Trust and network fluency

See the course website!

My thoughts on trust and the web (blog)

Social Capital and PLNs: Discovering, Building, and Cultivating Networks of Learners

Dense networks have much redundancy even if info change is personal and frequent, and trust exists. Less dense, diverse networks can have more information traveling. Do we need a lot of trust in education? Dense network for me: Department of Dairy Science. Less dense network: connected courses. Educator’s network can offer info on PLNs (personal learning networks).

Sense of reciprocity: the more you give, the more you get. Students and teachers can both get rejuvenation from their networks. Students need to learn to engage outside their texts and classes.

Good network wants you to do things and to become part of something bigger.

PLN supports being a reflective teacher and a maker.

To build you PLNs:

  • Find your hashtags! (Syberman hashtags?)
  • Go public with things you want to work on or have worked with
  • Feed your network: interesting information, enquire people who you follow
  • Name things you value and tell people you value what they are doing.
  • Social bookmarking
  • Management tools: tweet tag, etc.

Building something together creates communities.

How to avoid burnout? Trust yourself to figure out what you need. Go after what you need.

New teachers tend to ignore support that they could get from their own near environment. Having face-to-face connections can increase network trust.

Walk through TAGS with creator Martin Hawksey

Twitter data disappears in a week for easy access. Google spread sheets can collect twitter searches for analysis. You can publish the data and use your own data visualization. Twitter networks can be graphed so you can see where you are situated in the online community. You can see yourself as part of the community and be empowering and get situational feel of the network.

Hawksey wanted to see, who are the people in class he is unaware of, and what tweets get re tweeted. The sheet is called #TAGS (tags.hawksey.info), you can download it for yourself. You will let the sheet to connect to twitter (from tools), create an application (fill fields how you want, put in your blog address, create application, choose one and choose API keys to the TAGS). Authorize twitter access to data. Choose the channel or tag you want to record. Google does this even if you are not online. You can make a summary sheet by person and look at how their history on re-tweets etc. Dashboard offers sense of over time use of the tag. The results can be published to the internet. Tag explorer turns the data into a network in a visual representation.

Location data collected can be tracked to people and their movements.

 

Webinar: Online privacy, Trust, and Security

Our instinct is not to trust and we need to cognitively decide to trust. Vulnerability mediates trust. It is a structural condition that influences emotion coming out of it. Two things need to be considered: 1) are you choosing it and controlling it, 2) is there already trust in the social network.

Network security: Imagine your data to be stored in locker room. You have your key, but someone always has the master key. Online someone can make copies of all you have there without you knowing. What can someone do with your data? Data mining can be used to marketing purposes. We do not know the full effect of leaked information and the route it takes to the consequences.

Social interaction has been shown to increase lifetime expectancy and success of endeavors. It is easier to do face to face compared to online.

Trustworthiness rebuilding:

  • Honesty
  • Dependability
  • Performance oriented

There needs to be room for corrections (like newspapers) and disagreements. Students need to feel like they can fail multiple times. It helps in learning. (PhD in failure….good one Jonathan). We need to have the trust conversations with students concerning virtual world and face to face. We need to enforce positive risk taking. We need to also be aware of the critical things that we don’t want to leak out for potential harm.

Leave a Reply

Your email address will not be published. Required fields are marked *