At the CESI (Computers in Education Society of Ireland) conference last weekend (#cesi12), I presented ‘Social networking with our students: digital identity, privacy and authenticity’. A number of people have asked for details of the articles and resources I referenced, so here are both the presentation and a summary of resources.
Digital identity, privacy & authenticity – #CESI12 [slideshare id=11746918&w=425&h=355&sc=no] [=> presentation updated 18/04/12] The presentation is based on student work in a Professional Skills module, in a 2nd year BSc Computer Science and IT programme (see our Scoop.it for additional resources). The module aims to help students to improve their research and communication skills. Students gain experience in writing and presenting, both online and in class. Together we explore digital identity, privacy, social media, openness, copyright and Creative Commons.
Authentic learning is at the heart of the module. It is unrealistic to believe that students can learn or practice modern communication skills effectively in a traditional academic situation — i.e. submitting assignments individually to a lecturer, in an essentially private transaction. Communication today, particularly for IT academics and professionals, often takes place in open, online environments: discussion boards, social networks, blogs, wikis, etc. Ideas can be presented, discussed and defended; collaboration and feedback are enabled; better solutions can be found. To make the most of communicating in these different modes, in different media, a good understanding of digital identity and privacy is essential.
My CESI presentation focused on our use of Twitter, and particularly Google+, in autumn 2011 as an environment within which to discuss digital identity and privacy. Following is a summary of resources which we found useful, thought-provoking, interesting.
Search for your digital footprint
- Search engines, e.g. Bing, Google (including search for Images & Videos)
- Google Alert
- Intel Museum of Me
- Take This Lollipop (blog post)
danah boyd’s (@zephoria) work is essential reading for anyone seeking a deep understanding of digital identity, privacy and social networking, with a particular focus on young people. In her 2010 paper, Social network sites as networked publics, boyd identified 4 key attributes of information which exists (about us) online, i.e. it is persistent, replicable, scalable and searchable.
The private/public debate is fascinating, and one in which students can actively engage. For example, while Mark Zuckerberg has asserted that sharing or “public” is the new social norm, 4chan founder Christopher Poole argues that anonymity allows users to reveal themselves in a “completely unvarnished, unfiltered, raw way”.
Helen Keegan (@heloukee) is a recognised expert in the areas of digital identity, digital media, social networking and learning. Keegan has written of the “tyranny of authenticity”, particularly in the dynamic between students and educators, and the challenge of authenticity in the context of higher education.
TED Talk: Beware Online Filter Bubbles by Eli Pariser
TED Talk: “moot” (on Anonymity) by Christopher Poole
I Know What You Did Five Minutes Ago by Tom Scott (many of my students enjoyed this video — possibly better for older students)
Eli Pariser (2011) The Filter Bubble: What the Internet is Hiding From You — The “filter bubble” concept is a great one to explore with students of almost any age; Pariser’s TED Talk is excellent and accessible, and the related website has useful tips.
Jeff Jarvis (2011) Public Parts: How Sharing in the Digital Age Improves the Way We Work and Live — Jarvis, espousing extreme “publicness”, acknowledges that fear accompanies the adoption of any new technology and notes that “we will make a lot of mistakes as we develop social norms around how to treat information online”.
Sherry Turkle (2011) Alone Together: Why We Expect More From Technology and Less from Each Other — Turkle has received praise and criticism for this book, in which she maintains that democracy requires that we retain a “zone of privacy” around the individual.
We’d love to hear about additional resources which you have found useful.