SlideShare une entreprise Scribd logo
1  sur  75
Informations-
seeking
Other services
The Shift Toward
Increased Information
    Self-Sufficiency

       Able to provide for oneself
       without the help of others;
       independent.
       Having undue confidence
There is a little
doubt that in the
US and other
developed
countries, citizens
are increasingly    • 73% US adults are
relying on the        internet users
internet to gather • 42% have
information.          broadband
                     connections
                   • 29% in January
                     2005
• 87% of youth in US
Lenhart,        ages 12-17 are
Madden, and     Internet users
Hitlin…       • 51% say that they
                use Internet on
                daily basis
              • Half of children in
                grades 1-5 are
                online
              • 80% high school
                students
Increasing
Internet reliance
is also evidenced
by the dramatic
increase of self-
service options
                    Online booking
available to        of airline
Internet users.     tickets
                    Reservation of
                    tickets for
                    upcoming
                    events
Youth in          As early as 2001,
particular are    Lenhart, Simon,
increasingly      and Graziano…
dependant upon
online systems    71% of online teens
and support.       say that they used
                   the Internet as the
                   major source for
                   their most recent
                   major school
                   project or report.
Presumably, the
chief advantage
to customers of
online
information self-
sufficiency is
greater control     However, this
and satisfaction.   may not be the
                    reality…
ServiceXRG
found that of
the…

                60% of customers who
                used Web self-service,
                only 23% reported
                that they found what
                they were looking for
                online.
The shift to digital over physical
media…

Response to citizen
demand for increased
self-service
Economic pressure to
minimize cost by
eliminating expenses
Direct access and
control of information
Information
                         Self-
Affects how products     Sufficiency
are marketed             Impact…
How organizations
manage information
How courts assess
liability
How current and future
workforce is trained
Information
Self-Sufficiency
    and the
  Heightened
Importance of
  Credibility
Credibility…
- believability or   Online buying of
trustworthiness      books
                     (price, author,
                     shipping terms,
                     reviews)
                     Online buying of
                     house and car
In particular, for any
online transaction that
involves delivery of some
physical item, a central
means of determining
credibility---physical
examination and testing-
--is gone, or at least
greatly diminished.
Moreover,
methods of
building trust and
methods to test
assertions have
changed.
This is the great paradox of
information self-sufficiency on the
internet:

  End users are becoming more
responsible for making information
determinations, but because they
have fewer physical cues to work
with, they are becoming more
dependent on the information
provided to them by others.
Lankes /
Eisenberg       This architecture
Architecture…   divides the Internet,
                by extension, digital
                networks into four
                distinct layers.
                Each can manipulate
                information in a way
                that is completely
                transparent to the
                recipient.
Infrastructure

It can easily
block traffic to
Composed of
and from its
destinations to
hardware used
move information
invisible to users.
from one place to
another on the
Internet.
Applications

   Consists of software that
   allows information to be
   exchanged between different
   actors on the network.
   Include Web browsers and
   instant messaging clients, as
   well as high-level protocols
   such as HTTP that transfer
   Web pages.
Spam filters are
excellent examples of
technology affecting
credibility in a nearly
invisible way.

           It is used in many
           schools, discarding
           numerous e-mail
           messages before human
           eyes ever see them.
Harris and
        Weingarten

Blocking young people’s exposure to
information that may be credible is
probably not the best strategy for
teaching students to identify and
defend themselves against such
information, which they will almost
certainly encounter at some point in
their lives.
Organizations used    Information
to meet users’          services
informational needs
on the Internet.

Determine the         Selects which
                      Web sites to
quality and
                      display and the
relevance of sites    order in which to
using a “link-        display them on
popularity” metric.   the search
                      results page
User layer

  Composed of
  individuals and
  groups who
  primarily seek and
  consume
  information on the
  Internet to meet
  their own
  informational need.
Shifting Credibility
from Authority to
     Reliability
Traditional
approaches to
credibility strongly
emphasize
authority, where a
trusted source is
used to inform an
individual’s
credibility
determinations.
Whereas in
reliability
approach, users
determine
credibility by
synthesizing
multiple sources of
credibility
judgments.
Most people use
the term
authority to
refer to a single
entity, or small
set of entities.
                    a thing existing
                    independently
                    from other
                    things.
Authoritarian is the
 Authoritative is
enforcement of an
 authority granted on
authority: in essence, the
 the basis of
removal of choice by force
 perceptions of trust
of law, policy, structure,
 and expertise.
or some other means.
Many want the library to
become a preferred provider
of information, yet the
concept of “preferred” only
works in an authoritarian
view when someone who
can make others prefer or
select something over
something else.
The decentralization of authority
has turned out to be particularly
attractive for teenagers.
Technology allows greater
opportunity for young people to
themselves become authoritative
experts in many areas.
Many adults feel it is a problem
that teens may not look to
vetted and traditional sources
of “valid” information.

The concept of multiple
authorities existed prior to the
internet.
As users take it upon
themselves to become
authorities by directly other
With the Internet and
evaluating, synthesizing,of
digital media, the range and
possible authorities has
even producing informations
expanded greatly.
themselves, the notion of a
singular authority ends, and
reliability becomes the
predominant form of
credibility assessment.
Reliability

-something or
someone
perceived as
dependable and
consistent in
quality.
Authority and
reliability approaches
are often used in
conjunction in both the
physical and digital
world.
           Perhaps the most
           common way to become
           an authority, however,
           is through reliability.
Authority and reliability
also have “halo effects,”
meaning that a person
who is seen as an
authority in one area
may be presumed to be
an authority in other
domains as well, even
without proven
performance.
Ultimately, reliability and
authority anchor the
endpoints of a continuum of
approaches to credibility.
With authority, preexisting
agreements are in place and
assumed: conversation is over.
With reliability, the
conversation is open and
ongoing.
Digital Media
     and
Credibility by
 Reliability
Recent trends in digital media
facilitate the shift to a reliability
approach of credibility assessment.

The guiding technical protocol of the
Internet, Transmission Control
Protocol/Internet Protocol (TCP/IP),
simply breaks data into packets and
makes sure these packets get to the
proper destination with fidelity.
As a result, even higher-level
Internet functions are not
defined or controlled by the
Internet itself.

The Internet is, in a very real
sense, an agreement, and an
ongoing conversation where
organizations and individuals
share informations.
This open architecture and
decentralized control provide
enormous capacity for
participation, which
contributes to accurate
credibility assessment through
reliability among multiple
shared perspectives and
experiences.
Indeed, involvement and
participation have led
many Internet software
designers to view the very
process of software
development as a means
toward credibility.
Open source software
  While anyone with
Open source
  sufficient whencan
software is  skill the
  use the open source
developer of a piece
  software, if they
of software makes
  improve or expand
the underlying
  the original code,
source code of the
  they must give the
software available to
  additions back to the
the public.
  open source
  community.
Open source
software and
the associated
                  credible tools are
movement
                  ones that are built
propose a new
                  in the open, where
concept of
                  a conversation on
credibility in
                  the merits and
terms of tools:
                  structure of
                  infrastructure can
                  be debated and
                  tested.
In the traditional
This organization
approach to some
would have
software in the
standing
development,
community, good
credibilityand a
practices is
defined track
proven by the
organization that
record of quality
produced (i.e.,
products the
software.
authority).
It is also proffered in
terms of security.
A system is “secure” if
few have access to its
inner workings, and if
the few programmers
who put it together used
a common quality
process.
The open source
approach takes
an opposite
stance: To be
secure, software
must be
transparent and
then tested by
others (i.e.,
reliability).
The openness goes a long
way toward addressing the
information self-sufficiency
paradox among youth, but
only for those with sufficient
technology skills and
education.
The ability of
skilled users
fluent in the
technologies of
the Internet has
important
implications for
youth and
education.
Furthermore, if schools and
other institutions prevent youth
from participating in the
underlying infrastructure, they
are limiting youths’ ability to
resolve the information self-
sufficiency paradox and, by
extension, limiting youths’
ability to learn about and act
upon credibility.
The “Credibility
 Conversation”
To be effective both in
constructing reliability-based
credibility assessments and in
working collaboratively to build
innovative technical tools,
youth must be able to engage in
appropriate conversations with
appropriate others via the
Internet.
Accordingly, Nielsen/NetRatings
indicates that teens’ usage of digital
media is shifting.

While the top sites for
youth ages 12 to 17 used
to be those offering a
selection of instant
messaging buddy icons, in
the last 3 years the most
popular sites have shifted
to social networking sites.
In 2001, Lenhart, Raine, and
Lewis found that extremely
popular uses of the Internet
among teens included e-mail,
instant messaging, and visiting
chat rooms.
Teens’ desire for social Internet
experiences also shows up in
institutional education settings,
where Simon, Graziano, and
Lenhart found that a large
percentage of teens “say they use
e-mail and instant messaging to
contact teachers or classmates
about schoolwork.
Conversation theory
proposes that learning
and knowledge are
gained through the
interaction of agents
around ideas as they
go back and forth
describing an idea.
This interaction can
then be used to
develop new
understandings and
new knowledge
through a process that
contemporary learning
theorists call
scaffolding.
                     One idea
                     building upon
                     another
Learning
conversations can
take place between
two individuals (a
teacher and pupil),
two organizations
(negotiating a set of
academic standards),
or even two societies
(debating over the
best way to educate
youth).
Educational
organizations are now
beginning to understand
that the true power of
the Internet for learning
is not simply wide-scale
and one-way
distribution of
information, but instead
is getting closer to what
is happening inside
users’ brains.
The advent of services that
allow greater user involvement,
such as blogs, social networks,
and recommender, rating, or
commenting in e-commerce
and other sites, has led to
increased demand by youth
and other users for
involvement in Internet
services of all types.
The need to highlight
credibility in conversations has
implications for educational
policy makers as well.

Harries identifies such
“conservative attitudes” as a
structural challenge that must
be overcome.
What policy makers must
understand is that, as
Weingarten and Harris argue,
the unintended consequence of
creating “safe” learning
environment is an
environment that limits
learning about credibility.
Presented by:

Aireen P. Sinong

Contenu connexe

Tendances

Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
Teklu_U
 
Social Computing
Social ComputingSocial Computing
Social Computing
Mike Tan
 

Tendances (18)

Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
Anonos NTIA Comment Letter letter on ''Big Data'' Developments and How They I...
 
Social Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social IntelligenceSocial Computing: From Social Informatics to Social Intelligence
Social Computing: From Social Informatics to Social Intelligence
 
Embracing ICT
Embracing ICTEmbracing ICT
Embracing ICT
 
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education ContextUsing ICTs to Promote Cultural Change: A Study from a Higher Education Context
Using ICTs to Promote Cultural Change: A Study from a Higher Education Context
 
Report: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAASReport: Future Of Internet IV | AAAS
Report: Future Of Internet IV | AAAS
 
Future of the Internet: Role of the Web and New Media in the Public Sector
Future of the Internet: Role of the Web and New Media in the Public SectorFuture of the Internet: Role of the Web and New Media in the Public Sector
Future of the Internet: Role of the Web and New Media in the Public Sector
 
What can go wrong with web2 in public services
What can go wrong with web2 in public servicesWhat can go wrong with web2 in public services
What can go wrong with web2 in public services
 
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhiReport on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
Report on data breach and privacy in nepal during covid19 by shreedeep rayamajhi
 
Digital Identities
Digital IdentitiesDigital Identities
Digital Identities
 
International Digital Direct Election
International Digital Direct ElectionInternational Digital Direct Election
International Digital Direct Election
 
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew InternetGovernment Online: The 3 “P’s” of Success - Findings from Pew Internet
Government Online: The 3 “P’s” of Success - Findings from Pew Internet
 
Peer computing complete project
Peer computing complete projectPeer computing complete project
Peer computing complete project
 
Social Computing Jenny Williams
Social Computing Jenny WilliamsSocial Computing Jenny Williams
Social Computing Jenny Williams
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Toolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhiToolkit on factchecking by shreedeep rayamajhi
Toolkit on factchecking by shreedeep rayamajhi
 
The Internet is a magnifying glass
The Internet is a magnifying glassThe Internet is a magnifying glass
The Internet is a magnifying glass
 
Social Computing
Social ComputingSocial Computing
Social Computing
 

Similaire à Trusting the internet

An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
Alexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
Alexander Decker
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
Harsh Tripathi
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
Role of Emerging Technologies in keeping the Library current
Role of Emerging Technologies in keeping the Library currentRole of Emerging Technologies in keeping the Library current
Role of Emerging Technologies in keeping the Library current
Heather Lambert
 

Similaire à Trusting the internet (20)

TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagementTRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
TRILcon'17 confernece workshop presentation on UnBias stakeholder engagement
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
Consumer Law Revolution - Online Marketing Tools
Consumer Law Revolution - Online Marketing ToolsConsumer Law Revolution - Online Marketing Tools
Consumer Law Revolution - Online Marketing Tools
 
Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012Juniper Trusted Mobility Index 2012
Juniper Trusted Mobility Index 2012
 
Digital Fault-Lines
Digital Fault-LinesDigital Fault-Lines
Digital Fault-Lines
 
Taking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication ChallengeTaking Control of the Digital and Mobile User Authentication Challenge
Taking Control of the Digital and Mobile User Authentication Challenge
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
 
Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01Englishmain12classix 131025065953-phpapp01
Englishmain12classix 131025065953-phpapp01
 
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
 
A 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible UseA 2hr Presentation on Internet Safety and Responsible Use
A 2hr Presentation on Internet Safety and Responsible Use
 
9th
9th9th
9th
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
Role of Emerging Technologies in keeping the Library current
Role of Emerging Technologies in keeping the Library currentRole of Emerging Technologies in keeping the Library current
Role of Emerging Technologies in keeping the Library current
 
The New Symbiosis Of Professional Networks Research Study
The New Symbiosis Of Professional Networks Research StudyThe New Symbiosis Of Professional Networks Research Study
The New Symbiosis Of Professional Networks Research Study
 
Mobilization +
Mobilization +Mobilization +
Mobilization +
 

Plus de Aireen Sinong (10)

Operant conditioning
Operant conditioningOperant conditioning
Operant conditioning
 
Moral education
Moral educationMoral education
Moral education
 
Human+work
Human+workHuman+work
Human+work
 
Death penalty
Death penaltyDeath penalty
Death penalty
 
Decs values framework
Decs values frameworkDecs values framework
Decs values framework
 
Kapwa powerpoint
Kapwa powerpointKapwa powerpoint
Kapwa powerpoint
 
Humanism powerpoint
Humanism powerpointHumanism powerpoint
Humanism powerpoint
 
Psychospiritual development powerpoint
Psychospiritual development powerpointPsychospiritual development powerpoint
Psychospiritual development powerpoint
 
El cid
El cidEl cid
El cid
 
Spiritual development (2)
Spiritual development (2)Spiritual development (2)
Spiritual development (2)
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Trusting the internet

  • 2. The Shift Toward Increased Information Self-Sufficiency Able to provide for oneself without the help of others; independent. Having undue confidence
  • 3. There is a little doubt that in the US and other developed countries, citizens are increasingly • 73% US adults are relying on the internet users internet to gather • 42% have information. broadband connections • 29% in January 2005
  • 4. • 87% of youth in US Lenhart, ages 12-17 are Madden, and Internet users Hitlin… • 51% say that they use Internet on daily basis • Half of children in grades 1-5 are online • 80% high school students
  • 5. Increasing Internet reliance is also evidenced by the dramatic increase of self- service options Online booking available to of airline Internet users. tickets Reservation of tickets for upcoming events
  • 6.
  • 7.
  • 8. Youth in As early as 2001, particular are Lenhart, Simon, increasingly and Graziano… dependant upon online systems  71% of online teens and support. say that they used the Internet as the major source for their most recent major school project or report.
  • 9. Presumably, the chief advantage to customers of online information self- sufficiency is greater control However, this and satisfaction. may not be the reality…
  • 10. ServiceXRG found that of the… 60% of customers who used Web self-service, only 23% reported that they found what they were looking for online.
  • 11. The shift to digital over physical media… Response to citizen demand for increased self-service Economic pressure to minimize cost by eliminating expenses Direct access and control of information
  • 12. Information Self- Affects how products Sufficiency are marketed Impact… How organizations manage information How courts assess liability How current and future workforce is trained
  • 13. Information Self-Sufficiency and the Heightened Importance of Credibility
  • 14. Credibility… - believability or Online buying of trustworthiness books (price, author, shipping terms, reviews) Online buying of house and car
  • 15. In particular, for any online transaction that involves delivery of some physical item, a central means of determining credibility---physical examination and testing- --is gone, or at least greatly diminished.
  • 16. Moreover, methods of building trust and methods to test assertions have changed.
  • 17. This is the great paradox of information self-sufficiency on the internet: End users are becoming more responsible for making information determinations, but because they have fewer physical cues to work with, they are becoming more dependent on the information provided to them by others.
  • 18. Lankes / Eisenberg This architecture Architecture… divides the Internet, by extension, digital networks into four distinct layers. Each can manipulate information in a way that is completely transparent to the recipient.
  • 19. Infrastructure It can easily block traffic to Composed of and from its destinations to hardware used move information invisible to users. from one place to another on the Internet.
  • 20.
  • 21.
  • 22. Applications Consists of software that allows information to be exchanged between different actors on the network. Include Web browsers and instant messaging clients, as well as high-level protocols such as HTTP that transfer Web pages.
  • 23.
  • 24.
  • 25.
  • 26. Spam filters are excellent examples of technology affecting credibility in a nearly invisible way. It is used in many schools, discarding numerous e-mail messages before human eyes ever see them.
  • 27. Harris and Weingarten Blocking young people’s exposure to information that may be credible is probably not the best strategy for teaching students to identify and defend themselves against such information, which they will almost certainly encounter at some point in their lives.
  • 28. Organizations used Information to meet users’ services informational needs on the Internet. Determine the Selects which Web sites to quality and display and the relevance of sites order in which to using a “link- display them on popularity” metric. the search results page
  • 29.
  • 30.
  • 31. User layer Composed of individuals and groups who primarily seek and consume information on the Internet to meet their own informational need.
  • 32.
  • 34. Traditional approaches to credibility strongly emphasize authority, where a trusted source is used to inform an individual’s credibility determinations.
  • 35. Whereas in reliability approach, users determine credibility by synthesizing multiple sources of credibility judgments.
  • 36. Most people use the term authority to refer to a single entity, or small set of entities. a thing existing independently from other things.
  • 37. Authoritarian is the Authoritative is enforcement of an authority granted on authority: in essence, the the basis of removal of choice by force perceptions of trust of law, policy, structure, and expertise. or some other means.
  • 38. Many want the library to become a preferred provider of information, yet the concept of “preferred” only works in an authoritarian view when someone who can make others prefer or select something over something else.
  • 39. The decentralization of authority has turned out to be particularly attractive for teenagers. Technology allows greater opportunity for young people to themselves become authoritative experts in many areas.
  • 40. Many adults feel it is a problem that teens may not look to vetted and traditional sources of “valid” information. The concept of multiple authorities existed prior to the internet.
  • 41. As users take it upon themselves to become authorities by directly other With the Internet and evaluating, synthesizing,of digital media, the range and possible authorities has even producing informations expanded greatly. themselves, the notion of a singular authority ends, and reliability becomes the predominant form of credibility assessment.
  • 42.
  • 44. Authority and reliability approaches are often used in conjunction in both the physical and digital world. Perhaps the most common way to become an authority, however, is through reliability.
  • 45. Authority and reliability also have “halo effects,” meaning that a person who is seen as an authority in one area may be presumed to be an authority in other domains as well, even without proven performance.
  • 46. Ultimately, reliability and authority anchor the endpoints of a continuum of approaches to credibility. With authority, preexisting agreements are in place and assumed: conversation is over. With reliability, the conversation is open and ongoing.
  • 47. Digital Media and Credibility by Reliability
  • 48. Recent trends in digital media facilitate the shift to a reliability approach of credibility assessment. The guiding technical protocol of the Internet, Transmission Control Protocol/Internet Protocol (TCP/IP), simply breaks data into packets and makes sure these packets get to the proper destination with fidelity.
  • 49. As a result, even higher-level Internet functions are not defined or controlled by the Internet itself. The Internet is, in a very real sense, an agreement, and an ongoing conversation where organizations and individuals share informations.
  • 50. This open architecture and decentralized control provide enormous capacity for participation, which contributes to accurate credibility assessment through reliability among multiple shared perspectives and experiences.
  • 51. Indeed, involvement and participation have led many Internet software designers to view the very process of software development as a means toward credibility.
  • 52. Open source software While anyone with Open source sufficient whencan software is skill the use the open source developer of a piece software, if they of software makes improve or expand the underlying the original code, source code of the they must give the software available to additions back to the the public. open source community.
  • 53.
  • 54. Open source software and the associated credible tools are movement ones that are built propose a new in the open, where concept of a conversation on credibility in the merits and terms of tools: structure of infrastructure can be debated and tested.
  • 55. In the traditional This organization approach to some would have software in the standing development, community, good credibilityand a practices is defined track proven by the organization that record of quality produced (i.e., products the software. authority).
  • 56. It is also proffered in terms of security. A system is “secure” if few have access to its inner workings, and if the few programmers who put it together used a common quality process.
  • 57. The open source approach takes an opposite stance: To be secure, software must be transparent and then tested by others (i.e., reliability).
  • 58.
  • 59. The openness goes a long way toward addressing the information self-sufficiency paradox among youth, but only for those with sufficient technology skills and education.
  • 60. The ability of skilled users fluent in the technologies of the Internet has important implications for youth and education.
  • 61. Furthermore, if schools and other institutions prevent youth from participating in the underlying infrastructure, they are limiting youths’ ability to resolve the information self- sufficiency paradox and, by extension, limiting youths’ ability to learn about and act upon credibility.
  • 63. To be effective both in constructing reliability-based credibility assessments and in working collaboratively to build innovative technical tools, youth must be able to engage in appropriate conversations with appropriate others via the Internet.
  • 64. Accordingly, Nielsen/NetRatings indicates that teens’ usage of digital media is shifting. While the top sites for youth ages 12 to 17 used to be those offering a selection of instant messaging buddy icons, in the last 3 years the most popular sites have shifted to social networking sites.
  • 65.
  • 66. In 2001, Lenhart, Raine, and Lewis found that extremely popular uses of the Internet among teens included e-mail, instant messaging, and visiting chat rooms.
  • 67. Teens’ desire for social Internet experiences also shows up in institutional education settings, where Simon, Graziano, and Lenhart found that a large percentage of teens “say they use e-mail and instant messaging to contact teachers or classmates about schoolwork.
  • 68. Conversation theory proposes that learning and knowledge are gained through the interaction of agents around ideas as they go back and forth describing an idea.
  • 69. This interaction can then be used to develop new understandings and new knowledge through a process that contemporary learning theorists call scaffolding. One idea building upon another
  • 70. Learning conversations can take place between two individuals (a teacher and pupil), two organizations (negotiating a set of academic standards), or even two societies (debating over the best way to educate youth).
  • 71. Educational organizations are now beginning to understand that the true power of the Internet for learning is not simply wide-scale and one-way distribution of information, but instead is getting closer to what is happening inside users’ brains.
  • 72. The advent of services that allow greater user involvement, such as blogs, social networks, and recommender, rating, or commenting in e-commerce and other sites, has led to increased demand by youth and other users for involvement in Internet services of all types.
  • 73. The need to highlight credibility in conversations has implications for educational policy makers as well. Harries identifies such “conservative attitudes” as a structural challenge that must be overcome.
  • 74. What policy makers must understand is that, as Weingarten and Harris argue, the unintended consequence of creating “safe” learning environment is an environment that limits learning about credibility.