Can Twitter and Facebook replace the nightly news?

Over the past twenty years, the Internet has dramatically changed the way people communicate and gain access to information but the majority of impact has been on individual interactions – a single person emailing or reading online news websites. Recent activity over the past few years have shown the additional power of the web to expand beyond individual interaction and foster communal activity without any of the traditional borders that previously hindered social interaction. The Internet doesn’t have geographical, economic, or political boundaries so people are able to access each other and communicate on a growing number of social platforms such as Twitter and Facebook. There are numerous other social networking sites but Twitter and Facebook are at the forefront of a new trend that leverages social networking in order to provide real-time data about current social activity. The term “Web 2.0” has become popular for describing this new trend that can be broadly defined as “Web as Platform”. Essentially, the increase of online social mediums has transformed the Web into platform for dynamic communication “where dissemination of information is timely and vast” (Huang et al., 2010). There are countless ways to apply the type of information available via Web 2.0 but the application of user updates to social networking websites as a real-time data source for news is one of the most compelling.

Is social media a more current news source?

Perhaps one of the best examples of how information from social networking sites can be sourced in order to provide information is the website Ushahidi which uses crowd sourcing technology to map social networking activity. Ushahidi, which means “testimony” in Swahili, was founded in Kenya in response to the social unrest following the 2008 presidential election. The mission of Ushahidi is to use the crowd sourcing data in order to provide live updates on events that have an impact on social issues ranging from natural disasters to political uprisings. The website’s unique ability to map reports of violence using data from social networking sites (submitted via the web and mobile phones) made it one of the most reliable news sources for tracking violence in Kenya. The site has since expanded into a sophisticated source for real-time information on social issues occurring around the world. In fact, the real time data mapping provided by Ushahidi is being used by humanitarian organizations conducting relief efforts because of the website’s ability to “flag up danger around the world within seconds, enabling the organization to offer help to people around the globe” (Akhtar, 2011). Humanitarian organizations are able to use Ushahidi to gather real-time data on people in need thanks to a mapping analysis of social media users’ updates to their accounts. In this regard, the news source has become the very people experiencing an event as opposed to more traditional news reporters who are sent to a location to report on an event.

A Closer Look at Social Networking for Disaster Relief

A case study by Huang et. al describes the application of internet social networking among large web-users during a major natural disaster in Taiwan and how “Web 2.0” was used to “establish an integrated internet-based emergency response system… [which] empowered the public to share experience and information during emergency and disaster response activities” (Huang et al., 2010). When the Morakot typhoon hit Taiwan, the night of August 8 2009 causing massive damage to Southern Taiwan, web users immediately began reporting the real-time situation on the forum PTT, one of the most popular internet social networks in Taiwan, and by the morning a sophisticated online relief network was established. “On August 9th, an unofficial Morakot Online Disaster Report Center was established by a group of internet users from the Association of Digital Culture Taiwan They advised fellow Internet users living near areas battered by the storms to gather information, such as sustained damage or assistance needed on popular social networking websites, including Twitter… Twitter users also sent messages to help rescuers acquire accurate position for their family and friends who live in affected areas” (Huang et. al, 2010). In contrast to the disaster response through social networking sites, the official response operations were not coordinated efficiently. “During the most crucial first few hours after the catastrophe, the Central Response Center underestimated the early scope and gravity of the disaster due to the lack of information and communication from affected areas. Official government communication early in the crisis failed, causing people to turn to [the Web]” (Huang et al., 2010).

Ushahidi and the Morakot typhoon response are just two examples of how “Web 2.0” is becoming an increasingly trustworthy news source. Social networking platforms have the unique ability to provide real-time data from people experiencing a newsworthy event. Social networking sites can provide a vital two-way information channel that can help those in need get assistance and provide the rest of the world with real-time personal accounts of what is happening on the ground.

--Phil

Resources:

1) Akhtar, Tanzeel “The Charitable Face of Data Use” Accessed on December 9, 2011 via: http://www.marketingweek.co.uk/disciplines/data-strategy/the-charitable-face-of-data-use/3032554.article
2) Huang, Cheng-Min, Edward Chan and Adnan A Hyder “Web 2.0 and Internet Social Networking: A new tool for Disaster Management? – Lessons from Taiwan” BMC Medial Informatics and Decision Making 2010, 10:57.

Twitter and education, really? Really!


Twitter and education, really? Really!
Twitter and education, really? Really!<br />

Twitter and Education


Personally, I’m not sure how useful knowing that Ashton Kutcher ate a grapefruit for breakfast is to society, and keeping up with our favorite celebrities seems to be about the only thing that Twitter is good for. However, unbelievably, that is not entirely correct. Twitter can also be used in many applications to benefit educators and students. Don’t believe me? Well, I didn’t believe it at first either, but read on to be convinced!



I have so many followers!



Twitter is a micro blogging site that allows people to post messages, and these posts are delivered to the "followers" of the poster by text message. As an
student or facilitator, this service can come in very handy when one needs to get a message to the entire class without waiting for people to log on to the class site.
Due to the format of online classes, most students are only able to log on once per day to check updates and emails on their class site. "Such a service could be useful for teachers or students who want to send a text message to the whole class"(Moody, 2010).Imagine a scenario where your professor has changed the due date of a large assignment to the next night, instead of tonight. If this facilitator has utilized Twitter, he or she could easily "tweet"an update and the whole class would know instantly (and an extra day to complete an assignment is something most students want to know instantly!)



I participated in the class discussion and didn't have to say anything!


Twitter is not only a way to update one's students or fellow classmates to changes in the course; it can also be a way to keep everyone involved. Imagine
participating in class discussions at any time. Imagine having a brilliant idea at 9pm on a Tuesday and being able to "tweet" to your fellow classmates and professor
despite the late hour. This prevents trying to remember the brilliant thought, and allows for feedback from everyone even outside the classroom. "Parry uses Twitter
to enhance his classes and as a means of keeping students engaged in course content beyond the classroom walls. He has them create Twitter profiles and "follow," or
track, his updates along with those of friends and others outside the university. Many of his students go one step further and use the site to alert their classmates
to world events or issues that are relevant to the course" (Miners, 2010). Twitter also allows students to keep up with current events in real time, since many events
happening in the world today are "tweeted" about before they are reported by the professional news sources.



It’s hard to hear with all this "tweeting" going on


Twitter is not just for stalking your favorite celebrities anymore! By utilizing Twitter in the classroom, teachers and students can both benefit, 140 characters at a time. By keeping class discussions open 24 hours a day, 7 days a week, facilitators and students can benefit from larger, and deeper discussions. Twitter also allows for instant communication between students and professors when time is of the essence.



Samantha J




References

Miners, Z. (2009). Twitter Takes a Trip to College. U.S. News & World Report,
146(8), 56-57.


Moody, M. (2010). Teaching Twitter and Beyond: Tips for Incorporating Social Media in Traditional Courses. Journal Of Magazine & New Media Research, 11(2), 1-9.


Twitter. (2011). Retrieved from http://twitter.com/.

Electronic Medical Record

“As many Dutch health care providers already exchange patient data by means of local or regional electronic information systems, their reluctance to adopt the n-EPR (electronic patient record) is quite remarkable” (Zwaanswijk, Verheij, Wiesman, & Friele, 2011). The electronic health record supposedly helps improve the health care provider’s access to important health information in regards to the patient’s data and should help improve efficiency, continuity, safety, and quality of care (Zwaanswijk, 2011). According to Zwaanswijk, et al., (2011) the electronic health record might be viewed as a benefit for most, however, a third of the providers are showing some reluctance to this new concept.

Incentives
The United States congress has been encouraging the use of electronic health records by offering monetary incentives to those who are willing to participate and follow the designed criteria (Alder-Milstein, Bates, & Jha, 2011). The problem with this is how to incorporate the flow of information amongst other groups, such as between clinics, laboratories, or other health providers (Gunningberg, 2011). According to Gunningberg, et al., (2011) the use of regional health information organizations (RHIO), could help eliminate this problem through one single connection. The big questions are how many RHIO are there, how do they support the data exchange, how many providers are participating, and how many RHIO are economically visible (Gunningberg, et al., 2011)? Even though this sounds like an excellent idea there is limited data on how the RHIO are doing and whether they are helping the health care providers meet the needed criteria (Gunningberg, 2011).

Benefits of Electronic Medical Records
According to Vogel, (2011) some of the benefits of this type electronic information is the patient’s ability to schedule their appointments online, be able to refill prescriptions and view parts of their chart via web anytime of the day. The electronic medical records allows quicker access to test results, the ability to share information with other medical providers with fewer chances of hand writing based errors or duplicating tests. The patient can review what was talked about during a visit and receive a legible print out that is easy to read on regarding the conversation (Vogel, 2011).

Perceived Problems
A few perceived problems in regards to electronic health data exchange has to do with confidentiality and security (Zwaanswijk, 2011). The system would need to have security system that could protect the patient’s medical data, and few ways in which this could be obtained is by allowing only certain members of the health care team to be allowed to access patient information and monitoring the log in’s into these areas (Zwaanswijk, 2011). The electronic health record has the possibility to be a very valuable tool in auditing information on quality of care provided (Gunningberg, Fogelberg-Dahm & Ehrenberg, 2008). Of course, the only problem with this electronic information highway is keeping the patient information private (Vogel, 2011).
Donna S

Reference
Alder-Milstein, J, Bates, D, & Jha, A, (2011), A survey of health information exchange organizations in the United States: implications for meaningful use, American College of Physicians, 154, pp. 666-671, www.annals.org.
Gunningberg, L, Fogelberg, M, & Ehrenberg, A, (2008), Improved quality and comprehensiveness in nursing documentation of pressure ulcers after implementing an electronic health record in hospital care, Journal of Clinical Nursing, 18, pp. 1557-1564, DOI:10.1111/j.1365-2702.2008.02647.x.
Vogel, J, (2011), Electronic records mandate strains rural hospitals, MPRNEWS, www.minnesota.publicradio.org/display/web/2011/06/20/ground-level-rural-health-care-electronic-medical-records/
Zwaanswijk, M, Verheij, R, Wiesman, F, and Friele, R, (2011), Benefits and problems of electronic information exchange as perceived by health care professionals: an interview study, BMC Health Services Research, 11, 256, pp. 1-10, www.biomedcentral.com

Is Open Communication Possible Online?

Diplomacy in Presentation

The manner in which we express ourselves online goes beyond caring what others think about our opinions. When we present our opinions online we can truly express our real thoughts, but some people will still try to present only non confrontational points of view. This is not constructive in truly discussing a subject. It is quite possible to present your real views while being diplomatic about those views and respecting and allowing for others to do the same. A strong opinion that does not take into consideration respect for others might obstruct classmate’s desire to participate in a forum because of the fear of being attacked by the other participants. Liu & Fahmy (2010) explain, “The spiral of silence theory proposes that the likelihood an individual will express their opinions in public are based on the positive monitoring of the opinion climate and the comparison of their own opinions with the perceived current and future public opinions. If individuals perceive that their opinions are on the majority or on the rise, they might be willing to speak out. However, if they judge that their opinions are on the minority side or are on the decline, they might decide to keep silent or conform to the majority” (Page 46).

My personal experience in an online environment is that it is perfectly fine disagreeing on a topic, and one should stand up for ones point of view, but there is no need to hurt others to get your point across. Opinions and views are fine to present, however any opinion should be backed up with some informative facts or data, instead of ending a conversation by saying “because I say so.” Everyone has an opinion, but it is not constructive to present opinions without showing why those opinions exist by using data and supportive information. My husband once told me: “If we all agree that we disagree, there will be fewer conflicts in this world.”

Integrity in an Online Environment

When interacting in an online environment, we do not see faces or hearts, just words; therefore, the way we express ourselves on the internet can define who we are in the eyes of someone else. But are we who we say we are to others? Or do we project a huge shield to protect ourselves from others? Or do we not take online communication seriously at all? Maybe I should rephrase my question: Are we honest with ourselves? The answer to those questions is for each one of us to answer. Suler (2004) explains, “It’s well known that people say and do things in cyberspace that they wouldn't ordinarily say or do in the face-to-face world. They loosen up, feel more uninhibited, and express themselves more openly. Researchers call this the "disinhibition effect." It's a double-edged sword. Sometimes people share very personal things about themselves. They reveal secret emotions, fears, wishes. Or they show unusual acts of kindness and generosity. We may call this benign disinhibition. On the other hand, the disinhibition effect may not be so benign [because] out spills rude language, harsh criticisms, anger, hatred,[and] even threats; we might call this toxic disinhibition” (Para.1). There is something interesting that happens to personalities when taking online classes. We see many times people extremely introverted in a face to face environment, but in an online environment they are willing to speak out and share personal experiences.
According to Suler (2004), “While online people may feel they have more opportunities to present themselves as they would like to present themselves, particularly in the carefully composed text of asynchronous communication. They may have more chances to convey thoughts and emotions that go "deeper" than the seemingly superficial persona of everyday living. These opportunities are very valuable aspects of cyberspace, but not necessarily evidence of a more true self. What we reveal about ourselves spontaneously, often right on the surface for others to see but without our being consciously awareness of it, may be just as real and true” (para.26). The truth is that we do not know who we are talking to on the other side of our screen. It is a normal reaction to the unknown to keep things at a distance, but sometimes it is necessary to step in to break the ice between online classmates. In most online environments I think it is smart to keep things at a more professional level, but when it comes to classmates, it is more enjoyable sharing experiences that we might learn from one another.

Self -Disclosure versus Privacy

Expressing one’s opinion or feelings is one thing, and disclosing personal information that can jeopardize our identity is a different topic. According to Joinson & Paine (2005), “In a legal context, privacy is largely synonymous with a ‘right to be let alone’. However, others have argued that privacy is only the right to prevent the disclosure of personal information” (Pg. 14)

Let us not confuse being honest with ourselves and the way with express our feelings or thoughts in our online classroom; versus being totally trusted to any unsecure chat room or blog and provide our address or social number to others.
According to Joinson & Paine (2005), “Self-disclosure is the telling of the previously unknown so that it becomes shared knowledge, the “process of making the self known to others” (Pg. 2). It is a normal attitude not to be willing to disclose ones feelings or thoughts at first in an online environment, because all our classmates will know who said what since posts are not anonymous. Another reason people might not express themselves is they might feel more vulnerable to others and fear to express their honest opinions.

Joinson & Paine (2005) explain that “self-disclosure can be categorized into either peripheral, intermediate, and core layers. The peripheral layer is concerned with biographic data (e.g. age), the intermediate layer with attitudes, values, and opinions and the core layer with personal beliefs, needs, fears, and values” (Pg.3). In my experience with online classes the peripheral and intermediate layers are the ones best expressed among classmates and myself. Only a few classes I have seen require one to develop the core layers and defend ones personal beliefs and values.

The best part of being oneself in an online environment is to build good relationships and new friends as well as to explore new parts of ourselves which help us to grow intellectually and internally.

Carol H.

References

Joinson, A. and Paine, C.(2005). Self-disclosure, Privacy and the Internet. Retrieve from

http://www.york.ac.uk/res/e-society/projects/15/PRISD_report2.pdf

Liu, X. & Fahmy,S.(2010). Exploring the spiral of silence in the virtual world: lndividuals'Willingness to express personal opinions in online versus offline settings. Journal of Media and Communication Studies Vol. 3(2), pp. 45-57. Retrieve from
http://www.academicjournals.org/jmcs/PDF/pdf2011/Feb/Liu%20and%20Fahmy.pdf

Suler, J. (2004). The Online Disinhibition Effect. Retrieved from
http://users.rider.edu/~suler/psycyber/disinhibit.html#trueself

Cyber Voting

Cyber Voting
"Hanging chads" of the 2000 presidential race, many election officials looked to technology to come to their rescue” (Walton, 2003). The electronic voting technology has features such as touch screens and added features the older punch card voting systems doesn’t. Most argue that it is efficient, secure and cost effective. However, a congressional research service concluded that the system may be vulnerable to attacks and other faults that could prevent its functionality.

Security/functionality:

“The popularity of DREs, particularly the touchscreen variety, has been growing,
and many expect that growth to continue” (Fischer, 2004). Many voters perhaps may like the opportunity to avoid long lines to perform a quick secure vote, The congressional research service has concluded that electronic voting systems accurately records a voter’s choice and reduces the likely hood of submitting the wrong choice. The machines are multicultural where each can display ballots in different languages depending on voters’ needs. (Fischer, 2004). but what good is the transaction if it is hard to understand and subjected to attack via the internet?

Problems:

The machines are said to be standalone machines so the hacking and data compromise is not possible. However, telephone connections are increasingly internet based. This provides the possibility of interception with voting data. The machines use modems to communicate over telephone lines. These transmissions in the past that traveled only over copper lines are now being routed over the internet. So, the chances of compromise are equal to any networkable communication devices. Another issue is the changes of votes without detection. According to Everett, “Entire races can be added or Removed from ballots and voter’s candidate selections can be flipped and the majority of users do not notice” (Everett, 2007). So are we ready for the electronic voting? The concept is growing and the concerns of how to vote in cyberspace has members in our government and private sector searching for solutions. One thing is certain is that E-voting is going to expand when the security flaws has been removed.

Rowe K
References:
Walton, M. (2003) Electronic Voting no magic bullet. Retrieved from http://articles.cnn.com/2003-12-11/politics/elec04.nist.evoting_1_electronic-voting-rebecca-mercuri-new-voting-technology?_s=PM:ALLPOLITICS
http://www.election-america.com/?gclid=COHdo_6x-awCFacZQgod7D7SRw
Fischer, E. (2004) Electronic Voting Systems (DREs): Legislation in the 108th Congress retrieved from:
http://votingmachines.procon.org/sourcefiles/Electronic%20Voting%20Systems%20Legislation%20in%20the%20108th%20Congress.pdf

Ways To Recycle Your computer and it's unseen importance

According to greenhome.com, approximately 10 billion computers are dumped in landfills each year, and according to National Safety Society only 11 percent of computers are actually recycled. There is a big concern when landfills accumulate such huge amounts of old computers. The concerns are the toxic harm that these computers contain. Heavy metals such as cadmium, chromium, mercury are just only a few that are hazardous to health and the environment. The computer monitor screens contain cathode tubes, which contain lead that can after destroyed can melt or drain away in the environment causing hazardous health problems.
Ways to recycle your old computer correctly would be to contact your computers manufacturer to see if they take back old or obsolete computers.


Hewlett-Packard takes back its old printers as does Apple. Contacting a proper computer recycling center is also helpful as they melt down the precious metals and properly dispose of the computer parts in a safe and manageable manner. Another good idea would be to donate your old computers to schools or non-profit organizations for use.
Proper methods can be taken to properly dispose of computers so that the environment and health can be preserved. Responsibility goes a long way, and being responsible can save time, money, and lives in some cases.

Todd W.

References:
Home, G. (n.d.). What to do with tech trash?. Retrieved from http://www.greenhome.com/info/articles/your_community/56/

Turner, L. (2010, May 20). [Web log message]. Retrieved from http://www.livestrong.com/article/127692-computer-recycling-important/

Importance of Computer Recycling

Article by Liz T.

When the time comes to finally buy that shiny new computer you've been eying, you may find yourself wondering what to do with the old one. Many electronics retailers and computer manufacturers advertise trade-in programs, and many states have even prohibited computers from being dumped in landfills.
Types
Computers can be recycled in a couple of ways, depending on the state of the machine. Giving old, working computers to friends and family members or donating them to nonprofit organizations not only keeps the computer entirely out of the waste stream, but it presents computer access to someone who might not otherwise be able to afford it. Non-working computers can be sent to recycling centers where they are dismantled and valuable components are recovered.
Considerations
Donating a working computer can be a tax write-off, so if you've got a functional computer on your hands, there is an added monetary benefit to donation. However, if the computer really is at its end of life, it might be more trouble than it's worth to a charity organization, which would then just have to seek a means of disposal. The Environmental Protection Agency suggests computers five years old or less and in working condition be donated; others should be recycled.
Misconceptions
When your computer goes off for recycling, it doesn't necessarily mean the world becomes a cleaner place. Some less responsible collection programs actually end up with computers being shipped off to developing nations where they become an even bigger health hazard. In some small provinces of China, locals pick through mountains of e-waste to recover valuable materials without proper protection, reports the Basel Action Network, a global watchdog organization that recently launched its own global e-waste recycler certification to recognize responsible recyclers.
Warnings
Whatever method of recycling you've chosen for your computer, you'll want to make sure your personal information has been wiped clean from its hard drive. Whether donated to another user or sent to a recycler for scrap, the data on your hard drive can be retrieved, and personal information such as financial records or social security numbers can be dangerous in the wrong hands.
Potential
Nearly 70 million computers were sitting in storage in 2007, according to the EPA. If even half were usable, nearly 35 million people or organizations could reap the benefit of a working computer. If the rest were recycled rather than being sent to landfill, the reduction in greenhouse gas emissions would be staggering--the EPA calculates that recycling just 1 million computers prevents the release of greenhouse gases equivalent to the emissions of 16,000 cars.Read more: http://www.livestrong.com/article/127692-computer-recycling-important/#ixzz1fFerc95k
todd w

Using microblogging for more than celebrity gossip

    Ahh Twitter. Celebrities posting what they had for lunch. Preteen girls going crazy over the new big singer's latest track. Random trending topics about the worst 3 words to hear after a breakup or some sports team winning something. Surely microblogging (or at least the most popular service for it) is just a bunch of useless noise? According to Mark Freeman, not entirely:
One of the great benefits of these technologies is that they are able to share the information publicly. For this reason it has been considered an ideal technology for the dissemination of information about natural disasters.
    While it does not rank in the top 10 Nielsen websites for August 2011, Twitter has grown substantially since it's 1.2 million visitors a month in April of 2008 (Johnson, 2009). One of the more practical uses of Twitter (and Facebook and similar sites) is quick dissemination of information during a natural disaster. Freeman analyzed the use of twitter during 3 Australian disasters: the Victorian wildfires of early 2009, flooding in Queensland in late 2010-early 2011, and tropical cyclone Yasi in early 2011. In the wildfires Twitter was used primarily by news outlets to spread information about the fires well beyond Australia. However, by late 2010 the Queensland Police Service and the local power company were prepared to spread warnings and pertinent information to locals about the floods and cyclone. In all three disasters, citizens themselves were, of course, a major source of information.
    Unlike traditional news channels, Twitter does not fact-check or filter information. The unreliability of crowd-sourced news is indeed one of the biggest problems in a disaster situation. One could certainly imagine bad information about safe evacuation routes causing people to get stranded or worse. Freeman notes that National ICT Australia is working on methods to coordinate government usage of electronic communications. Having up-to-the-minute official information in a disaster is likely to be more useful, or at least make people feel better.
    So the next time you see someone checking their twitter obsessively, don't immediately pass them off as a Beiber fan. They just might see the tornado warning that saves your life.

-Evan W.

Freeman, M. (2011). Fire, wind and water: social networks in natural disasters. Journal of Cases on Information Technology, 13(2), 69+. Retrieved from http://go.galegroup.com.dml.regis.edu/ps/i.do?id=GALE%7CA273280029&v=2.1&u=regis&it=r&p=CDB&sw=w


Johnson, S. (2009). How Twitter Will Change The Way We Live (in 140 characters or less). (Cover story). Time, 173(23), 32-37.

Ensuring Internet communication success.


Ensuring Internet communication success.
            With today’s global economy we as world citizens may find our jobs located away from home or at home using the internet. In either case you will perhaps have to communicate with people from across the globe. This could be challenging, especially if you don’t understand how other cultures communicate. It is hard to decipher sometimes what is being said while using messengers and other avenues to socialize. Some use it as a tool others use it to reinforce their values. Imagine what a person in japan; a country high on collectivism is thinking when you are trying to convey a message. Was the appropriate language used when communicating with this Japanese citizen? When it comes to the internet, the perception of the written word and face to face communication may be complicated so consider supplements when using electronic means to communicate.

 “The difference between self-disclosure behaviors in face-to-face and computer-mediated relationships is more pronounced among individuals high in collectivism than those high in individualism” (Tokunaga, 2009). Intercultural relationships could have misunderstandings due to different rules and norms. Even if you are proficient in the local language, local customs, and have proper net etiquette, internet based communication could cause more problems if not used correctly. According to a study conducted by (Gill, 1998)  he found that two different countries use email for the same reasons but, engage in this form of communication completely differently The study reported on differences between Japanese and British usage of e-mail to appropriately convey emotions. In the study the Japanese were concerned with contextual elements of communications which negated the e-mail texts because they did not know the person who sent the email as a whole. Social self does appear to be part of e-mail communication in the Japanese case, as does the maintenance of social practices.” (Gill, 1998).  Email in japan is used in conjunction with meeting in person offline as a follow-up.  Understandable, since they try to avoid misunderstandings in email by using emotion faces to reflect comfort levels when communicating. The British on the on the other hand takes an individualistic approach when using email. They use it as a fictional tool rather than incorporate values as the Japanese do. This kind of mistake is simple to make and perhaps easy to correct. If you are in japan, when sending email be open to meeting in person if the recipient is confused or reflects an uncomfortable smiley face. Understand what is expected when communicating with other cultures.
-Rowe K. 
 
References


Gill, S. (1998). The cultural interface: The role of self. In C. Ess & F. Sudweeks (Eds.), Proceedings, Cultural Attitudes towards Technology and Communication, (pp. 246-251). Australia: University of Sydney. Retrieved March 15, 2005, from http://www.it.murdoch.edu.au/catac/catac98/pdf/20_gill.pdf.

Tokunaga, R. (2009). Journal of Intercultural Communication Research
Vol. 38, No. 3, November 2009, pp. 133–147

The Transformation of Socialization with the onset of Mobile Phones

The mobile phone has, and continues, to transform the social environment of those who interact with the devices.  Long gone are the days when someone was unreachable because they were not at home, at the store, or driving.  The mobile phone has become an extension of the human body for many individuals whom feel the device “not just on the material level but also on the level of one’s sense of physical self” (Katz, 2006), with this change also comes the loss of the sense of distance when communicating with others through the mobile phone, but this change also brings with it the loss of personalization and physical communication such as gestures, expressions, and the “ability to react adaptively to unpredictable encounters” (Katz, 2006).  Just recently, mobile phones have gained the capability of accessing the Internet as well.
            Now that the mobile phone has gained Internet access, it has made the daily lives of those wielding its power easier, but less personal, by allowing them to communicate through this media regardless of location.  This is quickly noticed when visiting the food court of a nearby shopping center where many individuals will be using the Internet for social media, perhaps even to the extent of instant messaging someone who is physically located with them.  By communicating through the Internet, the two people are able to communicate with each other on their terms, responding when they choose too, allowing the other participant to gather their thoughts appropriately and respond only when he or she is prepared to.  With the non-verbal and non-personal communication habits forming, and social cultures developing, social anxieties and personal inabilities may well be increasing on the horizon.
-Jason K.
References
Katz, J. (2006).  Mobile communication and the transformation of daily life:
The next phase of research on mobiles.  Retrieved November 25, 2011, from the SpringerLink Web site:  http://www.springerlink.com.dml.regis.edu/content/6th40u71y26h497d/fulltext.pdf

Is blended learning the future classroom?

Blending learning is an education practice that is quickly gaining momentum thanks to its potential to increase personalized student learning and to decrease per-student cost expenditures. Realizing this potential is the best case scenario but most blended learning models have not be in practice long enough for substantive research to exist on the impact of blended learning on student achievement. Despite the shortage of research, schools across the country continue to implement blended learning. So what exactly is blended learning? Students in a blended learning environment experience a blend of traditional teacher-led classroom instruction and students-led online instruction. This learning experience exists on a broad spectrum ranging from mostly online student-led instruction to mostly teacher-led instruction that is supplemented with online materials within a single class. This variety has created an incredible about of diversity in the field that is both exciting because of the ability to explore options but also worrisome because there aren’t any enforced quality standards. Blended learning has evolved over the past decade with the increased content creation and availability of online learning programs.

Understanding the demand for blended learning


Blended Learning: The Convergence of Online and Face-to-Face Education by John Watson provides an excellent overview of why schools are taking to implement blended learning in K-12 education. According to Watson, high student demand for online learning options is driving rapid growth of online courses available to schools. He states, “Thirty states and more than half of the school districts in the United States offer online courses and services, and online learning is growing rapidly, at 30% annually. This growth is meeting demand among students, as more than 40% of high school and middle school students have expressed interest in taking an online course.” In addition to pure student demand, many schools are also motivated to explore blended learning options because of the potential cost savings. Given the flattening of, and even reductions to, education funding (Roza, Lozier and Sepe, 2010) schools do need to identify means to reduce costs and blended learning offers the possibility of reduced costs while still offering personalized instruction for students. A handful of states (AL, FL, MI and UT) have even go so far as to require online learning as a state high school graduation requirement because they attest that online learning establishes a practice for life-long learning. Although this may sound surprising to some people, initiatives like Digital Learning Now, founded and led by former Governors George Bush and Bob Wise, encourage more states to make online learning a priority so there may be more than four states with online learning graduation requirements in the not-to-distant future.

Understanding the potential

Wherever a single blended learning practice falls on the pedagogical spectrum, Watson asserts that the goal of blended learning is to “combine the best elements of online and face-to-face learning.” Watson goes on to say that the blended learning approach will “emerge as the predominant model of the future — and to become far more common than either [online or traditional face-to-face instruction] alone.” If Watson is correct and blended learning is the future of education then it is important to better understand the potential benefits that I mentioned briefly at the beginning of this blog. First, blended learning models offer possible per-pupil cost savings. Rocketship Education, located in Palo Alto, is perhaps one of the best know examples of how a blended learning model has resulted in cost savings that Rocketship is then able to reinvest into their schools (i.e.: facilities, professional development) and to scale the model. A basic overview of their cost savings demonstrates $515K in annual savings on salaries and classroom costs versus a typical K-5 school model. Rocketship is just one example but it does demonstrate a significant amount of savings within a single year.

The second potential outcome for blending learning is the possibility of further personalizing a student’s learning experience. Technology has the capacity to increase a teachers’ effectiveness by providing students with online modules that will challenge students at the appropriate level – whether that means revisiting concepts that the teacher has already covered but the student didn’t fully grasp or offering more challenging opportunities to a more advanced student. The results of students’ online work can then be shared with the classroom teacher and that will inform the teachers’ instruction because the teacher will know more about the student – such as what gaps persist in their understanding of a concept.

It is important to note here that technology for cost savings or to promote personalization is a means to an end; technology is not a panacea for improving student achievement. Technology, in this case applied through blended learning, has unbelievable potential but it is important to apply technology through a student-centered approach. Technology can support a student but it is not the be-all-end-all.

Resources:

1) Michigan Department of Education, Michigan Merit Curriculum: Graduation Requirements FAQ (2007) www.michigan.gov/documents/mde/faq19_178611_7.pdf

2) Roza, Marguerite, Chris Lozier and Christina Sepe K–12 Job Trends Amidst Stimulus Funds: Early Findings. Accessed on November 24, 2011 from http://www.crpe.org/cs/crpe/view/csr_pubs/332

3) Staker, Heather et al. The Rise of K-12 Blended Learning: Profiles of emerging models (2011) Accessed on November 30, 2001 from http://www.innosightinstitute.org/innosight/wp-content/uploads/2011/05/The-Rise-of-K-12-Blended-Learning.pdf

4) Watson, John Blended Learning: The Convergence of Online and Face-to-Face Education (2008).

--Phil

Social Media – Where Old School Marketing Meets Technology

Follow us on Facebook or Twitter

The way people do business today goes beyond just having a local store, or a company having a website. Most people are familiar with Facebook or twitter as a wonderful way to stay in touch with family and friends; but big corporations are also aware of the benefits that social media can bring to their stores. This is why we see several corporations asking their customers to follow them on Facebook or twitter. Some examples are: Barnes and Noble, Athleta, Victoria’s Secret, The Weather Channel, and CNN. Those are just a few of the many corporations that use social media to advertise. Maybe not everyone will follow those specific brands that I just mention, but think about your favorite team sport, or maybe the martial art school where you trained; when people feel passion over their sports team, I bet more than one will click “I like.” Just one click and the incoming traffic begin to flow. Social media connects people, but also is a great method to advertise one’s business. The amount of traffic social media can bring to a business is a must have for anyone who is thinking to advertise online. It is fast, easy, convenient and best of all Free.
The two main ideas to consider when advertising a business are the tools and the study of the markets. Marcus & Taylor (2011) explain, “The tools of marketing are public relations, publications, social media, brochures, Websites, and networking” (p.15). The study of market refers to demographics information, motivation for buying and social class among many others.  It is important for a business as well as for a marketing company to set mutual expectations; clear and specific to avoid misunderstanding.   

RSS and Facebook     
 
Thanks to social networks, companies, artists, and business owners can see how many followers they have and the market that composes their business sector. Also, they can see the interest that people have and communicate in a way that is transparent. Campbell (2010) explains, “Blogs or websites should contain SEO, or search engine optimized, keywords and phrases that help visitors find the business when they search via Google, Yahoo, Bing, and others” (p. 76).  When creating a website or a blog, RSS feeds are useful links to the blog. Campbell (2010) mentions that “RSS feeds allow you to import content from outside sources and are a great way to share information that visitors find interesting” (p.76). People who use search engines are searching for information, education, products, and entertainment. So depending on the blog that the person is trying to create, RSS is a great tool which allows one to syndicate any type of information that a blogger wants to use in their blog. For example, in Facebook one follow a newspaper and it update the latest news. If one has a blog with RSS, then in the blog the latest news will be updated.

 
Why would a company ever want to use social networks to advertise their business?       
 One reason is word of mouth advertisement. Referral business usually is the best, it is free!  How many times does one see on a Facebook wall that a close friend likes a specific brand or restaurant? This causes those close to that person to go and check that out. Family members often mention something that they like to us, and then they invite us to like it as well. This simple sharing through facebook brings business owners potential customers and attention. It seems that word of mouth never fails. Another reason is fast, cheap, and has a considerable amount of traffic.

Carol H.

References
Campbell, D. (2010). WHAT'S YOUR SOCIAL MEDIA STRATEGY?.  Black Enterprise, 41(4), 74-76.
Marcus, B. W., & Taylor, S. T. (2011). Building a Firm for Now and the Future. Of Counsel, 30(8), 12-17.

 
 

Politics and Facebook

Politics and Facebook


Facebook has changed the face of politics. The 2008 presidential election is proof of that. In 2008, both the Democratic candidate, Barak Obama, and the Republican candidate, John McCain, utilized Facebook as a means to reach the younger and more internet savvy population. Not only did both parties have pages, they were both wildly popular. “… in the 2008 presidential election, all Democratic and Republican candidates established Facebook and MySpace profiles, and hundreds of thousands of social network sites (SNSs) users added them as ‘‘friends’’ (Fernandes, Giurcanu, Bowers, & Neely, 2010, p. 654). This new development has caused many political campaigners to change their plans and include a social media profile in their campaigning process.

Facebook Politics in the Future


This development had a major impact on the Presidential elections in 2008. “In fact, the use of Facebook for political purposes was so significant that it caused major news organizations like CNN to pose the question, ‘Will the 2008 presidential election be won on Facebook?’” (Woolley, Limperos, & Oliver, 2010, p.632). The use of Facebook can allow for mobilization of supporters, advertising products, and promoting debates. This new brand of campaigning also allows supporters to connect with one another, and even organize events on their own. “…as political candidates design their campaigns, the implementation of SNSs as a campaign strategy should take center stage to reach and communicate with these young voters” (Fernandes et al., 2010, p. 672). With its ease of use and amazingly far reach, Facebook campaigning is definitely something we will see in the future.

Samantha J.



References

Fernandes, J., Giurcanu, M., Bowers, K. W., & Neely, J. C. (2010). The Writing on the Wall: A Content Analysis of College Students' Facebook Groups for the 2008 Presidential Election. Mass Communication &
Society, 13(5), 653-675. doi:10.1080/15205436.2010.516865

Woolley, J. K., Limperos, A. M., & Oliver, M. (2010). The 2008 Presidential Election, 2.0: A Content Analysis of User-Generated Political Facebook Groups. Mass Communication & Society, 13(5), 631-652. doi:10.1080/15205436.2010.516864

Ethical Issues Involved With Blogging

Ethical issues
Blogging is a communication phenomenon that has really taken off for many companies as way of advertising new products for their business. Many people like to read the reviews about the products and use this information as a tool to whether or not to buy the product. Some big businesses allow their employees to set up blogs either using the corporate website while others might set up outside the companies firewall because of fear of disciplinary or legal actions of a particular topic.

Principles

“What are the principal legal and ethical issues related to anti-employer blogging” (Markel, 2009)? Some companies have incorporated a special confidentiality contract that they have employees sign to protect their interest and are included as a written policy in the employee handbook. Here are a few examples of the most common ideas from the handbook that are used in regards to blogging; act in professional manner, be aware of the law, cite your sources, and talk over any new ideas with your boss.

Making Changes

My husband enjoys writing editorials for our local paper, but sometimes he notices some of information has been left out. According to Tallant, (2009) the big question for most bloggers is who owns the information and should someone other than the blogger be able to edit the information? A newspaper in Spokane, Washington has been working on trying to critic the code ethics for their company (Tallant, 2009). The plan was to have everyone’s input regarding the code, which included holding lunch meetings to help gather the information for task force that has been assigned (Tallant, 2009). The staff worked very hard on gathering information to help create a code with appropriate language to cover other issues that may arise (Tallant, 2009). One way to help prevent these kinds of problems are for companies to encourage and allow input from their employees in regards to these blogging policies (Markel, 2009). Blogging is a way for individuals to give opinion about a subject matter. We all have the responsibility to post accurate factual information when blogging. The information we set out to blog about if not accurate could affect others livelihood.
Donna S
Reference
Markel, M, (2009), Anti-employer blogging; overview of legal and ethical issues, Journal of Technical Writing and Communication, 39, 2, pp. 123-139.
Tallant, B, (2006), Newspaper works to include blogging in the code ethics, Quill, pp. 27.

Communication In CyberSpace

Rheingold (200) stated that "cyberspace is not identical with computer media, but rather is the context in which such communication occurs; nor is it the same as the computer network. But instead is the sense of place created through such networks."

My definition of cyberspace started from chatting place in late 90s and now is a place I can get any information including movie, music, and picture along with massive data.

While was reading Rheingold’s article, I found the term telepresence. According to wiki, telepresence allows the person who is using the system to act from a distance, which interestingly is used to operate even activities in outer space. Terms like telepresence were big in the early 90s, along with virtual reality, but have not received the same popular attention over the past decade or so.

I started to notice there are many words actually start with cyber. One of the words interest me is CyberPlace. CyberPlace refers to CyberNetworks that include anything ranging from a virtual office, school to electronic versions of actual locations. I subconsciously take part in each one of those listed above-- work conference website, blackboard for school, and Google map. However, actually thinking about it reminds of what might possibly happen if this technology keeps expanding. I am wondering if the computers and CyberNetwork will replace human interaction. In my opinion, these substitutes will actually take over just like in the movies.

--Kwon

Reference

Rheingold, Howard (2000). The virtual community - Chapter Two: Daily Life in Cyberspace. MIT Press. Retrieved from http://www.rheingold.com/vc/book/2.html

Cultivating a Sense of Community in Virtual Environments

Cultivating a Sense of Community in Virtual Learning Environments

We know that the traditional classroom gives students the ability to practice working out the mathematics, and various math packages can display plots, some even in 3-D. But only Virtual Reality (VR) can let the student walk around on that math surface, climbing the peaks and valleys to see how the variables inter-relate. (p.106) So, we will explore whether these virtual environments can create the same level of community typically cultivated in a classroom as well as challenges that should be considered when educating in virtual environments.

The advance of technology has created an expectation that acquiring information must be fast paced, highly accessible and easy to find. Formal learning is no exception. As learning professional on a quest to find solutions to blasé webinars and online tutorials I have considered VR the ticket to overcoming boredom and increasing knowledge transfer. Studies support my thoughts that this highly interactive, multi-sensory option increases engagement and test scores as well. However, I have learned that while cultivating a sense of community in virtual environments can foster learner engagement (p. 104) it doesn’t come without challenges. Virtual Learning includes gathering online at a specific site simulating life like locations and environments. Each participant has the ability to creating an avatar (graphic representations of the user) that will then interact in the online environment much like they would in a real life setting.

Before dropping everything to sink my resources into developing an avatar based VR class environment I considered the challenges Stewart et al outlined in this article that are likely to arise. The greatest, time followed by software and programming issues, implementation glitches, conveying objectives and ongoing student support were all challenges that seemed a bit daunting. I was assured that adopting the guidelines below when embarking on VR development will result in a course that is well thought out, well developed and most of all well received by students.

1. Consider starting your project with needs based analysis that encompasses the software, technical capabilities and challenges of using VR as well as who your audience is the learning environment and the outcomes of learning expected.
2. Adopt a project management process to increase communication between all parties participating in the development of the course.
3. Ensure the adequate number of staff is secured for the project duration. Look for individuals who are up for a challenge that can make the time to work on a special project like this for it’s lifespan.
4. Create student resources to help you effectively test the VR modules such as training materials and available technical support.
5. Assessment and measurement of the project throughout the design and development phase helps eliminate problems that might creep up along the way. Think about creating a short electronic survey as participants log out to capture feedback.

With the flashy appeal and game like technology and interactivity it is hard to resist from taking the plunge into VR design without much thought. Instead, investment the time to create a design plan that includes collecting, creating and sustaining virtual communities of learners who in the end experience both social and personal gains for participating in your VR classrooms. In the end, everyone wins!

Reference: Stewart, B., Hutchins, H. M., Ezell, S., De Martino, D., & Bobba, A. (2010). Mitigating challenges of using virtual reality in online courses: a case study. Innovations in Education & Teaching International, 47(1), 103-113.

Angela A.

Online Learner

Many adults want to go back to school, but they don’t know which choice is good for them, the online or the traditional. Some people seek online for their convenient, but they wonder about the online degree quality.

Online learning became the most quality education throughout the nation. As the world changed in time, technology became a major part of everyday life. The new technology gave business a leading edge that it also created an online education opportunity for schools to teach their education through long distance. The online learning got the same quality of the traditional learning.

First of all, the population chose to complete their degree in an online learning environment. For example, many adults chose online education for their convenient time, so they could have time for their family and work. The online education became so popular when many people recognized what online education was about. It wasn’t a joke that it actually worked in the real world. According to the survey of the national Post-secondary Education Cooperative reported, the online learning was increased dramatically by 61% between 2006 and 2007 (Huang. E.Y, Lin S.W, Huang T.K, 2001). Consequently, the online degree was a good choice for those busy adults, and it really worked in the real world.


Secondly, the online learning provided the quality online education software as same quality as the traditional learning had. For example, when we lived in the new advance technology world, technology became secondary nature. Schools provided their E-learning environment software, so everyone could gather there to participate “Online participation includes spend reading online materials and their use of online functions.” (Huang E.Y, Lin S.W, Huang T.K, 2011).

The instructors usually got their software that they could be able to track their students trail such as Microsoft words, Excel, Access, Outlook, and etc. Also, there were schools’ software that it allowed instructors to track on their student; therefore, when their students participated more, they would understand more about their class objective. Consequently, the online learning got the same tradition learning quality.

Third, students and instructors developed a close relationship that they were their students’ motivation tools. For example, when online learners were unfamiliar with these new online tools, the instructors would guide them with the new E-learning environments. Also, instructors helped them to develop their strategies how to overcome their learning throughout online “instructors can help students to understand and master e-learning strategies during class time.” (Huang E.Y, Lin S. W, Huang T.K 2011). Consequently, the online learning could also develop a good relationship between students and instructors. Especially, when it was long distance, students needed extra help for their homework.

In conclusion, the online education became the popular icon that the majority of the population used it to complete their degrees for their convenient. The online education quality was similar to traditional education. It increased more than 61 percent of online students to complete their degree. Next, the student used the basic software tools such as Microsoft Office Suites, and schools got their own software to communicate and track their student progress. Lastly, students and instructors develop a good relationship that they assisted their students to overcome their challenges’ courses. At the end, they got the most quality education ever, so it was similar to the traditional education.

Vincent Tu

Reference:
Huang E.Y, Lin S. W, Huang T.K (2011). What type of learning style leads to online participation in the mixed-mode e-learning environment? A study of software usage instruction. Establish: 10-11-2011.

Internet usage in Congo

Internet usage is not the same around the world. For instance in Congo, where the statistics showed that in 2010, only 0.6% of population or 696,520 people were able to use the internet. The country’s population is about 71,712,867. The population wants to be part of the technologies expansion in the world via the internet but they cannot afford it. Some people who can afford it make it a business. That way, everyone who uses the internet has 1hour for 2 or 3 dollars and the price is not fixed in local money. The internet usage in Congo is limited not only by lack of computers and service, but also electricity. The computer and the internet usage are rare and thus have become expensive. A computer with small memory space cost around 1000 to 1500 dollars. In United States, emailing someone is the fastest way to reach them while, In Congo It takes time. This is usually because the person receiving the message doesn’t have regular access to the internet. Their email box cannot be regularly checked. They may only be able to check their email once a month or every six months. Some people are only able to access the internet at their work place. The internet is still a luxury in Congo.

My sister in law sent me her family picture on July through my e-mail. She asked me for my picture too. A few days later, I sent her a picture of my family too. We kept in touch over the phone. Recently she asked me to send her some pictures of my kids. I had already sent some of them last July she did not check her email yet. I bought a laptop for my brother; I thought it would help us communicate regularly instead of buying phone cards that only allow 18 minutes. After sending to him many messages without answer, I called him to figure out why he is not responding. He told me that he hadn’t responded for a variety of reasons. Half the time, their electricity was off. He also mentioned that he couldn’t pay for internet service. I can imagine his laptop is sitting there like a decoration, never in use in the house.” Having a computer, internet service, and electricity at the same time is challenging”.

Thus, the development of the internet usage is not the same around the world. In some parts of the world internet usage is growing very fast and creating a new culture while in another part of the world, the internet increase is very slow. Will that growth be the same around the world one day? Yes there is hope for everyone who is still alive.
References
Articles: Democratic Republic of Congo telecommunications market over view report
www.internetworldstats.com

Clarisse Kizinga

Cyberspace?

How has the Internet, so called ‘cyberspace’, allowed its users to operate in a world? Some people see it as a new world of freedom and creative opportunities while others see it as a dumping place for businesses.

The term ‘cyberspace’ was first used by science-fiction writer William Gibson in his 1984 novel Neuromancer. He described it is a futuristic computer network that people use by plugging their minds into it. This term now refers to the Internet and lends a romantic image to a world where an almost limitless pool of information can be plucked from a network of computers and computer users around the world.

The Internet allows freedom to share information and ideas. Cyberspace can be explored by almost anyone who has access to a modem and a computer. This can also be viewed by mobile phones and televisions. One of the contributing reasons for the popularity of cyberspace is the freedom to share knowledge with others.  Another way in which cyberspace can be seen as a platform for creative expression is when it is used as a device to disclose information that would normally be guarded by political parties.  For instance, China is known as the biggest abuser of Internet freedom. The government has suppressed several hundred thousand websites and, according to Amnesty International, has jailed 61 people accused of using the Internet to spread anti-Communist propaganda.

Along with cyberspace’s popularity and its freedom, there are criticisms of those who champion cyberspace are based on the content of what can be found online. Some argue that there are subjects that should not be disclosed to the population at the same time as others complain that the facts are weaken at best, and completely missing in some cases.
The most significant argument against the freedom of cyberspace has always been about pornography. Pornography is the biggest generator of traffic on the Internet and the latest trend of providing pornography direct to a mobile phone has witnessed commercial breaks on some mainstream digital television channels flooded with semi-naked women selling images directly to the customer.
Furthermore, there are no real rules or regulations to cyberspace, there will always be content that is considered to be so inaccurate and unreliable.
The Internet is a vast and powerful tool and as such it is there to be used or abused by anyone with access. The arguments that the Internet should be regulated are important and should not be completely ignored. The power that some governments and big business corporations have over the flow of information is very real and this is something that should be examined closely. However, picking out certain aspects from cyberspace to be scrutinized will open a precedent for all content to be regulated.
It is my belief that the ability to take on board information and decide whether to accept it on your own terms is far more important to personal and social development than being told what you can or cannot digest. As such I believe that the World Wide Web, the Internet, cyberspace, or whatever moniker it falls under does constitute a new world of freedom and creative opportunities and the fact that it is not regulated by self-appointed censors should be applauded and defended.

Reference
Brown, Andrew (1999) The Limits of Freedom – Censoring the Internet and Offensive Internet Sites New Statesman (12 February 1999 Issue)
Castells, Manuel (2002) The Internet Galaxy: Reflections on the Internet, Business and Society Oxford University Press
Flanagan, Mary (2000) Navigating the Narrative in Space: Gender and Spatiality in Virtual Worlds Art Journal (Fall Issue 2000)
Turner, Annie (2002) Censorship and the Internet: Just Where is the Real Threat to Internet Freedom Coming From? Communicate Magazine (June 2002 Issue)