Art of Cyberdribble is a blog written by adult learners at the Regis University College for Professional Studies (CPS). The purpose of the blog is to examine the intersection of communication and cyberspace.
Can Twitter and Facebook replace the nightly news?
Is social media a more current news source?
Perhaps one of the best examples of how information from social networking sites can be sourced in order to provide information is the website Ushahidi which uses crowd sourcing technology to map social networking activity. Ushahidi, which means “testimony” in Swahili, was founded in Kenya in response to the social unrest following the 2008 presidential election. The mission of Ushahidi is to use the crowd sourcing data in order to provide live updates on events that have an impact on social issues ranging from natural disasters to political uprisings. The website’s unique ability to map reports of violence using data from social networking sites (submitted via the web and mobile phones) made it one of the most reliable news sources for tracking violence in Kenya. The site has since expanded into a sophisticated source for real-time information on social issues occurring around the world. In fact, the real time data mapping provided by Ushahidi is being used by humanitarian organizations conducting relief efforts because of the website’s ability to “flag up danger around the world within seconds, enabling the organization to offer help to people around the globe” (Akhtar, 2011). Humanitarian organizations are able to use Ushahidi to gather real-time data on people in need thanks to a mapping analysis of social media users’ updates to their accounts. In this regard, the news source has become the very people experiencing an event as opposed to more traditional news reporters who are sent to a location to report on an event.
A Closer Look at Social Networking for Disaster Relief
A case study by Huang et. al describes the application of internet social networking among large web-users during a major natural disaster in Taiwan and how “Web 2.0” was used to “establish an integrated internet-based emergency response system… [which] empowered the public to share experience and information during emergency and disaster response activities” (Huang et al., 2010). When the Morakot typhoon hit Taiwan, the night of August 8 2009 causing massive damage to Southern Taiwan, web users immediately began reporting the real-time situation on the forum PTT, one of the most popular internet social networks in Taiwan, and by the morning a sophisticated online relief network was established. “On August 9th, an unofficial Morakot Online Disaster Report Center was established by a group of internet users from the Association of Digital Culture Taiwan They advised fellow Internet users living near areas battered by the storms to gather information, such as sustained damage or assistance needed on popular social networking websites, including Twitter… Twitter users also sent messages to help rescuers acquire accurate position for their family and friends who live in affected areas” (Huang et. al, 2010). In contrast to the disaster response through social networking sites, the official response operations were not coordinated efficiently. “During the most crucial first few hours after the catastrophe, the Central Response Center underestimated the early scope and gravity of the disaster due to the lack of information and communication from affected areas. Official government communication early in the crisis failed, causing people to turn to [the Web]” (Huang et al., 2010).
Ushahidi and the Morakot typhoon response are just two examples of how “Web 2.0” is becoming an increasingly trustworthy news source. Social networking platforms have the unique ability to provide real-time data from people experiencing a newsworthy event. Social networking sites can provide a vital two-way information channel that can help those in need get assistance and provide the rest of the world with real-time personal accounts of what is happening on the ground.
--Phil
Resources:
1) Akhtar, Tanzeel “The Charitable Face of Data Use” Accessed on December 9, 2011 via: http://www.marketingweek.co.uk/disciplines/data-strategy/the-charitable-face-of-data-use/3032554.article
2) Huang, Cheng-Min, Edward Chan and Adnan A Hyder “Web 2.0 and Internet Social Networking: A new tool for Disaster Management? – Lessons from Taiwan” BMC Medial Informatics and Decision Making 2010, 10:57.
Twitter and education, really? Really!
Twitter and education, really? Really!
Twitter and Education
Personally, I’m not sure how useful knowing that Ashton Kutcher ate a grapefruit for breakfast is to society, and keeping up with our favorite celebrities seems to be about the only thing that Twitter is good for. However, unbelievably, that is not entirely correct. Twitter can also be used in many applications to benefit educators and students. Don’t believe me? Well, I didn’t believe it at first either, but read on to be convinced!
I have so many followers!
Twitter is a micro blogging site that allows people to post messages, and these posts are delivered to the "followers" of the poster by text message. As an
student or facilitator, this service can come in very handy when one needs to get a message to the entire class without waiting for people to log on to the class site.
Due to the format of online classes, most students are only able to log on once per day to check updates and emails on their class site. "Such a service could be useful for teachers or students who want to send a text message to the whole class"(Moody, 2010).Imagine a scenario where your professor has changed the due date of a large assignment to the next night, instead of tonight. If this facilitator has utilized Twitter, he or she could easily "tweet"an update and the whole class would know instantly (and an extra day to complete an assignment is something most students want to know instantly!)
I participated in the class discussion and didn't have to say anything!
Twitter is not only a way to update one's students or fellow classmates to changes in the course; it can also be a way to keep everyone involved. Imagine
participating in class discussions at any time. Imagine having a brilliant idea at 9pm on a Tuesday and being able to "tweet" to your fellow classmates and professor
despite the late hour. This prevents trying to remember the brilliant thought, and allows for feedback from everyone even outside the classroom. "Parry uses Twitter
to enhance his classes and as a means of keeping students engaged in course content beyond the classroom walls. He has them create Twitter profiles and "follow," or
track, his updates along with those of friends and others outside the university. Many of his students go one step further and use the site to alert their classmates
to world events or issues that are relevant to the course" (Miners, 2010). Twitter also allows students to keep up with current events in real time, since many events
happening in the world today are "tweeted" about before they are reported by the professional news sources.
It’s hard to hear with all this "tweeting" going on
Twitter is not just for stalking your favorite celebrities anymore! By utilizing Twitter in the classroom, teachers and students can both benefit, 140 characters at a time. By keeping class discussions open 24 hours a day, 7 days a week, facilitators and students can benefit from larger, and deeper discussions. Twitter also allows for instant communication between students and professors when time is of the essence.
Samantha J
References
Miners, Z. (2009). Twitter Takes a Trip to College. U.S. News & World Report,146(8), 56-57.
Moody, M. (2010). Teaching Twitter and Beyond: Tips for Incorporating Social Media in Traditional Courses. Journal Of Magazine & New Media Research, 11(2), 1-9.
Twitter. (2011). Retrieved from http://twitter.com/.
Electronic Medical Record
Incentives
The United States congress has been encouraging the use of electronic health records by offering monetary incentives to those who are willing to participate and follow the designed criteria (Alder-Milstein, Bates, & Jha, 2011). The problem with this is how to incorporate the flow of information amongst other groups, such as between clinics, laboratories, or other health providers (Gunningberg, 2011). According to Gunningberg, et al., (2011) the use of regional health information organizations (RHIO), could help eliminate this problem through one single connection. The big questions are how many RHIO are there, how do they support the data exchange, how many providers are participating, and how many RHIO are economically visible (Gunningberg, et al., 2011)? Even though this sounds like an excellent idea there is limited data on how the RHIO are doing and whether they are helping the health care providers meet the needed criteria (Gunningberg, 2011).
Benefits of Electronic Medical Records
According to Vogel, (2011) some of the benefits of this type electronic information is the patient’s ability to schedule their appointments online, be able to refill prescriptions and view parts of their chart via web anytime of the day. The electronic medical records allows quicker access to test results, the ability to share information with other medical providers with fewer chances of hand writing based errors or duplicating tests. The patient can review what was talked about during a visit and receive a legible print out that is easy to read on regarding the conversation (Vogel, 2011).
Perceived Problems
A few perceived problems in regards to electronic health data exchange has to do with confidentiality and security (Zwaanswijk, 2011). The system would need to have security system that could protect the patient’s medical data, and few ways in which this could be obtained is by allowing only certain members of the health care team to be allowed to access patient information and monitoring the log in’s into these areas (Zwaanswijk, 2011). The electronic health record has the possibility to be a very valuable tool in auditing information on quality of care provided (Gunningberg, Fogelberg-Dahm & Ehrenberg, 2008). Of course, the only problem with this electronic information highway is keeping the patient information private (Vogel, 2011).
Donna S
Reference
Alder-Milstein, J, Bates, D, & Jha, A, (2011), A survey of health information exchange organizations in the United States: implications for meaningful use, American College of Physicians, 154, pp. 666-671, www.annals.org.
Gunningberg, L, Fogelberg, M, & Ehrenberg, A, (2008), Improved quality and comprehensiveness in nursing documentation of pressure ulcers after implementing an electronic health record in hospital care, Journal of Clinical Nursing, 18, pp. 1557-1564, DOI:10.1111/j.1365-2702.2008.02647.x.
Vogel, J, (2011), Electronic records mandate strains rural hospitals, MPRNEWS, www.minnesota.publicradio.org/display/web/2011/06/20/ground-level-rural-health-care-electronic-medical-records/
Zwaanswijk, M, Verheij, R, Wiesman, F, and Friele, R, (2011), Benefits and problems of electronic information exchange as perceived by health care professionals: an interview study, BMC Health Services Research, 11, 256, pp. 1-10, www.biomedcentral.com
Is Open Communication Possible Online?
The manner in which we express ourselves online goes beyond caring what others think about our opinions. When we present our opinions online we can truly express our real thoughts, but some people will still try to present only non confrontational points of view. This is not constructive in truly discussing a subject. It is quite possible to present your real views while being diplomatic about those views and respecting and allowing for others to do the same. A strong opinion that does not take into consideration respect for others might obstruct classmate’s desire to participate in a forum because of the fear of being attacked by the other participants. Liu & Fahmy (2010) explain, “The spiral of silence theory proposes that the likelihood an individual will express their opinions in public are based on the positive monitoring of the opinion climate and the comparison of their own opinions with the perceived current and future public opinions. If individuals perceive that their opinions are on the majority or on the rise, they might be willing to speak out. However, if they judge that their opinions are on the minority side or are on the decline, they might decide to keep silent or conform to the majority” (Page 46).
My personal experience in an online environment is that it is perfectly fine disagreeing on a topic, and one should stand up for ones point of view, but there is no need to hurt others to get your point across. Opinions and views are fine to present, however any opinion should be backed up with some informative facts or data, instead of ending a conversation by saying “because I say so.” Everyone has an opinion, but it is not constructive to present opinions without showing why those opinions exist by using data and supportive information. My husband once told me: “If we all agree that we disagree, there will be fewer conflicts in this world.”
Integrity in an Online Environment
When interacting in an online environment, we do not see faces or hearts, just words; therefore, the way we express ourselves on the internet can define who we are in the eyes of someone else. But are we who we say we are to others? Or do we project a huge shield to protect ourselves from others? Or do we not take online communication seriously at all? Maybe I should rephrase my question: Are we honest with ourselves? The answer to those questions is for each one of us to answer. Suler (2004) explains, “It’s well known that people say and do things in cyberspace that they wouldn't ordinarily say or do in the face-to-face world. They loosen up, feel more uninhibited, and express themselves more openly. Researchers call this the "disinhibition effect." It's a double-edged sword. Sometimes people share very personal things about themselves. They reveal secret emotions, fears, wishes. Or they show unusual acts of kindness and generosity. We may call this benign disinhibition. On the other hand, the disinhibition effect may not be so benign [because] out spills rude language, harsh criticisms, anger, hatred,[and] even threats; we might call this toxic disinhibition” (Para.1). There is something interesting that happens to personalities when taking online classes. We see many times people extremely introverted in a face to face environment, but in an online environment they are willing to speak out and share personal experiences.
According to Suler (2004), “While online people may feel they have more opportunities to present themselves as they would like to present themselves, particularly in the carefully composed text of asynchronous communication. They may have more chances to convey thoughts and emotions that go "deeper" than the seemingly superficial persona of everyday living. These opportunities are very valuable aspects of cyberspace, but not necessarily evidence of a more true self. What we reveal about ourselves spontaneously, often right on the surface for others to see but without our being consciously awareness of it, may be just as real and true” (para.26). The truth is that we do not know who we are talking to on the other side of our screen. It is a normal reaction to the unknown to keep things at a distance, but sometimes it is necessary to step in to break the ice between online classmates. In most online environments I think it is smart to keep things at a more professional level, but when it comes to classmates, it is more enjoyable sharing experiences that we might learn from one another.
Self -Disclosure versus Privacy
Expressing one’s opinion or feelings is one thing, and disclosing personal information that can jeopardize our identity is a different topic. According to Joinson & Paine (2005), “In a legal context, privacy is largely synonymous with a ‘right to be let alone’. However, others have argued that privacy is only the right to prevent the disclosure of personal information” (Pg. 14)
Let us not confuse being honest with ourselves and the way with express our feelings or thoughts in our online classroom; versus being totally trusted to any unsecure chat room or blog and provide our address or social number to others.
According to Joinson & Paine (2005), “Self-disclosure is the telling of the previously unknown so that it becomes shared knowledge, the “process of making the self known to others” (Pg. 2). It is a normal attitude not to be willing to disclose ones feelings or thoughts at first in an online environment, because all our classmates will know who said what since posts are not anonymous. Another reason people might not express themselves is they might feel more vulnerable to others and fear to express their honest opinions.
Joinson & Paine (2005) explain that “self-disclosure can be categorized into either peripheral, intermediate, and core layers. The peripheral layer is concerned with biographic data (e.g. age), the intermediate layer with attitudes, values, and opinions and the core layer with personal beliefs, needs, fears, and values” (Pg.3). In my experience with online classes the peripheral and intermediate layers are the ones best expressed among classmates and myself. Only a few classes I have seen require one to develop the core layers and defend ones personal beliefs and values.
The best part of being oneself in an online environment is to build good relationships and new friends as well as to explore new parts of ourselves which help us to grow intellectually and internally.
Carol H.
References
Joinson, A. and Paine, C.(2005). Self-disclosure, Privacy and the Internet. Retrieve from
http://www.york.ac.uk/res/e-society/projects/15/PRISD_report2.pdf
Liu, X. & Fahmy,S.(2010). Exploring the spiral of silence in the virtual world: lndividuals'Willingness to express personal opinions in online versus offline settings. Journal of Media and Communication Studies Vol. 3(2), pp. 45-57. Retrieve from
http://www.academicjournals.org/jmcs/PDF/pdf2011/Feb/Liu%20and%20Fahmy.pdf
Suler, J. (2004). The Online Disinhibition Effect. Retrieved from
http://users.rider.edu/~suler/psycyber/disinhibit.html#trueself
Cyber Voting
"Hanging chads" of the 2000 presidential race, many election officials looked to technology to come to their rescue” (Walton, 2003). The electronic voting technology has features such as touch screens and added features the older punch card voting systems doesn’t. Most argue that it is efficient, secure and cost effective. However, a congressional research service concluded that the system may be vulnerable to attacks and other faults that could prevent its functionality.
Security/functionality:
“The popularity of DREs, particularly the touchscreen variety, has been growing,
and many expect that growth to continue” (Fischer, 2004). Many voters perhaps may like the opportunity to avoid long lines to perform a quick secure vote, The congressional research service has concluded that electronic voting systems accurately records a voter’s choice and reduces the likely hood of submitting the wrong choice. The machines are multicultural where each can display ballots in different languages depending on voters’ needs. (Fischer, 2004). but what good is the transaction if it is hard to understand and subjected to attack via the internet?
Problems:
The machines are said to be standalone machines so the hacking and data compromise is not possible. However, telephone connections are increasingly internet based. This provides the possibility of interception with voting data. The machines use modems to communicate over telephone lines. These transmissions in the past that traveled only over copper lines are now being routed over the internet. So, the chances of compromise are equal to any networkable communication devices. Another issue is the changes of votes without detection. According to Everett, “Entire races can be added or Removed from ballots and voter’s candidate selections can be flipped and the majority of users do not notice” (Everett, 2007). So are we ready for the electronic voting? The concept is growing and the concerns of how to vote in cyberspace has members in our government and private sector searching for solutions. One thing is certain is that E-voting is going to expand when the security flaws has been removed.
Rowe K
References:
Walton, M. (2003) Electronic Voting no magic bullet. Retrieved from http://articles.cnn.com/2003-12-11/politics/elec04.nist.evoting_1_electronic-voting-rebecca-mercuri-new-voting-technology?_s=PM:ALLPOLITICS
http://www.election-america.com/?gclid=COHdo_6x-awCFacZQgod7D7SRw
Fischer, E. (2004) Electronic Voting Systems (DREs): Legislation in the 108th Congress retrieved from:
http://votingmachines.procon.org/sourcefiles/Electronic%20Voting%20Systems%20Legislation%20in%20the%20108th%20Congress.pdf
Ways To Recycle Your computer and it's unseen importance
According to greenhome.com, approximately 10 billion computers are dumped in landfills each year, and according to National Safety Society only 11 percent of computers are actually recycled. There is a big concern when landfills accumulate such huge amounts of old computers. The concerns are the toxic harm that these computers contain. Heavy metals such as cadmium, chromium, mercury are just only a few that are hazardous to health and the environment. The computer monitor screens contain cathode tubes, which contain lead that can after destroyed can melt or drain away in the environment causing hazardous health problems.
Ways to recycle your old computer correctly would be to contact your computers manufacturer to see if they take back old or obsolete computers.
Hewlett-Packard takes back its old printers as does Apple. Contacting a proper computer recycling center is also helpful as they melt down the precious metals and properly dispose of the computer parts in a safe and manageable manner. Another good idea would be to donate your old computers to schools or non-profit organizations for use.
Proper methods can be taken to properly dispose of computers so that the environment and health can be preserved. Responsibility goes a long way, and being responsible can save time, money, and lives in some cases.
References:
Home, G. (n.d.). What to do with tech trash?. Retrieved from http://www.greenhome.com/info/articles/your_community/56/
Turner, L. (2010, May 20). [Web log message]. Retrieved from http://www.livestrong.com/article/127692-computer-recycling-important/
Importance of Computer Recycling
When the time comes to finally buy that shiny new computer you've been eying, you may find yourself wondering what to do with the old one. Many electronics retailers and computer manufacturers advertise trade-in programs, and many states have even prohibited computers from being dumped in landfills.
Types
Computers can be recycled in a couple of ways, depending on the state of the machine. Giving old, working computers to friends and family members or donating them to nonprofit organizations not only keeps the computer entirely out of the waste stream, but it presents computer access to someone who might not otherwise be able to afford it. Non-working computers can be sent to recycling centers where they are dismantled and valuable components are recovered.
Considerations
Donating a working computer can be a tax write-off, so if you've got a functional computer on your hands, there is an added monetary benefit to donation. However, if the computer really is at its end of life, it might be more trouble than it's worth to a charity organization, which would then just have to seek a means of disposal. The Environmental Protection Agency suggests computers five years old or less and in working condition be donated; others should be recycled.
Misconceptions
When your computer goes off for recycling, it doesn't necessarily mean the world becomes a cleaner place. Some less responsible collection programs actually end up with computers being shipped off to developing nations where they become an even bigger health hazard. In some small provinces of China, locals pick through mountains of e-waste to recover valuable materials without proper protection, reports the Basel Action Network, a global watchdog organization that recently launched its own global e-waste recycler certification to recognize responsible recyclers.
Warnings
Whatever method of recycling you've chosen for your computer, you'll want to make sure your personal information has been wiped clean from its hard drive. Whether donated to another user or sent to a recycler for scrap, the data on your hard drive can be retrieved, and personal information such as financial records or social security numbers can be dangerous in the wrong hands.
Potential
Nearly 70 million computers were sitting in storage in 2007, according to the EPA. If even half were usable, nearly 35 million people or organizations could reap the benefit of a working computer. If the rest were recycled rather than being sent to landfill, the reduction in greenhouse gas emissions would be staggering--the EPA calculates that recycling just 1 million computers prevents the release of greenhouse gases equivalent to the emissions of 16,000 cars.Read more: http://www.livestrong.com/article/127692-computer-recycling-important/#ixzz1fFerc95k
todd w
Using microblogging for more than celebrity gossip
One of the great benefits of these technologies is that they are able to share the information publicly. For this reason it has been considered an ideal technology for the dissemination of information about natural disasters.While it does not rank in the top 10 Nielsen websites for August 2011, Twitter has grown substantially since it's 1.2 million visitors a month in April of 2008 (Johnson, 2009). One of the more practical uses of Twitter (and Facebook and similar sites) is quick dissemination of information during a natural disaster. Freeman analyzed the use of twitter during 3 Australian disasters: the Victorian wildfires of early 2009, flooding in Queensland in late 2010-early 2011, and tropical cyclone Yasi in early 2011. In the wildfires Twitter was used primarily by news outlets to spread information about the fires well beyond Australia. However, by late 2010 the Queensland Police Service and the local power company were prepared to spread warnings and pertinent information to locals about the floods and cyclone. In all three disasters, citizens themselves were, of course, a major source of information.
Unlike traditional news channels, Twitter does not fact-check or filter information. The unreliability of crowd-sourced news is indeed one of the biggest problems in a disaster situation. One could certainly imagine bad information about safe evacuation routes causing people to get stranded or worse. Freeman notes that National ICT Australia is working on methods to coordinate government usage of electronic communications. Having up-to-the-minute official information in a disaster is likely to be more useful, or at least make people feel better.
So the next time you see someone checking their twitter obsessively, don't immediately pass them off as a Beiber fan. They just might see the tornado warning that saves your life.
-Evan W.
Freeman, M. (2011). Fire, wind and water: social networks in natural disasters. Journal of Cases on Information Technology, 13(2), 69+. Retrieved from http://go.galegroup.com.dml.regis.edu/ps/i.do?id=GALE%7CA273280029&v=2.1&u=regis&it=r&p=CDB&sw=w
Johnson, S. (2009). How Twitter Will Change The Way We Live (in 140 characters or less). (Cover story). Time, 173(23), 32-37.