dimensions of vulnerability in the information age

38
Dimensions of Vulnerability in the Information Age presented by Valorie A. Stokes, Library Media Specialist Platte County R3 High School http://bit.ly/20O1fAJ @See_Spot_Read [email protected]

Upload: valorie-stokes

Post on 14-Apr-2017

169 views

Category:

Education


0 download

TRANSCRIPT

Page 1: Dimensions of Vulnerability in the Information Age

Dimensions of Vulnerabilityin the Information Age

presented by Valorie A. Stokes, Library Media Specialist

Platte County R3 High School

http://bit.ly/20O1fAJ

@[email protected]

Page 2: Dimensions of Vulnerability in the Information Age

“To grow up is to accept vulnerability…to be alive is to be vulnerable.” --

Madeleine L’Engle

Page 3: Dimensions of Vulnerability in the Information Age

By the End of This Session...

● External and Internal Vulnerabilities

● Two Mental Models to Reference

● Manifestations of Vulnerability

● Observation, Reflection and Discussion Takeaways

Page 4: Dimensions of Vulnerability in the Information Age

External Vulnerabilities

Cyberterrorism

Malware and Viruses

Identity Theft

Phishing Scams

Key Logging

Page 5: Dimensions of Vulnerability in the Information Age

Photo credit: “O Elephante” by Morilo Morals is licensed under CC BY 2.0

Page 6: Dimensions of Vulnerability in the Information Age

InternalVulnerabilitiesPerceptions & Realities of Time

Perceptions & Narratives of Self

Perceptions & Narratives About Others

Photo Credit: “Kaleidescope” by nathanmac87, Flickr | CC-BY/ via Wylio/gray screened from original

Page 7: Dimensions of Vulnerability in the Information Age

Now you see it...

Page 8: Dimensions of Vulnerability in the Information Age

Now you don’t.

Page 9: Dimensions of Vulnerability in the Information Age

WiseWitty

EruditePithy

Bloggers and

Tweeters

Page 10: Dimensions of Vulnerability in the Information Age

“Teaching is hard enough without worrying if your mask is on straight, or cracking, or peeling.” --Sam Bennett

Photo Credit: “Lucha libre mascaras” by Jonathan McIntosh is licensed under CC BY-SA 3.0

Page 11: Dimensions of Vulnerability in the Information Age

Photo credit: “Frustration” by Peter Alfred Hess is licensed under CC BY 2.0

Page 12: Dimensions of Vulnerability in the Information Age

Pretense Practitioners Bozos on the Bus

Everyone is on this continuum somewhere

Mental Model #1: TECtinuum

Sanguine Citizenry

TECtinuum V 1.0 created by Valorie A. Stokes METC 2/2016

Page 13: Dimensions of Vulnerability in the Information Age

Pretense Practitioners

Either faking or feigning it

Photo Credit: "Day 43 - Every Brilliant Thing: Hope!" 2012 Simon James, Flickr | CC-BY-SA | via Wylio/gray screened from the original

Page 14: Dimensions of Vulnerability in the Information Age

Bozos on the Bus

Fear, foible or frustration-filled;looking longingly at that other

cool “tech kids’” bus

Photo Credit: Clowns on a Bus. © Fang-Su; http://www.fangsu-photos.com/Life/Live/Santa-claus-11-11/ (used with permission)

Page 15: Dimensions of Vulnerability in the Information Age

Sanguine Citizenry

Believe technology makes everything easier and better and take any opportunity to say so

Photo Credit: “Wearable Technology” by Keoni Cabal is licensed under CC BY 2.0

Page 16: Dimensions of Vulnerability in the Information Age

Everyone is on this continuum somewhere

FOMO Sufferers

The OZZIEs RHINO’S Realm

“Impostors”

How Internal Vulnerabilities manifest themselves on this Continuum

Luddites & Technophobes

Tech Freaks & Geeks

Page 17: Dimensions of Vulnerability in the Information Age

FOMO Sufferers

The OZZIEs RHINO’S Realm

“Impostors”

They try to look and/or act the part of a wizard with technology, but sooner or later someone will see behind their curtain.

They possess that Fear Of Missing Out; sense they aren’t quite in on all the “secrets” others know about how to navigate or be adept with technology.

Like Bolt’s animated hamster friend, they are running as fast as they can to keep up but have to contend with the bubble of their existence.

They actually do know pretty well what they are doing yet still feel less than confident about their skills and are nagged by the notion that the jig will soon be up.Manifestations of

Internal Vulnerabilities

Bozos on the Bus

Page 18: Dimensions of Vulnerability in the Information Age

Certain Givens Feed...

the Vulnerability Beasts

Page 19: Dimensions of Vulnerability in the Information Age

Given #1The nature and legacy

of academe

Page 20: Dimensions of Vulnerability in the Information Age

Given #2The GTA, Instagram, Tumblr Red Herring

Photo Credit: “Tiff’s Enjoying her Christmas Present” 2008 by Marco Arment, Flickr | CC-BY | via Wylio/gray-screened from the original

Page 21: Dimensions of Vulnerability in the Information Age

Given #3Reluctance to ask

questions/look stupid

Students. 2011 copyright by Tulane University. All rights reserved.

Page 22: Dimensions of Vulnerability in the Information Age

Given #4The age and self-consciousness combo

Photo Credit: "IT Family", 2011 Ed Ivanushkin, Flickr | CC-BY-SA | via Wylio/gray screened from the original

Page 24: Dimensions of Vulnerability in the Information Age

Given #6The Haves, the Have-Nots and the Having-to-Catch-Ups

Photo Credit: "Knight-Crane Convergence Lab" by Knight Foundation is licensed under CC BY 2.0/flipped horizontally and gray screened from the original

Page 25: Dimensions of Vulnerability in the Information Age

Photo Credit: "Fairy Bench" by Derek Markham is licensed under CC BY 2.0

Page 26: Dimensions of Vulnerability in the Information Age

Some stories people tell themselves about technology...

“I don’t have time to learn this stuff with everything else asked of me.”

“I am just so overwhelmed!”

“I don’t know what tool or resource to use when.”

“I feel like I just get comfortable with “X” and--poof--it goes away.”

“Students don’t need technology to learn ‘X’”?

Page 27: Dimensions of Vulnerability in the Information Age

The ODONO

Cycle

Mental Model #2

by Jim Burke

Page 28: Dimensions of Vulnerability in the Information Age

Orientation includes…

- Innocence

- Interruption

Photo Credit: “Breaking News!” by Mike Licht is licensed under CC BY 2.0

Page 29: Dimensions of Vulnerability in the Information Age

Dis-Orientation includes…

- Suffering

- Intervention

- Knowledge

Page 30: Dimensions of Vulnerability in the Information Age

New Orientation includes…

- Internalization

- Wisdom

Photo Credit: “Wisdom” by Moyan Brenn is licensed under CC BY 2.0

Page 31: Dimensions of Vulnerability in the Information Age

For Observation,Discussion, and Reflection(in one-on-one, small group or large group settings)

Page 32: Dimensions of Vulnerability in the Information Age

● With whom have you interacted that you could place on one of these mental models?

● What makes you put them there? Why would they likely be there?

● How can doing this quick type of “formative assessment” help you to help them?

Pretense Practitioners Bozos on the Bus Sanguine Citizenry

Page 33: Dimensions of Vulnerability in the Information Age

● What stories do you think (or know) some of your colleagues are telling themselves about technology tools they are being asked to adopt or integrate into the work they are doing?

● How could some of those stories be shared with others to alleviate pressures, frustrations or fears?

● Why would any of this information be helpful for you to know?

Page 34: Dimensions of Vulnerability in the Information Age

● When a new tech tool or resource is introduced to you, what is typically your reaction?

● Does it make a difference if you are a) invited to just explore it or b) expected to use it by a certain time or in a certain way?

Pretense Practitioners Bozos on the Bus Sanguine Citizenry

Page 35: Dimensions of Vulnerability in the Information Age

● Share either the continuum (or your own version of it) or the ODONO Cycle; have people place themselves on one of those models in the context of working with a new tech tool or resource. Talk about why they placed themselves where they did.

● How can using models like these or similar ones help us to differentiate PD or help better design tech PD to take that range of reactions into account?

Page 36: Dimensions of Vulnerability in the Information Age

Thanks for your time and attention

and remember...

Page 37: Dimensions of Vulnerability in the Information Age

“Vulnerability is the birthplace of innovation, creativity and change.”

--Brene Brown

Page 38: Dimensions of Vulnerability in the Information Age

Works that Inspired or Informed this Presentation

Brown, Brené. Rising strong. New York: Spiegel & Grau, 2015. Print.

Burke, Jim. "ODONO: Life, Learning, Leading, and Literature." Web log post. English Companion. Jim Burke. Web. 27 Nov. 2015.

L'Engle, Madeleine. Walking on Water: Reflections on Faith and Art. New York: North Point, 1995. Print.

Lesser, Elizabeth. Broken Open: How Difficult times Can Help Us Grow. New York: Villard, 2005. Print.