38,406 research outputs found
The Future of the Internet III
Presents survey results on technology experts' predictions on the Internet's social, political, and economic impact as of 2020, including its effects on integrity and tolerance, intellectual property law, and the division between personal and work lives
Recommended from our members
Social networking and open educational resources: updating quality assurance for e-learning excellence
Quality assurance approaches in higher education are well-established, but it is important to develop methods which are applicable to the domain of e-learning. The E-xcellence methodology (EADTU, 2009a) was therefore designed to assess the quality of e-learning in distance learning and blended learning contexts. The methodology is based around a set of benchmarks, supported by a practitioner handbook and a web-based âQuickScanâ self-evaluation tool. Experience shows that the E-xcellence methodology is particularly valuable for the process of improvement through collaborative internal review.
E-learning has evolved since the E-xcellence methodology was first developed. In particular, there is increasing awareness and use of open education resources (OERs) and social networking. However, these aspects were not explicit in the original E-xcellence resources. The E-xcellence Next project was therefore established to update the resources, incorporating these developments. To begin this process, a consultation was carried out among E-xcellence Next project members, followed by a participatory workshop on the themes of social networking and OERs. The E-xcellence resources were also used in a series of self-evaluation seminars held at European higher education institutions. Experience and feedback from these activities has been used to update the manual, the benchmarks and the QuickScan tool. The result is a set of quality assurance resources which encompass social networking, OERs and other recent developments in e-learning
Social Media: the Wild West of CSR Communications
Purpose - The central argument that this paper posits is that traditional media of old presented a clear, ordered world of communication management for organisations to extol their CSR credentials. In contrast to this, new Web 2.0 social media is increasingly being used by activists and hactivists to challenge corporate communication CSR messages and does so by highlighting instances and examples of Corporate Social Irresponsibility (CSI) (Jones, Bowd and Tench, 2009; Tench, Sun and Jones, 2012). Design/methodology/approach - The paper reports on research data from the European Communication Monitor 2010, 2011 and 2012 (http://www.communicationmonitor.eu/) and draws on work already published in this area (Tench, Verhoeven and Zerfass, 2009; Verhoeven et al, 2012; and Zerfass et al, 2010, 2011) to illustrate the unruly unregulated Web 2.0 social media communication landscape in Europe. A range of literature is drawn on to provide the theoretical context for an exploration of issues that surround social media. Findings - In late modernity (Giddens, 1990) communication comes in many guises. Social media is one guise and it has re-shaped as well as transformed the nature of communications and the relationship between organisations and their stakeholders. Originality/value - Communicating CSR in the Wild West of social media requires diplomatic and political nous, as well as awareness and knowledge of the dangers and pitfalls of CSI. The data reported on in this paper illustrates well the above points and sets out scenarios for future development of corporate communication of CSR through, and with social media
When Do People Trust Their Social Groups?
Trust facilitates cooperation and supports positive outcomes in social
groups, including member satisfaction, information sharing, and task
performance. Extensive prior research has examined individuals' general
propensity to trust, as well as the factors that contribute to their trust in
specific groups. Here, we build on past work to present a comprehensive
framework for predicting trust in groups. By surveying 6,383 Facebook Groups
users about their trust attitudes and examining aggregated behavioral and
demographic data for these individuals, we show that (1) an individual's
propensity to trust is associated with how they trust their groups, (2)
smaller, closed, older, more exclusive, or more homogeneous groups are trusted
more, and (3) a group's overall friendship-network structure and an
individual's position within that structure can also predict trust. Last, we
demonstrate how group trust predicts outcomes at both individual and group
level such as the formation of new friendship ties.Comment: CHI 201
From Social Data Mining to Forecasting Socio-Economic Crisis
Socio-economic data mining has a great potential in terms of gaining a better
understanding of problems that our economy and society are facing, such as
financial instability, shortages of resources, or conflicts. Without
large-scale data mining, progress in these areas seems hard or impossible.
Therefore, a suitable, distributed data mining infrastructure and research
centers should be built in Europe. It also appears appropriate to build a
network of Crisis Observatories. They can be imagined as laboratories devoted
to the gathering and processing of enormous volumes of data on both natural
systems such as the Earth and its ecosystem, as well as on human
techno-socio-economic systems, so as to gain early warnings of impending
events. Reality mining provides the chance to adapt more quickly and more
accurately to changing situations. Further opportunities arise by individually
customized services, which however should be provided in a privacy-respecting
way. This requires the development of novel ICT (such as a self- organizing
Web), but most likely new legal regulations and suitable institutions as well.
As long as such regulations are lacking on a world-wide scale, it is in the
public interest that scientists explore what can be done with the huge data
available. Big data do have the potential to change or even threaten democratic
societies. The same applies to sudden and large-scale failures of ICT systems.
Therefore, dealing with data must be done with a large degree of responsibility
and care. Self-interests of individuals, companies or institutions have limits,
where the public interest is affected, and public interest is not a sufficient
justification to violate human rights of individuals. Privacy is a high good,
as confidentiality is, and damaging it would have serious side effects for
society.Comment: 65 pages, 1 figure, Visioneer White Paper, see
http://www.visioneer.ethz.c
Building communities for the exchange of learning objects: theoretical foundations and requirements
In order to reduce overall costs of developing high-quality digital courses (including both the content, and the learning and teaching activities), the exchange of learning objects has been recognized as a promising solution. This article makes an inventory of the issues involved in the exchange of learning objects within a community. It explores some basic theories, models and specifications and provides a theoretical framework containing the functional and non-functional requirements to establish an exchange system in the educational field. Three levels of requirements are discussed. First, the non-functional requirements that deal with the technical conditions to make learning objects interoperable. Second, some basic use cases (activities) are identified that must be facilitated to enable the technical exchange of learning objects, e.g. searching and adapting the objects. Third, some basic use cases are identified that are required to establish the exchange of learning objects in a community, e.g. policy management, information and training. The implications of this framework are then discussed, including recommendations concerning the identification of reward systems, role changes and evaluation instruments
- âŠ