recentpopularlog in


« earlier   
Technology Is as Biased as Its Makers
“The regulation of the automobile must go through three stages,” wrote Nader. “The stage of public awareness and demand for action, the stage of legislation, and the stage of continuing administration.” We ought to apply a similar approach to technology capitalism today, in which we scrutinize the industry, rally around demands for change, and put in place processes for ongoing accountability. Such regulatory processes are hardly perfect; they can be cumbersome, subject to industry capture and misdirection. But that is equally true for any number of industries that are vital to our health, such as food safety monitoring, and the regulation of medical products, and the automotive industry. Algorithms, technological devices and artificial intelligence, when badly designed, expose us to risks as much as an unhygienic meal or faulty pacemaker. If used by government, they might even compromise administrative processes that govern our social security or judicial decisions about our personal liberty. We need to think about them as products that are designed and can be modified, and reject the arguments put forward by the tech elites to deny responsibility for their impact and blame users instead.
lib200  algorithms 
5 days ago by jfbeatty
Introducing SIFT, a Four Moves Acronym | Hapgood
Today, we’re introducing an acronym that can be used to remember the moves: SIFT.

(I)nvestigate the Source
(F)ind better coverage
(T)race claims, quotes, and media back to the original context
If you’ve followed the moves as they have developed over the past two years, these won’t surprise you, but there are a couple changes to the wording and the order.


I deal with this extensively on this blog and in the textbook, but the problem with CRAAP has never been the acronym. In fact, the history of CRAAP as a web infolit device begins eight years (at least) before the acronym. The difference has always been the difference between a narrow list of things to do (SIFT) and a broad list of things to consider and rate (CRAAP). I’ve detailed at length why that makes such a difference in terms of cognitive load and other factors, so I won’t repeat it here. But my point is that a bad methodology got a lot of lift with a clever acronym that served as a convenient shorthand and a student mnemonic — it’s probably time the better methodology gets an acronym as well.
information_literacy  lib200  news 
13 days ago by jfbeatty
Information Literacy | OER Commons
includes basic Boolean tutorials &c
5 weeks ago by jfbeatty
Calling Bullshit — Videos
University of Washington course
5 weeks ago by jfbeatty
Cloud Firewall – Get this Extension for 🦊 Firefox (en-US)
After KHill, blocks use of cloud web services from the Big Five.

[JB: use for class forum, have students block different services and report back]
via:dsalo  privacy  tools  lib200 
11 weeks ago by jfbeatty
Citizenship v. The Surveillance State | Boston Review
There is no reason to think this process will reverse. For the state, the ultimate goal of data accumulation is to possess a full portrait of every individual. In the intelligence community, this is referred to as the “person-centric” view of security. The goal is no longer simply to authenticate a person’s identity, but to paint a portrait of his or her trustworthiness. This raises grave civil liberty concerns, but also means we live in a world in which citizenship no longer possesses prima facie value. Indeed, from a security perspective, citizenship is antithetical to risk management. Given our security-obsessed times, it is hard to see how this trend can be reversed and the principles undergirding citizenship reclaimed. Data has no national sympathies, and increasingly neither do we.

This is the real crisis of border security: not an imagined caravan of asylum seekers, who come poor and tired to our doorstep, but the total erosion of our values. The logic of border security is all-expansive and is subverting our most cherished democratic institutions. Some solutions present themselves: we need better protections against data encroachment and renewed commitments to the principles of citizenship—not to mention clear parameters for how data can be used against others, migrants included, in accordance with our commitments to human rights. But more than anything else, we need to have an expansive national debate about the relationship between states, citizens, and data. This starts with changing our discourse about borders. As long as we view borders as lines in the sand, it makes sense to fixate on medieval walls. But this will not help us tackle the twenty-first-century challenges we actually face.
december 2018 by jfbeatty
Clueless Class
consider assigning for LIB200
For example, one of the assignments in this class is to read, summarize, and evaluate an academic journal article in your intended major field. I've been using some variation on this assignment for over fifteen years. They see multiple examples from previous students. There are some predictable places where most students have difficulty -- no freshmen are very good at the evaluating part, and lots of them struggle with identifying main ideas and central arguments -- and the occasional one-off error (there's always that one kid who decides an alternative-medicine website is a journal article). But mostly, they sort of do what they were asked.

This semester? An amazingly high percentage of students -- but only in this one section -- seem to have interpreted this assignment to mean "Write a personal essay about why you're interested in your major." I have literally no idea how they GOT this notion.
teaching  lib200 
may 2018 by jfbeatty
Are we emphasizing the benefits of citations all wrong? The case for networked discovery over impact measurement. | A Way of Happening
I think one of the most underrated features of Google Scholar is how easy it makes “citation hopping”. That is, how quickly you can find articles that cite other articles. Often when we give instruction on literature searching to students, we only focus on searching using keywords and subject headings. I’ve worked with so many students who, being new to a research area, are unaware of the keywords and subject headings. Even if they have a good grasp on them, there’s still a lot of areas keyword and subject heading searching can go wrong. There are relevant articles out there that just don’t use keywords that line-up with the ones they are trying. Plus there’s always a considerable amount of scholarly literature out there that has yet to be indexed using their specific subject heading scheme.
lib200  discovery  google_scholar 
april 2018 by jfbeatty
Using Digital Archives to Teach Data Set Creation and Visualization Design – ProfHacker - Blogs - The Chronicle of Higher Education
Unlike many undergraduate writing and communication projects that use data generated by professional researchers, students in this course composed their own datasets about the illustrations posted to VH (full assignment description). Using the assigned course text King Solomon’s Mines as a model, students learned how to tag book illustrations on a spreadsheet using this designated criteria:
All objects in the illustration (window, horse, hat, tree)
Setting (continent, country, house, forest)
Names of depicted characters (Allan Quatermain, Sir Henry Curtis)
Posture and expression of characters (lean, sit, stand)
Number of human figures (1 figure, 3 figures, crowd)
Style of art (realism, symbolist)
If appropriate, critical themes relating to race, gender, religion, disability, etc.
Tags acted as a form of close reading and provided material for discussion about contentious labels (identifying characters was sometimes a challenge, but critical themes are always contentious).
pedagogy  lib200  digital_humanities 
october 2017 by jfbeatty

Copy this bookmark:

to read