheres.
Resumo:
I consider the case for genuinely anonymous web searching. Big data seems to have it in for privacy. The story is well known, particularly since the dawn of the web. Vastly more personal information, monumental and quotidian, is gathered than in the pre-digital days. Once gathered it can be aggregated and analyzed to produce rich portraits, which in turn permit unnerving prediction of our future behavior. The new information can then be shared widely, limiting prospects and threatening autonomy. How should we respond? Following Nissenbaum (2011) and Brunton and Nissenbaum (2011 and 2013), I will argue that the proposed solutions—consent, anonymity as conventionally practiced, corporate best practices, and law—fail to protect us against routine surveillance of our online behavior. Brunton and Nissenbaum rightly maintain that, given the power imbalance between data holders and data subjects, obfuscation of one’s online activities is justified. Obfuscation works by generating “misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating good data from bad,” thus decreasing the value of the data collected (Brunton and Nissenbaum, 2011). The phenomenon is as old as the hills. Natural selection evidently blundered upon the tactic long ago. Take a savory butterfly whose markings mimic those of a toxic cousin. From the point of view of a would-be predator the data conveyed by the pattern is ambiguous. Is the bug lunch or potential last meal? In the light of the steep costs of a mistake, the savvy predator goes hungry. Online obfuscation works similarly, attempting for instance to disguise the surfer’s identity (Tor) or the nature of her queries (Howe and Nissenbaum 2009). Yet online obfuscation comes with significant social costs. First, it implies free riding. If I’ve installed an effective obfuscating program, I’m enjoying the benefits of an apparently free internet without paying the costs of surveillance, which are shifted entirely onto non-obfuscators. Second, it permits sketchy actors, from child pornographers to fraudsters, to operate with near impunity. Third, online merchants could plausibly claim that, when we shop online, surveillance is the price we pay for convenience. If we don’t like it, we should take our business to the local brick-and-mortar and pay with cash. Brunton and Nissenbaum have not fully addressed the last two costs. Nevertheless, I think the strict defender of online anonymity can meet these objections. Regarding the third, the future doesn’t bode well for offline shopping. Consider music and books. Intrepid shoppers can still find most of what they want in a book or record store. Soon, though, this will probably not be the case. And then there are those who, for perfectly good reasons, are sensitive about doing some of their shopping in person, perhaps because of their weight or sexual tastes. I argue that consumers should not have to pay the price of surveillance every time they want to buy that catchy new hit, that New York Times bestseller, or a sex toy.
Resumo:
Librarians must continue their traditional roles as privacy rights activists and intellectual freedom upholders into the digital age, and across electronic information sources, including social media fora. Social media is quickly becoming a major source of information and center for information seeking, and librarians have an opportunity to promote and help shape social media policies that protect users’ privacy and assure that users can seek information without inhibition. One way librarians can be involved in the promotion of online privacy is by joining the social media user rights movement and advocating terms of use agreements that protect information seekers that follow the "Privacy by Design" model created by Ann Cavoukian, Ph.D.
Resumo:
We live in a world full of social media and portable technology that allows for the effortless access to, and sharing of, information. While this constant connection can be viewed as a benefit by some, there have been recent, sometimes embarrassing, instances throughout the world that show just how quickly any expectation of privacy can be destroyed. From pictures of poorly dressed shoppers at a grocery store to customers recording interactions with their servers at restaurants, the internet is full of media (all with the potential to go viral) created and posted without consent of all parties captured. This risk to privacy is not just limited to retail and restaurants, as being in any situation amongst people puts you at risk, including being in an academic classroom. Anyone providing in-class instruction, be they professor or librarian, can be at risk for this type of violation of privacy. In addition, the students in the class are also at risk for being unwittingly captured by their classmates. To combat this, colleges and universities are providing recommendations to faculty regarding this issue, such as including suggested syllabus statements about classroom recording by students. In some instances, colleges and universities have instituted formal policies with strict penalties for violators. An overview of current privacy law as it relates to an academic setting is discussed as well as recent, newsworthy instances of student recording in the classroom and the resulting controversies. Additionally, there is a discussion highlighting various recommendations and formal policies that have been issued and adopted by colleges and universities around the country. Finally, advice is offered about what librarians can do to educate students, faculty, and staff about the privacy rights of others and the potential harm that could come from posting to social media and the open web images and video of others without their consent.
Resumo:
Alison Macrina is the founder and director of the Library Freedom Project, an initiative that aims to make real the promise of intellectual freedom in libraries. The Library Freedom Project trains librarians on the state of global surveillance, privacy rights, and privacy-protecting technology, so that librarians may in turn teach their communities about safeguarding privacy. In 2015, Alison was named one of Library Journal‘s Movers and Shakers. Read more about the Library Freedom Project at libraryfreedomproject.org.
Resumo:
Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited for analytics and marketing. As an Information Literacy instructor, and a member of the Electronic Frontier Foundation, I believe in the importance of educating college students and web users in general that they have a right to privacy online. Class discussions on the topic of web privacy have yielded an interesting perspective on internet search usage. Students are unaware of how their online behavior is recorded and have consistently expressed their hesitancy to use tools that disguise or delete their IP address because of the stigma that it may imply they have something to hide or are engaging in illegal activity. Additionally, students fear they will have to surrender the convenience of uber connectivity in their applications to maintain their privacy. The purpose of this lightning presentation is to provide educators with a lesson plan highlighting and simplifying the privacy terms for the three major search engines, Google, Bing and Yahoo. This presentation focuses on what data these search engines collect about users, how that data is used and alternative search solutions, like DuckDuckGo, for increased privacy. Students will directly benefit from this lesson because informed internet users can protect their data, feel safer online and become more effective web searchers.
Resumo:
In the past few years, libraries have started to design public programs that educate patrons about different tools and techniques to protect personal privacy. But do end user solutions provide adequate safeguards against surveillance by corporate and government actors? What does a comprehensive plan for privacy entail in order that libraries live up to their privacy values? In this paper, the authors discuss the complexity of surveillance architecture that the library institution might confront when seeking to defend the privacy rights of patrons. This architecture consists of three main parts: physical or material aspects, logical characteristics, and social factors of information and communication flows in the library setting. For each category, the authors will present short case studies that are culled from practitioner experience, research, and public discourse. The case studies probe the challenges faced by the library—not only when making hardware and software choices, but also choices related to staffing and program design. The paper shows that privacy choices intersect not only with free speech and chilling effects, but also with questions that concern intellectual property, organizational development, civic engagement, technological innovation, public infrastructure, and more. The paper ends with discussion of what libraries will require in order to sustain and improve efforts to serve as stewards of privacy in the 21st century.
Resumo:
In recent decades, library associations have advocated for the adoption of privacy and confidentiality policies as practical support to the Library Code of Ethics with a threefold purpose to (1) define and uphold privacy practices within the library, (2) convey privacy practices to patrons and, (3) protect against potential liability and public relations problems. The adoption of such policies has been instrumental in providing libraries with effective responses to surveillance initiatives such as warrantless requests and the USA PATRIOT ACT. Nevertheless, as reflected in recent news stories, the rapid emergence of data brokerage relationships and technologies and the increasing need for libraries to utilize third party vendor services have increased opportunities for data surveillers to access patrons’ personal information and reading habits, which are funneled and made available through multiple online library service platforms. Additionally, the advice that libraries should “contract for the same level of privacy reflected in their privacy policies” is no longer realistic given that the existence of multiple vendor contracts negotiated at arms length is likely to produce varying privacy terms and even varying definitions of what constitutes personal information (PII). These conditions sharply threaten the effectiveness and relevance of library privacy policies and privacy initiatives in that such policies increasingly offer false comfort by failing to reflect privacy weaknesses in the data sharing landscape and vendor contracts when library-vendor contracts fail to keep up with vendor data sharing capabilities. While some argue that library privacy ethics are antiquated and rendered obscure in the current online sharing economy PEW studies point to pronounced public discomfort with increasing privacy erosion. At the same time, new directions in FTC enforcement raise the possibility that public institutions’ privacy policies may serve as swords to unfair or deceptive commercial trade practices – offering the potential of renewed relevance for library privacy and confidentiality policies. This dual coin of public concern and the potential for enhanced FTC enforcement suggests that when crafting privacy polices libraries must now walk the knife’s edge by offering patrons both realistic notice about the limitations of protections the library can ensure while at the same time publicly holding vendors accountable to library privacy ethics and expectations. Potential solutions for how to walk this edge are developed and offered as a subject for further discussion to assist the modification of model policies for both public and academic libraries alike.
Resumo:
The Brazilian public health system requires competent professionals sensitive to the needs of the population. The Foundation for Advancement of International Medical Education and Research (FAIMER) provides a two-year faculty development programme for health professions educators, aiming to build leadership in education to improve health. A partnership with governmental initiatives and FAIMER was established for meeting these needs. This paper describes the initial process evaluation results of the Brazilian FAIMER Institute Fellowship (FAIMER BR). Methods: Data were analysed for the classes 2007-2010 regarding: application processes; innovation project themes; retrospective post-pre self-ratings of knowledge acquisition; and professional development portfolios. Results: Seventeen of 26 Brazilian states were represented among 98 Fellows, predominantly from public medical schools (75.5%) and schools awarded Ministry of Health grants to align education with public health services (89.8%). One-third (n = 32) of Fellows' innovation projects were related to these grants. Significant increases occurred in all topic subscales on self-report of knowledge acquisition (eff ect sizes, 1.21-2.77). In the follow up questionnaire, 63% of Fellows reported that their projects were incorporated into the curriculum or institutional policies. The majority reported that the programme deepened their knowledge (98%), provided new ideas about medical education (90%) and provided skills for conflict management (63%). One-half of the Fellows reported sustained benefits from the programme listserv and other communications, including breadth of expertise, establishment of research collaboration and receiving emotional support. Conclusion: Contributors to initial programme success included alignment of curriculum with governmental initiatives, curriculum design merging educational technology, leadership and management skills and central role of an innovation educational project responding to local needs.
Resumo:
Techniques and Expertise in Wildlife Damage Control: A Survey Among NADCA's Membership, by Dallas R. Virchow, University of Nebraska, and J. Russell Mason, Utah State University NADCA Membership Survey Rats' Rights Repealed in New Jersey Texas Predators Dine on Exotics Recipes for Nutria Wildlife Damage to Aircraft Tallied Airplane Hits Deer Golfers Get Teed Off at Coots Japanese Technologist Tackles Rodents ADC To Tackle Gophers Booklet Review: Missouri's Beaver: A Guide to Management, Nuisance Prevention, and Damage Control by Ron McNeely. Conservation Commission of the State of Missouri, 1995. Elk Reintroduction and Meningeal Worms South African Puppy, "Licky," Barely Survives Eagle Attack Publications Available: The Proceedings of the 12th Great Plains Wildlife Damage Control Workshop (1995); The proceedings for a conference, "Private Property Rights and Responsibilities of Rangeland Owners and Managers"; Proceedings, 6th Eastern Wildlife Damage Management Conference (1993); Rangeland Wildlife (1996), edited by Paul R. Krausman, and published by the Society for Range Management New "Animal Talk" Radio Program in Los Angeles, CA — Animal Issues Today NWRC Announces Bird Research Leader Sick Boy Who Wishes for Dream Hunt Incites Wrath of Animal Rightists A Picture Speaks A Thousand Words: From the WDAMAGE listserv: by Fred Lyass (pseudonym used by request)
Resumo:
The Melungeons, a minority recognized in Southern Appalachia where they settled in the early 1800s, have mixed heritage—European, Mediterranean, Native American, and Sub-Saharan African. Their dark skin and distinctive features have marked them and been the cause of racial persecution both by custom and by law in Appalachia for two centuries. Their marginalization has led to an insider mentality, which I call a “literacy” of Melungeon-ness that affects every facet of their lives. Just a century ago, while specialized practices such as farming, preserving food, hunting, gathering, and distilling insured survival in the unforgiving mountain environment, few Melungeons could read or write. Required to pay property taxes and render military service, they were denied education, suffrage, and other legal rights. In the late 1890s visionary Melungeon leader Batey Collins invited Presbyterian homemissionaries to settle in one Tennessee Melungeon community where they established a church and built a school of unparalleled excellence. Educator-ministers Mary Rankin and Chester Leonard creatively reified the theories of Dewey, Montessori, and Rauschenbusch, but, despite their efforts, school literacy did not neutralize difference. Now, taking reading and writing for granted, Melungeons are exploring their identity by creating websites and participating in listserv discussions. These online expressions, which provide texts for rhetorical, semiotic, and socio-linguistic analysis, illustrate not solidarity but fragmentation on issues of origins and legitimacy. Armed with literacies of difference stemming from both nature and nurture, Melungeons are using literacy practices to embrace the difference they cannot escape.