Social Networking – Why We Need to Educate Youth

This is a short post, but gives three definitive examples of why we need to develop and instill norms in youth concerning how to use digital resources.

Let’s help this woman find her camera!

Here’s the story (remember that…story).

In Britain a young woman (unfortunately) lost her camera. Some delightful chap decided that, rather than keeping the camera to himself, he’d try to get it back to her. Problem: he didn’t have her name, address, or anything that identified her beyond the pictures on the camera. Solution: post all of the pictures from the camera on Facebook and encourage tons of people to join the group the hopes that someone recognizes her. Problem: the embarrassment of having adult and non-adult pictures of yourself posted on the net.

Now, it turns out that this whole thing was viral marketing – the woman is an adult model and this was intended to promote a particular adult website. Nevertheless, based on the posts in the group that was set up, people saw this as a legitimate way to deliver missing property – many didn’t see anything wrong with deliberately posting pictures of a woman in various states of dress without first receiving her willful consent.

Continue reading

Techno-magnates and the Third World

In recent years we’ve seen some of the most powerful men in the world decide to turn their gaze towards the third-world. What has been surprising is that their intent has not been to solely dominate and exploit the most economically disadvantaged peoples in the world, but to try and relieve some of the ills that they face.

Techno-magnates – Bill and Nicholas – and their projects

The two most prominent individuals that have turned their attention to the third world have been Bill Gates, who is spending billions through the Melissa and Bill Gate’s Foundation to try and raise standards of living by improving literacy and fighting disease. The foundation is best known for its in work fighting disease – it has targeted Acute Diarrhoeal Illness, Acute Lower Respiratory Infections, HIV/AIDS, Malaria, and Tuberculosis (to name a few) as their primary targets.

Nicholas Negroponte, the magnate and visionary behind the One Laptop Per Child Program, want to bring the digital revolution to poor children and let them enjoy the ensuing benefits of the digital revolution. The theory is that, by distributing textbooks electronically, by giving children a way of learning to program, by giving them rugged pieces of technology that can be powered by a bicycle or foot loom, children can receive top-rate education despite living in Less Economically Developed Countries (LECDs).

Continue reading

Education, Social Networks, and Privacy

In this post I want to consider privacy from a bit of a ‘weird’ point of view: What information do you want students to reveal to each other and yourself, and what do you want to reveal to them? What ethical responsibilities do educators have to their students concerning their disclosure of information to one another?

In many classrooms, instructors and their students develop bonds by becoming vulnerable to one another by sharing personal stories with one another. ‘Vulnerability’ should be understood as developing a rapport of trust that could be strategically or maliciously exploited, though there is not an implicit suggestion that vulnerability will necessarily lead to exploitation. Some of the best teachers and professors that I have ‘revealed’ themselves as human beings – once I saw that they were like me I felt more comfortable participating in the classroom environment. With this comfort and increased participation, I developed more mature understandings of subject material and my personal stances regarding it. The rapports of trust that I developed with faculty led to the best learning environments I have ever experienced.

Continue reading

Education, Web 2.0, and Privacy

I have a lot that I could talk about here, but rather than working through philosophical arguments for the value of privacy in education, I want to constrain myself to establishing some key points that educators should be mindful of when using Web 2.0 applications in the classroom. I begin by listing a series of factors that organizations should consult to determine if they are collecting personal information, and then follow by talking about the value and importance of privacy statements. I will conclude by providing a brief (and non-comprehensive) list of personal information that educators probably want to keep offline, unless their University can provide granular access to the information.

Is this information personal information?

Pretty well all Web 2.0 tools gather some kinds of data from individuals that use them, be it in the form of email addresses, Internet Protocol (IP) addresses, telephone numbers, messenger names, or social networking information. Before deploying any Web 2.0 technology it is important for organizations to determine whether they are capturing what is identified as ‘personal’ data, and can do so by reflecting on the following factors:

Continue reading

One Laptop Per Child and Long-term Possibilities for Education

Some time ago a friend and I got talking about the One Laptop Per Child (OLPC) program, and I haven’t gotten it off my mind since. The OLPC program aims to deliver sturdy, low-power, low-cost laptops to children under the age of 12 in developing countries. The visionary of the program, Nicholas Negroponte, wants to introduce these laptops into second-world, rather than third-world, countries. The difference? Second-world countries face poverty and a host of ills, but possess the resources to purchase these notebooks, to feed their people (at some level), and build roads. The OLPC program is not currently aimed at absolutely poverty-stricken nations – those nations have other, more pressing, concerns, and their resources can be allocated to more effectively than by providing affordable laptop computers for children.

The computers are incredibly simple, providing basic computing. What’s important is that they are almost entirely open-source; kids can take them apart and learn about every element of the computers through trial and error. They’re rugged enough (both physically and code-wise) that kids can put them through hell and they’ll keep on going. While the laptops can be charged by plugging the computers into electrical outlets, they can also be powered by converting physical action to electricity – ride a bike attached to the thing and you’ll be able to charge it. The initial roll-out doesn’t have this, but it’s in the overall specs of the project.

Continue reading

Online Data Storage and Privacy

Last week Google, Microsoft, and Apple revealed updates to their online data storage platforms – Google now lets users purchase additional space for their various Google applications, Microsoft provides a Live Skydrive (essentially an online network drive), and Apple completely revamped their .Mac solution.

The idea behind these services is that people that are already using, or are considering using, the aforementioned companies’ online services and will be enticed by the idea that they could store hordes of information in ‘safe’ repositories; we can trust that neither Google, Microsoft, or Apple would lose our data, right? This isn’t entirely true – at least Google and Microsoft have previously lost client data and could not always restore it. Individuals cannot count on any of these services, though they are likely to be more reliable than personal backups. What’s more, these online solutions just make life easier by letting users stop worrying about performing personal data backups – this is their real selling feature.

There are issues that emerges with all of these services – first clients cannot know what country their data is being stored in, potentially leaving their data subject to foreign surveillance laws, and second clients cannot verify what any of these corporations are actually doing with their data.

Continue reading