Thursday, February 12, 2009
The Internet and Mental Health
Needless to say, the faculty member was a little off the mark, and what Campbell began researching has become a booming field of study—cyberpsychology, or the influence of the Internet on human behavior.
Campbell, director of Prometheus and lecturer in psychology at the University of Sydney Faculty of Health Sciences, shared his experiences as a cyberpsychologist during the closing plenary, “The Impact of Information Science and Technology and Mental Health,” at the 2009 iConference.
During his presentation, he touched on how the Internet has become a tool for delivering educational and preventive information to patients, a supportive network for patients to interact with each other, a tool to provide telemedical services to people around the globe, a venue for medical counseling and advising, and a simulated environment that can be used for healing a variety of afflictions, to name a few.
He also described the social and physiological changes occurring in Generation X and Y, including a sharp increase in depression and emotion disorders. “They are highly susceptible to depression and mental illness,” Campbell said. “It had increased four-fold in teen-agers and adolescents in the past decade.”
He stopped short of directly relating their use of technology and online socializing to these increases, but he said it is being studied.
Campbell also said he sees great potential for new uses of social networking and Web 2.0 technologies in therapies and treatments. He presented one such case of a child diagnosed with attention deficit/hyperactivity disorder, who used a relaxing virtual world game that responded to the child’s breathing patterns to treat the illness and then could avoid having to take medicines with possible harmful side effects.
Serious games are also being used to conduct preventive medicine trainings, and researchers are trying to find new ways to incorporate more gaming and virtual environments in cyber-medicine. These methods, researchers are discovering, are effective not only for children and teens, but also adults and aging populations.
Wednesday, February 11, 2009
What can IT do to be green?
They outlined three fundamental problems:
· use of fossil fuels growing, but supplies are declining
· environmental degradation—cost to environment for producing toxins
· climate change—human activities are changing the climate
In terms of green IT, they said there were several areas where the field can contribute to solutions. The first was designing from “cradle to cradle” rather than “cradle to grave,” which also could include extending the average two-year life expectancy of laptops, cell phone, and mobile devices.
Other areas where IT can assist in becoming greener is by adapting wireless grid technologies to redirect access energy from one item to another, using software in place of hardware when possible, and creating innovative modeling software to reduce energy waste.
“While there are many factors to consider, the IT community plays a critical role in creating a sustainable, green future,” Ho said.
Developing a Joint EU-US Digital Library Curriculum
met Wednesday morning to talk about developing a joint European Union-United State digital library curriculum.
The Bologna Project, which was created in Europe and is dedicated to improving graduate education programs internationally, has started taking steps toward building these collaborative partnerships.
For example, in the past language and the variation of meaning in the same academic discipline even prevented joint courses from being taught in European countries. Now, they have changed the framework to focus more on learning outcomes so that people are clear what the objectives are and what skills will be taught, which translates across national borders.
In the United States, however, collaborative digital library courses often occur around common topics and among American Library Association accredited schools.
Also, digital libraries in the United States focus more on the cyberinfrastructure and information management related issues, while Europe is more interested in cultural heritage issues.
The panelists provided an update on the status of the efforts to develop joint EU-US Digital Library Curriculum, and invited others to become active with a group of the 10 American and European universities and institutions to help move this process forward.
Online Teaching Experiences
The group raised a variety of issues including the impact to content, social interactions, assessment, privacy, plagiarism, and learning styles.
Participants varied in their experiences when it came to campus-based students’ enjoyment and involvement in taking courses online. One school reported that its graduation rates were highest among students who both took campus-based and distance-learning courses.
Online learning works well in skill development courses and in stretching the amount of time for interactions among students and teacher beyond the traditional scheduled “class hours.”
Sharing work in a public online forum also tended to raise the bar for students. “If you know your peers will be checking your work, maybe you’ll try it a little harder,” Crowston said.
Participants that they had to find new ways of assessment as all quizzes and tests had to be “open book,” and most had done away with timed exams, opting instead for final projects that showcased the application of the knowledge acquired over the course of the semester.
Questions were raised about the definition of learning and knowledge. Is it mean being able to apply what you learn or be able to recall the information from memory?
“In the courses I teach, knowledge means being able to use tools,” Crowston said.
The group also discussed tools to detect plagiarism, which is easy to do with so much information available online.
"It's easier today for us to catch plagiarism than it is for students to do it," one participant concluded.
Tuesday, February 10, 2009
Ph.D posters
Benjamin Addom
Winner of the Best Poster Award
Automated Detection of Subject Area for Question Triage in Digital Reference
Keisuke Inoue
Computational Community Interest and Comments Centric Analysis Ranking
Xiaozhung Liu, Vadim Brzeski
Image-Enabled Discourse: A Preliminary Descriptive Investigation
Jaime Snyder
Group Maintenance Behaviors in the Decision-Making Styles of Self-Organizing Distributed Teams
Michael Scialdone (with Qing Li, Kevin Crowston, Robert Heckman)
Exploring Impacts on Older Adults' E-Services Usage
Johanna Birkland
The Value of Public Sector Information As a Strategic Resource to Civil Society Organizations' in South Africa: Evidence from the Fight to Eradicate Poverty
Raed M. Sharif
The Classification of Religion Topics in Wikipedia: Examining an Evolution
David M. Pimental
Interdisciplinary Diversity in the iSchool Community
Andrea Wiggins
The Impact of National Culture on Knowledge Sharing Activities in Global Virtual Collaboration: The Chinese Case
Kangning Wei
Exploring the Use of Ontological Relations in Information Retrieval
Miao Chen
Two Cans on a String: Technical, Social, and Legal Barriers to Effective Information Sharing Among Federal, Tribal, State, and Local Law Enforcement
Joseph Treglia
- How Does Web Advertising Affect Users' Information Seeking, Website Evaluation, and Source Evaluation?
Youngseek Kim
- The Theory of Trustworthiness Attribution for Countering Insider Threats for Virtual Organizations
Shuyuan Mary Ho
Insider threats and trustworthiness
Syracuse Ph.D. Shuayan Mary Ho seeks to understand this phenomenon and describe trustworthiness in a way that can be quantified.
Using student volunteers, she created a game within the Syracuse iSchool learning management system that tested the students’ perceptions of the trustworthiness of their team leader. The leader of each team had an extra 200 imaginary cash (MerryBux), and the game involved whether the leader shared the money or pocketed it.
A mole was planted to influence the teams’ behaviors, including wearing away people’s suspicions of their leader to see if they follow a predictive model. They did.
Leaders who showed an inconsistency between words and behavior received low scores from team members on trustworthiness. Over the course of the five-day scenario, some team members started planning to stage uprisings and oust the team leader.
Ho hopes to expand on this study and apply to other environments.
iSchools responding to man made catastrophes
The panelists outlined the areas in which they felt iSchools could contribute to dealing with these major catastrophes: modeling scenarios, prediction, mitigation, response, real-time synthesis, and human performance and training.
Pittsburgh iSchool Dean Ron Larsen described a project he worked on for the Department of Defense that sought to detect underground nuclear facilities. His role was to collect what he called second-order information—not using ground penetration radar, but rather tracking heavy equipment shipments or materials delivery. He stressed the iSchool’s holistic approach to problems—combining technical information with social and psychological information.
Liddy focused much of her comments on the role iSchools play in predicting and preventing these catastrophes by analyzing communications, such as e-mails, text messaging, and blogs through natural language processing.
“In these man-made extreme event scenarios, the police, defense, and intelligence communities frequently do have some means to anticipate such events, and thereby make them more predictable and therefore potentially more preventable,” Liddy said.
She talked about how researchers can develop and apply predictable models to this data to weed through the massive amounts of information to find the “needle in the haystack,” or expressions about a planned attack.
Natural language processing has gotten good at mining words with their denotative meanings, and now researchers are focusing on developing automated process to examine the connotative meaning of words and emotive words, Liddy said.
To do this, Liddy said researchers have to find public data from which they can study and build these models and technologies. The data from such cases as Enron are being used, as are data from open source developers who are building archives of e-mail exchanges, papers, and other communications relating to the development of that field.
Other panelists talked about the role psychology and international context can play in these extreme events. Panelists agreed that iSchools are the optimal source of research and solutions in these extreme events because iSchools excel in human-driven technology, information that needs to be processed by both humans and machines, and evaluating the usefulness/effectiveness of technology for humans.
Gaming in iSchools
Gaming enthusiasts and researchers representing geographic areas from Croatia to China to State College, Pennsylvania, gathered together to discover what others are doing in advancing gaming as increasingly significant field within iSchools.
Syracuse Professor Scott Nicholson and Associate Dean for Academic Affairs Ian MacInnes led the discussion and described their recent research interests as they relate to gaming.
Nicholson heads a $1 million project that is examining the use of gaming in libraries to attract new patrons, mainly teen-agers and adults without children, and create a community hub. He and his research team are creating tools to assess the use of games in libraries and will make those assessment tools available to librarians across the globe through an online form.
Their responses will feed the data pool, which then can be analyzed and returned to game developers and others about the demographics of gamers in libraries.
Nicholson reported how a local Syracuse library instituted 14 new gaming events over the course of a year and how that activity not only attracted teens to the library, but also how those young people formed relationships with senior citizens who also took up gaming at the library.
MacInnes said his interest in gaming stemmed from the monetization of virtual worlds and the business model that was developing for companies to participate in these new spaces. One such idea was the development of paid advertising within virtual worlds—avatars drinking Coca-Cola or wearing Ralph Lauren, for example.
Others, such Ph.D. student Joey Lee from Penn State were interested in designing games for education use. One of his projects involved creating a game that would educate people about Asian American identities and fighting stereotypes.
Another researcher created serious games about health issues, such as getting college bound students to get their shots by showing a dorm filled with creepy crawlers ready to infect them. The idea, she said, was to ridicule the gamers who had not gotten their shots and creating peer pressure to do so.
The group also brainstormed ways in which the iSchools could bring something unique to gaming that other disciplines might not be able to do. Ideas ranged from educational uses to collaborative design to influencing game development and other areas that bring together multiple disciplines and perspectives.
Are blogs and social networking sites fair game for researchers?
But what are the issues of ethics, privacy, and ownership that arise in harvesting this data?
People post information about themselves to sites like Facebook, LinkedIn, SecondLife, Twitter, and blogs—public sites with limited restrictions on access. So if people are willing to publish this information openly, can’t researchers use it?
It depends, according to participants involved in a session on online survey-based data collection led by Syracuse Associate Dean Jeff Stanton and Ph.D. student Aggie Kwiatkowska.
Several regulations, including the Family Educational Rights and Privacy Act (FERPA) and institutional review board (IRB) guidelines, limits the use of data—particularly qualitative information—that can be traced back to a specific individual.
Some researchers said they try to develop their own online communities with volunteers who are willing to participate, but the work and resources that go into building the community takes away from the research they hope to conduct in this space. It’s also a controlled environment as opposed to the more natural environments such as Facebook.
Another researcher raised the issue of why blogs can’t be quoted like any other published article or book, and another wondered if student work that is posted on a public space such as blog or web site can be used in research or if that violates IRB or FERPA rules.
Panelists said these questions are currently being answered on a case-by-case basis, and that there is no black and white when it comes to these emerging social networking spaces.
Can Internet access reduce corruption worldwide?
The more politically unstable a country, the more incidents of corruption there are, she said. As a country’s wealth increases, corruption decreases. As press within a country becomes more empowered and free, the incidents of corruption within that country decrease.
But when it came to Internet use, the results weren’t as clear. The results were all over the map. But why?
Garcia-Murillo suggested that in developing countries, the Internet is not considered a credible source. Many of these countries also have low rates of Internet use. Also, people are being overwhelmed with information, including information from governments. This information overload can distract people from noticing what information is missing or from finding the information that might show incongruities.
Illegal downloading among college students study
Syracuse iSchool Associate Dean for Research Jeff Stanton and Ph.D. student Isabelle Fagnot led a study at Syracuse University to find out. They interviewed a small sample of nine undergraduates to do some preliminary information gathering, and then conducted a larger anonymous paper survey of 164 students, and an even larger web-based survey of 404 students.
They asked students a series of questions hoping to determine whether they were downloading copyrighted material, uploading this material, or sharing files only with friends on an individual basis.
They discovered that about 3/4 of students were participating in peer-to-peer downloading, about ½ were downloading software, 1/3 were sharing with friends, and about 13 percent were uploading copyrighted content for others to download.
One of the most interesting findings of his study was that students who were most aware of the illegal nature of downloading copyrighted materials were also the most likely to engage in the behavior. Also, the better educated a student that he was in information security, the more likely he was to share files with his peers.
Stanton also asked students to suggest ways that the university can help prevent students from doing this, and passed that information along to university.
Attendees at the iConference also suggested ways that universities can prevent this, including following the library model, of licensing music that students could access.
Monday, February 9, 2009
Little eScience, Big eScience
Little eScience, on the other hand, involves perhaps only a couple researchers—a professor and a graduate assistant, and explore issues and new theories. The ICT issues for “Little eScience” researchers are different. These people generally are more protective of their data, and the tools and metadata they use vary from researcher to researcher.
Syracuse professors Steve Sawyer and Kevin Crowston and Ph.D. student Andrea Wiggins examined the differences between little and big eScience access to data, resources, and people, and suggested ways in which little eScience researchers could take steps to build their digital support systems.
For example, Wiggins suggested little eScientists create metadata standards, use analysis workflows, and build preprint repositories of their research. But she also said that there needs to be incentives and input of funding and human resources for these changes to occur.
The Pros and Cons of Automating the Tracking of Suspicious Behavior Online
Similar technology is currently being used to track Internet-users behavior online—what sites they visit, what they purchase, what they search for, and sometimes even where they’re located when using the Internet. But what is the feasibility of developing a national platform to flag suspicious behavior? What would be the social implications of such a technological solution?
Moderating by Syracuse doctoral students Joe Treglia and Shuyuan Mary Ho, a panel of intelligence, fraud detection, and academic experts discussed this notion of a national behavioral anomaly detection platform.
Treglia and Ho explained that the platform would provide a “statistical firewall” by creating a system of automated analysis of data indicating incidents of malicious behavior, patterns, or activities across a wide variety of industries. The system would employ spider technologies and data mining to pull relevant information from such sources as banks, telephone companies, airlines, and Internet service providers.
Much of the discussion focused on the public perception of such a tool and the threat it posed to individual privacy. Although some retailers currently track people’s behaviors online to better target their marketing without too much resistance from the public, participant doubted the public would be as permissive with law enforcement agencies collecting similar information.
For the information to be useful to a law enforcement agency, the data has to be tracked to a specific individual. The public would have to be aware and approve of such tracking, and even then, some question the ethics of doing so.
“I told my children that I would read their text logs, so they knew I’d be checking up on them,” Treglia said. “But I think halfway through the day, they forget about that. I think the same thing could happen here.”
Medical Informatics in iSchools
Transferring medical history information from pediatricians to adult-care physicians as well as from the parents to the patient presents medical informatics challenges. This example, presented by Syracuse Professor Carsten Osterlund, is one of many discussed in a roundtable discussion, iSchool Health and Medical Research Initiatives and Opportunities, on February 9.
With U.S. President Barack Obama pledging to fund projects in medical informatics and transferring paper records into electronic medical records, iSchool faculty and students were interested in sharing information and building relationships to support their research in this area.
Genetics, patient perception, collaborative information behavior in health care teams, aging, emergency medical management, community health information, pharmaceutical connections, accessibility and access technology, and social networking and gaming in medicine were all topics of interest to those in attendance.
Professor Ellen Detlefsen of the University of Pittsburgh outlined what she considered to be “success factors” in building medical informatics research projects, including:
· One or more full-time faculty members focused on health information
· A medical or health science faculty nearby, preferably within a medical school
· Access to large academic health sciences library
· Other medical informatics research underway within the same university
· Personal, professional, and electronic links among the previous four factors
Associate Dean of Rutger’s iSchool Hartmut Mokros and Professor Madhu Reddy of Penn State said one of the challenges is understanding the language used in health information and finding the parallels to your research interests. Each discipline or field of medicine has its own language, so Mokros suggested focusing on the problem to find collaborations, rather than the discipline.
“I noticed there’s a lot of interest at the dean’s level and maybe a few Ph.D. students,” Osterlund said. “I bet there’s a lot of faculty here that didn’t come because they don’t see themselves in ‘medical informatics.’”
Faculty avoid labeling themselves, so the field within the iSchool needs to define itself as something broader than medicine, presenters said. These medical informatics projects pull together security, sociotechnology, information retrieval, information architecture, and information management, among many others of interest to iSchool faculty members.
Osterlund suggested that the iSchools create some form of formal connection around this topic—whether that is themed around funding proposals, or social networking on Facebook or elsewhere. It was then suggested to include medical informatics programs that are not located within iSchools, or making joint appointments with these individuals to iSchool faculties.
UNC Chancellor Holden Thorp examines the way universities select faculty
Thorp suggests that leadership, entrepreneurial thinking, and an institutional mindset are three key ingredients that makeup the 21st century knowledge worker.
He outlined his definition of leadership to include:
- being able to articulate the problem you’re interested in studying or the field you’ll be leading, why it’s worthwhile, and why it’s challenging
- getting resources to succeed
- being able to help people in and out of organization
- keeping your head in crisis
Then we went on to explain what he means by "entrepreneurial thinking." This doesn't necessarily mean creating new businesses, rather Thorp says it means being more committed to an idea than the process, looking for the next problem to solve, breaking through academic silos, and taking advantage of opportunities to pursue an idea.
Thorp said another necessary trait of a 21st century knowledge worker involves the ability to create an institutional mindset. To do this, one must put the common good in front of protecting personal interests, have a diverse decision-making teams, and promote people based on their ability to work "between the silos" or between divisions in the organization.
In the current economy of tightening state budgets and with venture capitalists retracting from new projects, Thorp said he sees a silver lining. Universities, particularly their graduate programs, are seeing increases in the application pools and the millennial generation filling classrooms are more committed to creativity and public service. President Obama has promised new funding for science, health care, energy, and higher education.
"I'm extremely optimistic about what our students will do when they graduate."
He concluded by questioning the current criteria most universities use to select its faculty members, and suggested that they need to value other characteristics, including teamwork, crisis management, perserverance, people skills, institutional mindset, and compassion.
Following his presentation, he answered questions ranging from how to promote interdisciplinary work to discussing the value of liberals arts education versus job preparation programs.
Most great leaders--from UNC and others--are mostly liberal arts majors, Thorp said. Liberal arts education is American, and some would argue it is the reason why the country is most of the most innovative in the world, he said.
Monday, February 2, 2009
Syracuse iSchool faculty and students are well represented at the 2009 iConference
Syracuse University iSchool members will be presenting on a range of topics in 15 sessions throughout the conference. Their papers and presentations will explore such subjects as gaming, privacy and trust, intellectual property, international information issues, green IT, and national security, among other areas.
Thirteen Syracuse iSchool doctoral students will be among the 77 selected to present posters this year. The posters showcase the students’ groundbreaking research on a variety of issues, including national culture and knowledge sharing, older adults and e-literacy, web advertising and impact on information seeking, online collaboration and group dynamics, search engine technologies, information sharing among law enforcement agencies, and information access and government.
The 2009 iConference opens with a Doctoral Colloquium that brings together Ph.D. students from of iSchool-related disciplines and iSchool faculty to gather feedback and generate discussions about their current research projects or thesis work. At the same time, the conference is sponsoring a Junior Faculty Mentoring Session for tenure-track faculty to meet with senior iSchool faculty, including Syracuse’s Martha Garcia-Murillo and Ping Zhang, and have informal dialogue about emerging intellectual communities within the information field.
The following day, participants will hear from Jose-Marie Griffiths, dean of the School of Information and Library Science at UNC, and UNC Chancellor Holden Thorp, who will deliver the opening plenary presentation. The closing plenary presentation features Edward Seidel, director of the National Science Foundation’s Office of Cyberinfrastructure and Floating Point Systems Professor in Louisiana State University’s Department of Physics.
At the conclusion of the conference, Syracuse Professor Steve Sawyer and his co-organizers will lead a four-hour workshop on “The Science of Socio-Technical Systems in iSchools.” The workshop hopes to explore and begin to frame a future research agenda based on socio-technical research in the information field.
The 2009 iConference is sponsored by the National Science Foundation and organized by the iCaucus, a group of information schools from the United States and Canada dedicated to exploring the relationship of information, technology, and people, and to advancing the understanding of the role of information in human endeavors. For more information, visit http://www.ischools.org/iconferences/2009index/.