Showing posts with label digital identity. Show all posts
Showing posts with label digital identity. Show all posts

Thursday, 10 November 2011

Double or quits

There are several things I have already learnt as a part of the Twitter dual identity experiment I'm conducting. For those of you who may have missed it, I now have two Twitter accounts; the well established @timbuckteeth account (read about the history of that here) and the 'new' @stevewheeler account (which has my real profile picture and name attached). The latter was a 'sleeper' account I have had for a while, and activated to see what would happen. Several useful and interesting comments have already been received which you can read in yesterday's post Double Agent.

The first thing I have noticed is that because the @stevewheeler account is only following a few other Twitter accounts, it is easier to distinguish the signal from the noise. The @timbuckteeth account follows in excess of 1300 other accounts, and it's sometimes difficult to see the wood for the trees. I have discovered that only following a few influential accounts using the @stevewheeler account, I can more easily pick out the best stuff and RT it. Because the @timbuckteeth account is followed by a lot more accounts (almost 10,000) it is then simple to RT the @stevewheeler tweet, to amplify important messages still further over the @timbuckteeth community.

One or two have complained already that this is 'ego retweeting'. I disagree. For me it's amplification. Interestingly I hadn't actually heard of 'ego retweeting' before it was mentioned, but I would counter that this is not about ego, it's about finding interesting items and links that might be also of interest to the community and then sharing them more widely. A few have threatened to unfollow my accounts because of what they perceive as excessive retweeting between the accounts. Some may already have done so. I have responded that I don't mind if they do, because ultimately, all of the data gathered is useful, including details of whether people decide to follow or unfollow one or both accounts. If they are able to tell me why they decided to do so, that would be even better, giving me a clearer picture of the effect of multiple accounts.

Some tweeps have told me that they hadn't made the link between my blog and my @timbuckteeth account. Others admitted that they didn't realise I was behind the @timbuckteeth account. This suggests that some of what we do online could be superficial or that perhaps we don't always check the source or provenance of our information before we share it onwards. Anonymity is seemingly still a pervasive feature of our digital lives, and we don't always take account of it. The picture above is a little ironic, given that some on Twitter have said they are not sure what the difference is, and what will 'Steve' tweet that will be different to 'Tim'?

Some have commented that digital identity is not just about the names and the profile pictures you use, it's also about how you interact and the context of your interaction. Yes, of course. Yet first impressions are important. I'm therefore interested in how people represent themselves up front, and whether this attracts others to interact with them or avoid them. Do comedy names or humorous pictures attract or repel? How seriously do people take social networking tools such as Twitter? How many others have multiple accounts and how do they use them to interact, and thereby develop their digital identity and presence online?

OK, I know I'm not the first person to use multiple accounts on Twitter, but the reason I'm doing it right now is not to divide up my life into different spheres of activity like many tweeps do with their dual accounts ("my A account is for work and my B account is for fun"). No, I am going to tweet the same stuff from both accounts and see what people actually do with it. A research question investigating digital identity might be phrased as: Are people more willing to follow an account that respresents its owner transparently?

So there you have it. I'm having a lot of fun playing with identity and the experiment is set to continue for a while. The @timbuckteeth account will continue on regardless, because it has, in the words of one of my Twitter pals, become a sort of brand. For the record, I'm not sure what to do with the @stevewheeler account once the experiment is over. Should I continue it? Or does anyone want a spare account, one previous owner, going cheap?

Image source (modified)


Creative Commons Licence
Double or quits by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Wednesday, 9 November 2011

Double agent

The emergence yesterday of my 'real self' on Twitter (@stevewheeler) caused some confusion and consternation for some tweeps. It came about because of my question about whether people were called by their own names or by their Twitter names (if these were different). I was interested in whether people could separate out one's own personal identity from the digital identity we assume when we are engaged in online discussions.

The appearance of the 'second account' may have caused some confusion, and perhaps some are questioning my sanity, but in truth, I admit that I have already had four Twitter accounts for some time now. Not all have been active, and some are used only occasionally. There is method in my 'madness' though. You see, one of my great research interests is digital identity, and I'm especially interested in how we manage our online presence and engagement. Twitter is one of several tools I use to explore this concept. I have blogged previously on the topic here: (Identity in a digital age), and have also discussed our ability to manage multiple identities online (hence the multiple accounts), and I even blogged as recently as yesterday to tell the story behind the avatar image and name of @timbuckteeth (He's only me). Because I am interested in digital identity, I made a decision as soon as I subscribed to Twitter to explore. I decided I would like to experiment with the tool to see what the boundaries were in terms of online presence and identity, and also anonymity.

So I created an account with the contrived name of @timbuckteeth and an incognito profile picture to accompany it. Initially I had the idea that it should be an anonymous account, but it turned out to be something quite different, and it seems it has developed independently to my own actions. I have been experimenting since December 2007 with the @timbuckteeth account. I did create a second account @stevewheeler with my real picture a short while later, but it was a 'sleeper agent', ready to be activated at an appropriate point in time. Then, writing as @timbuckteeth I began to explore Twitter, and to experiment with all the possibilities. The person behind @timbuckteeth could not remain anonymous forever, so I gave up the pretense. Eventually @timbuckteeth became synonymous with my own professional and personal life online, and I think most people who know me, or follow my work, now combine the two identities into one - as you will see in a moment. There were of course one or two exceptions:




In four years of continuous use, the account of @timbuckteeth has enabled me to send out more than 32,000 tweets, has appeared on almost 1000 user choice lists, has followed in excess of 1,300 people, and has attracted a following of almost 10,000 Twitter friends. Notice I am not referring to them as 'my followers' - rather, I like to think that they follow the brand that is @timbuckteeth. Yesterday, after posting the 'He's only me' post, I posted out a question on Twitter:


Within seconds I received back a few interesting responses and some words of advice from some of those who follow the @timbuckteeth account and were concerned I might ditch it, or who were interested in seeing what would happen next:



Bearing Don Taylor's comments in mind, I then activated the @stevewheeler account to see what would happen next. What was the deal with 'name recognition'? The first interesting thing I noticed was that some of the hundred or so people who have followed this account in the last 24 hours are people I know, but who have never previously followed my @timbuckteeth account. Were they people who did not know I was behind the @timbuckteeth account? The sudden appearance of the 'real me' account yesterday also provoked some interesting comments from several old Twitter friends. Some expressed concern, while others advised me not to keep two accounts. Some even suggested (probably tongue in cheek) that @timbuckteeth was the real me, and that @stevewheeler was actually an imposter.




Notice that the last tweet refers to me as 'Tim', a name some people (including one or two of my students) have also called me in real life. It intrigues me to think that in this instance, and probably in many others too, people seem to become so habituated in engaging with your digital self (no matter how false or contrived it may be) that they eventually have difficulty separating it out from the 'real you'. I plan to write more on this episode, and about what I have learnt from my experiment so far, in my next blog post. Your comments, as ever, are most welcome.

Tomorrow: Double or quits

Image source


Creative Commons Licence
Double agent by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Tuesday, 8 November 2011

He's only me

Several people have recently asked why I use the name Timbuckteeth on TwitterFlickr and Slideshare. Others have asked me about my use of the blue astronaut picture as my Twitter profile picture. Well, here it is - my response to those questions. Let me tell you about the way I manage my digital identity. I hope it resonates with you....

Timbuckteeth is a word play on Timbuktu - a town in the African state of Mali. In ancient times Timbuktu was both an intellectual and spiritual centre and a meeting place for many nomadic tribes and was located at the intersection of two great trade routes. It was quite simply the place to be. For me, writing blogs and tweets, academic papers, poems or fiction, or indeed anything that other people are likely to read (and I have done them all), requires that you are either intellectual or thoughtful in your approach, or spiritually aware (and hopefully both). I strive in some way to bring both of these attributes to my writing, whether it is an 8,000 word book chapter, or a 140 character tweet. And like Timbuktu, I want my blogs, tweets and other writing to represent places people want to come to visit, where they can egage with the ideas, be challenged, inspired and ultimately, where they will learn something new. And if this paragraph is seen by any readers as pretentious claptrap, I will simply say that in all honesty, I want my blogs and tweets to have some 'bite'

That I hope explains the name, but how do I explain the blue astronaut? Blue has always been my favourite colour (don't know why, don't care really), but when the profile picture comes up on say a Twitter wall at a conference, it is easily recognisable because it stands out. The sunglasses are quite random. But all of this is mere trivia. The image itself is a little more meaningful. It is esoteric, yet still holds significance for me - and it's all about dates. Science fiction writer Arthur C. Clarke is involved (the astronaut image is lifted directly from the Stanley Kubrick film '2001: A Space Odyssey' - an adaptation from one of Clarke's novels - the blue astronaut is the actor Keir Dullea). So is the concept of satellites. (See the connection yet?) In 1945 Clarke proposed the idea of geosynchronous satellites. His vision was not long in realisation because just over a decade later on 4th October, 1957 the first satellite - Sputnik - was successfully launched, ushering in the global communication revolution. The day, the month and the year of Sputnik are all significant to me. You see, I was born in 1957 (I'm the same age as Sputnik, but we did not attend school together), and I was married on 4th October (in 1986). When Arthur C. Clarke died on 19th of March 2008, it was a sad day for me, but it was shortly after this that Timbuckteeth was born, and from that moment on my tweeting, slidesharing and flickring and other online presence has been managed under this identity. 


A lot was discussed around the idea of digital identity at Online Educa Berlin a couple of years ago. The important ideas that came from these discussions for me was that digital identity - they way you represent yourself in digital environments, is an extension of some essence of your persona. You digital identity is your vicarious presence in that place where you are unable to be physically embodied, but where your emotional bandwidth can still be fully exploited. Digital identity has elements of your personal life and memories invested in it, and is the way other people online view you, so it should bear some personal significance for you. To borrow from Erving Goffman, digital identity becomes the channel through which you manage your impression and present yourself in everyday (online) life. So Timbuckteeth is a growing part of my digital identity and will be with me for a while yet, because after all.... he's only me. 


Tomorrow: Double agents

Creative Commons Licence
He's only me by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Wednesday, 5 October 2011

Identity play

I have just spent a very interesting two hours with members of staff and researchers of the Open University of Catalonia today here in beautiful Barcelona. Tomorrow I will be giving the opening keynote at the 8th International Seminar on Teacher Training, but as a precursor, I was invited to meet some of the OUC team. And so I sat and talked in a relaxed but thoughtful atmosphere with some impressive young academics earlier today. We discussed a lot of issues related to distance education and technology mediated learning, including digital identity, social media and open scholarship. Many of the ensuing discussion and questions kept me on my toes, and provoked us all to reconsider our roles as educators in the digital age. It was digital identity though, that most of the group were interested in, and kept returning to talk about.

One of the things the group wanted to discuss was this blog and the way I use it to not only disseminate my ideas, but also as a tool for research. We talked about taking risks, and playing with digital identity. Do we present ourselves differently online to real space? What do we share on the web and what should we keep private? We analysed why I had posted yesterdays story about my Silver Wedding Anniversary, and what were the potential issues with such a public performance of a personal celebration. Someone also wanted to know why I displayed badges on my blog. I responded that it is a measure of peer esteem, which may help some readers to determine whether a site is trustworthy or not. Alternatively, I display them because I am grateful to my own academic community for the way they continue to support this blog (and others) by continually returning to read more. When they vote for my blog as one of the best (and competition is very stiff now, with many excellent e-learning blogs out there), then I feel my work and effort has been worth something.

So, when I returned to my hotel just now and found another award badge waiting for me to display on my blog - this time from the e-Learning Council - it was a welcome addition to the peer reviews I have already received. Thank you to everyone who voted to place me among such an illustrious company. Here's the full list of the top ten (it's actually a top 11).

1. Jane Hart
2. Elliott Masie
3. Cathy Moore
4. (tie) Harold Jarche
4. (tie) Jane Bozarth
5. Steve Wheeler
6. Tom Kuhlmann and Dave Anderson
7. Clark Quinn
8. Clive Shepherd
9. David Kelly
10. Tony Karrer

Perhaps the display of these badges adds something to my digital identity? Who knows...


Creative Commons License
Identity play by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Saturday, 30 April 2011

Identity in a digital age

Much of my understanding of digital identity was founded in my studies into personal identity, whilst a student of social psychology. The work of William James and George Herbert Mead influenced my thinking, as did the study of sociologist Charles Cooley into 'the Looking Glass Self.' Essentially, in this hybrid early school of social psychology, known as symbolic interactionism, theorists tried to explain the influence of audiences/other people on the behaviour of individuals. It was a fluid theory that allowed for behavioural adjustments on the fly, as people saw themselves 'reflected in the eyes of the other' - the impact of what they were saying - as they conversed. Therefore, 'in order to develop and shape behavior, interactions with others must exist. People gain their identity and form their habits by looking at themselves through the perception of society and other people they interact with.' (New World Encyclopedia)

I did some research of my own back in the 90s based on the presentation of self in everyday life. Those who are familiar with the work of the social anthropologist Erving Goffman will recognise this as the title of one of his seminal works. Goffman saw social interaction as a drama performance, in which the actor's behaviour was framed by front stage and back stage roles, scripts, props and costumes. One of the most important, but often ignored features of Goffman's Dramaturgical Model is the presence of an audience, to which the actor consciously (or unconsciously) performs. This has great import in our understanding of how we perform to audiences in social media (of which more later in this post).

The research I conducted in 1994 involved a small team of psychology students and one of my friends, the actor and TV personality Matthew Kelly. Now a successful actor of stage and film, during the 1990s Matthew appeared on everyone's TV screens several times a week and was instantly recognisable. He was ideal for the study and when invited, he agreed to take part. We wanted to test out our ideas on the 'celebrity effect' in which people change their behaviour when they meet face to face with a famous person. In today's celebrity soaked society, where in Andy Warhol's terms 'anyone can be famous for 15 minutes', we are perhaps living in what Malcolm MacLaren dubbed 'the Karoake culture.' This means that just about anywhere, at any time, without warning, anyone can bump into a celebrity - there are enough of them about. Although it's possible, it's not probable, but there are occasions when this happens with no warning and no preparation, and you find yourself looking at a well known face. In such situations, people behave differently. They stare. Or they deliberately avoid staring. Either way, they know that they are sharing a space with a famous person, and can't help behaving differently. I was intrigued as to why this should be.

So we set up and conducted a naturalistic series of experiments in the high street of an English City. We wanted to know if, as Isen and Levin (1972) predicted, people would be more likely to help others if they felt good themselves. There was also research to suggest that helping behaviour increased depending on the status and influence of those present (Latane & Harkins, 1976). My study went something like this: In the experimental condition, two of us walked into a shop and posed as customers. A minute later, one of our team, an unknown person, walked into the shop accompanied by Matthew Kelly, and made straight for the counter. The unknown person showed the shop assistant a £10 note and asked if s/he could help by giving him some change from the till so he could make an urgent call home (this was in the days before mobile phones). We observed the interactions and timed the conversation. In a control condition, we also performed the same situation where two unknown people walked into similar matched stores and acted out the same scene. This same scenario was acted out 11 times for each of the conditions. We analysed the data from the 22 shops and saw immediately that there was a marked difference between the experimental (famous) and control (unknown) conditions.

In the control condition, our team was refused help (told they could not have change unless they purchased something) on 6 out of 11 occasions, and minimal interaction was observed between the unknown people and the shop assistant. In the experimental condition, on every occasion, the famous person and his partner were helped. If the shop assistants couldn't open the till, they found the change from their own pockets/purses or those of their colleagues'. Another interesting effect was that on each occasion, although the only speaking person was the unknown person, the shop assistants were observed answering Matthew Kelly, and maintained eye contact with him rather than the speaker. The unknown person was virtually ignored, even though he had initiated the conversation and was doing all the talking. Non verbal interactions such as smiling and nodding were also more numerous in the experimental condition than in the control condition, where minimal or no eye contact was observed between the shop assistant and the two unknown people.

From these statistically significant results (p<.005), I theorised that (in Goffman's terms) shop assistants who were in their rule bound front stage roles (e.g. I must not open my till to give change unless someone has made a purchase, because the note may be a forgery), were forced into back stage (relaxed and informal) roles prompted by a pleasant surprise. They broke their own rules, because they recognised the famous person (someone who perhaps they had seen often in their back stage informal roles in their own living rooms) and behaved in a way that was incompatible with the rules they would follow in their front stage, official and formal roles.

In my conclusions I noted: "The celebrity effect has obvious consequences for the promotion of pro-social behaviour. Front stage roles (rules) are subjugated by the desire of the actor (shop assistant) to appear helpful and pleasant to the well-known person. However, this helping behaviour occurs at the expense of anyone else who happens to be nearby. Attention is focused on the famous person, while the requests from others, although not ignored, become marginalised".

Applying this research in today's digital world, I wonder what the presentation of self in a social media world would entail. Applying Goffman's theory to the performance spaces of social media, we could cast a spotlight on videosharing services such as Youtube and text based performace spaces such as traditional blogs. Do bloggers see themselves as interacting with their audiences in a front stage context? If they do, then they will possibly be more guarded and less personable, avoiding as much self-disclosure as they can? On the other hand, if bloggers see themselves as performing in a less formal space, in a more relaxed style, are they then back-stage? Do they then feel licensed to self-disclose more personal information about themselves, or share their emotions, their beliefs? Perhaps the questions should be framed the other way around? Does self disclosure and informal sharing of personal information push bloggers into a back stage role, and what is it that enables some to do this? Is it the pleasant experience of having a large appreciative audience? One more question springs to mind - are bloggers who disclose information about themselves of a personal nature more readable (and more personable) than those who write whilst remaining in a front stage, formal role? These and other related research questions are of course, up for grabs for someone to investigate.

References

Cooley, C. H. (1918) Social Process. New York: Charles Scribner's Sons.

Goffman, E. (1959) The presentation of self in everyday life. New York: Anchor Books.

Isen, A. M. and Levin, P. F. (1972) Effects of feeling good on helping: Cookies and kindness. Journal of Personality and Social Psychology, 21(3), 381-8.

Latane, B. and Harkins, S. G. (1976) A multiplicative power function of audience size and status. In R. L. Atkinson, R. C. Atkinson, Smith, E. E., Bem, D. J. and Hilgard, E. R. (1990) Introduction to Psychology, 10th Edition. San Fransciso, CA: Harcourt Brace Jovanovich.

Image source by Ocadotony

Creative Commons Licence
Identity in a digital age by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Wednesday, 27 April 2011

...before the ink is dry

Had a great conversation at lunch today with Peps McCrea over at the University of Brighton. We were talking about our common interest in the educational benefits of blogging, and I made a suggestion that digital identity was a significant factor in the way teachers and other professionals use it (I will blog on this idea in a future post). I expanded by talking about my own use of blogging. I had to examine my own motives which I have already reflected on in previous posts such as Why do I bother? So what are my reasons for expending so much of my time on blogging?

Essentially, I blog not just because I want my ideas to be shared as quickly as possible, but also to receive feedback in the form of discussion. Journal articles take so long to publish, they are often out of date long before the ink is dry. This is because they go through a process of peer review and revision, and then they can hit a brickwall if the journal has a significant backlog of accepted papers, and a page count limit (which most do). I know that peer reviewed academic journals are the lifeblood of the Research Excellence Framework (REF) which comes around every few years (and by which all participating universities are judged on the quality of their research outputs, and subsequently awarded money for more research). I know that great store is placed on high impact journals in th REF and there is always a mad scramble at this time in the cycle, where everyone is submitting articles in the hope they will be published before the deadline. But how much value is there really to be had in publishing articles in high impact, double blind, peer reviewed academic journals beyond the REF? You have to be in it to win it, but the general rule of thumb is that the best research institutes scoop up the lion's share of the cash each time, and the rest are left to grab for the crumbs. An enormous amount of energy and time is taken up during the submission process, often with little or no reward to show at the end.

Here's something else to consider: How many people actually read your journal article when it's finally published, either in paper format or on the journal's webpages? The journals we are talking about here are almost all paywall journals - if your institution doesn't have a subscription and you are not in the mega-rich academic club (and let's face it, who is?) then you are unlikely to be able to read it, and neither are many others. Will publishing in a high impact journal ensure that you are promoted? Possibly, but not probably, as many academics have discovered. How about some monetary reward? Not a hope of that, sunshine - the publishers have tied that one up at both ends. In some business models, they even get you to pay for the priviledge of publishing in their journal. Nice trick if you can do it. If I was to be cynical, I might suggest that the publishing houses have conspired to convince academics that they should spend inordinate amounts of their time dreaming up research ideas, running their experiments and studies, and sweating and toiling over the write up of the research, before giving it away for free so that the publisher can then make a lot of money out of it.

For me, and for an increasing number of fellow academics, publishing in traditional journals is becoming increasingly anacronistic in the digital age of social media communication. We can be our own publishers now. We can build up audiences and loyal followings that are larger than most journals and publishing houses could ever boast. For me, blogging is now the first place I consider when I want to disseminate my ideas quickly, directly to my own community of practice, and in a form that is considered relevant and accessible to those who are engaged in that particular sphere of activity. Blogging is freely accessible, and it is usually concise enough to be assimilated in a few minutes.

Please don't misundertand me - I am not totally dismissing the place of the academic peer reviewed journal. Heavens, I'm an editor of a major learning technology journal, and if I believed they were totally irrelevant, I would resign immediately. No, journals still have their place. What I am arguing here is that the blog is a more rapid, concise and appropriate medium to disseminate important ideas, and it is also a better environment within which to engage critically with colleagues to discuss, argue and otherwise develop a discourse around the subjects in question. I have seen some journals attempting dialogue between protagonists occasionally, but often the result is a stilted, and seemingly contrived dialogue which is somewhat divorced from real-time, real-world conversations. How is the blog different? For me, the blog is an interactive record of ideas; an open archive of opposing viewpoints; a meeting place for live discussion; a repository of thoughts; a testing ground; a launching pad; a dynamic environment within which disagreement can sit comfortably with accord; a fertile ground for the planting and growing of disparate content.

Image source by Hakan Dahlstrom

Creative Commons Licence
...before the ink is dry by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Saturday, 5 February 2011

Dear elearning101...

Every so often, someone who 'wishes to remain anonymous' slithers out from under a stone to post a few destructive or malicious comments on someone else's blog, vandalises a wiki page (like 'Furballer' did recently) or hacks into a site. Sometimes the comments are quite clever. More often though, they are simply meant to hurt, damage or undermine. The perpetrator hides behind their anonymity because they wouldn't have the courage to say the same thing to a person's face. It's so easy to be anonymous on the web. Then you can say exactly what you want to say, and suffer no personal consequences, because there's no come back. Right? Er... wrong. Let me introduce you all to 'elearning101' (whoever he or she may be), and point you in the direction of their recent post on my Slideshare site. This is what elearning101 wrote:

"Another rehash of the same old stuff. Is this really what passes off as a keynote nowadays? Any chance of of evidence rather than a load of hyperbole. This is just a list of ideas loosely thrown together without any examples, evaluation or evidence Can anyone explain what a CC Steve Wheeler licence is? Does the author have his own version of Creative Commons?"

This was posted in response to a slideset several people asked me to share after they heard my keynote presentation in Germany for the LearnTEC Conference. I don't want to make a big fuss out of this, or act like a wounded victim, because I'm not. I'm big enough and old enough not to worry too much about a few negative comments. The positive comments I receive about my work far outnumber the negative, abusive or disparaging ones. No, instead I want to point out that posting anonymous rude comments on someone else's site is unacceptable. For me, it's a form of cyber bullying. I won't stand for it, and neither should you. I'm writing this blogpost because I want to bring such behaviour out into the open. In so doing I hope the community of practice I value, the readers of this blog, and those who are as passionate as me about learning and technology can read, be aware, assess and otherwise discuss the implications of it.

Here's what I wrote in response to elearning101 on my Slideshare site:

"Wow, thanks for your comments elearning101 - if that is your real name. :-D Unfortunately, your comments don’t really bear any resemblance to reality and I’m almost certain you wouldn’t be bold enough to say this to my face. Agreed, some of the slides have been used before in previous presentations, but the content and message were specific to the audience at LearnTEC so I repurposed some of them appropriately.

Ask anyone who attended for their comments and feedback and I think you will find they would be all very positive, and we had a lot of constructive dialogue afterwards. That has to be worth something? I would like to discuss this with you without you hiding behind your shroud of anonymity sometime perhaps... I’m open to criticism, when people are honest with their identities, and then perhaps your comments might actually carry some weight."

Ironically, since I posted the slideshow, it has received over 1500 hits in 24 hours. Not bad for a slideshow filled with hyperbole and a lack of examples, evaluation and evidence eh? I would also like to ask this: How does elearning101 know that my talk was all hyperbole and lacking evidence? Answer - they don't, unless they were in the audience. Then they would have heard the evidence I cited from my own recent studies into my students' use of social media. I will also say this (although I doubt very much if elearning101 will dare to reveal their true identity, especially now I have made their activity public). I repeat my challenge to elearning101 to discuss with me why s/he thinks my slides are valueless. They actually make a valid point about the Creative Commons licence - I failed to post the final slide which tells viewers exactly which licence I selected - a share alike, non-commercial licence. Shame, because these kinds of argument would hold more water if these anonymous commenters provide their real name. I would also like to hear if elearning101 or anyone like them has ever been up to their tricks on anyone else's sites. What is the extent of this kind of anonymous commenting? I'm well aware that elearning101 has been active on other sites, including Wikipedia, so watch out - your website could be next.

Please don't misunderstand me, I'm open to any amount of criticism, as long as it is constructive and is given without spite. Tell me what is wrong but then tell me what you think I could do to improve it. I learn a lot from the feedback of my own personal learning network. When it's anonymous and destructive though, I think the writer forfeits their right to be taken seriously. But I also wonder what you think as you read this? I welcome comments from anyone (including elearning101 of course) on this incident, but please identify yourself if you are able to. Have you experienced the same or similar? What are your views on such incidents? And what are the implications for us all as an online community?

Image source by Jeff the Trojan

Creative Commons Licence
Dear elearning101... by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Wednesday, 15 December 2010

Multiple identities

Who am I? What is my online persona? Do I present myself as the same in every situation? What do I change about me when I find myself in an unfamiliar context? How do I act differently when I'm in a reduced social cue context such as text based communication? These and many other questions are currently being addressed by researchers who are interested in the study of digital identity. It's a growth area of research for at least one very good reason. Digital identity affects us all, no matter what our age or social-economic background we come from. Technology mediated communication and pervasive computing affect everyone in the Western industrialised world. Without it we couldn't pay our bills, access information or travel distances. We rely on digital media for learning, business, entertainment and a host of other daily activities. Without knowing it, when we interact with these technologies, our behaviour changes. But there are many questions: Is my behaviour dictated by my identity? Or does my identity change because my behaviour does? Does my identity change when I am on Facebook? Do I modify my speech or the way I present myself when I'm speaking on the telephone, or on Instant Messaging, or Skype, or a webcam link? When I post up a blog, how different is that style of writing to the style I would use in say, an e-mail? Or a collaborative environment such as a wiki? And does my Second Life avatar bear any resemblance to my real life persona at all?

Dave Birch thinks there is huge scope for individuals to maintain multiple identities in cyberspace. In an interesting piece called Put your game face on, Birch points out that anonymity can enable people to reveal as much or as little of their true identity as they wish, and that this kind of false identity maintenance can lead to questionable or even dangerous behaviour. This has obvious implications for child safety.

And what of the image above? Well, yes, the pictures above are of me on my Flickr site (with a little image manipulation too, for this blogpost), and some are of me with famous British entertainers such as Matthew Kelly and Johnny Ball and well known American authors and educators such as Steven Berlin Johnson and Marc Prensky. You're probably thinking now that I spend my time seeking out celebrities to have my pictures taken with them. But the truth is, I was at the same events, got talking, and it was nice to have a picture taken to mark the occasion. All except Matthew Kelly that is. We spent time at university together and we are old friends. Together, we once did a psychology field experiment where we walked Matthew (he was already famous then) into several shops unannounced, to ask for change for a £20 note, and then observed the behaviour of the shop assistants. They changed considerably, even to the point where they broke shop rules by handing over change for a £20 note when no purchase had been made. If they couldn't get the cash register open, they were opening their own purses and wallets to hand over the change. Most interestingly, when asked a question by the unknown person, the shop assistants were all observed to answer Matthew Kelly instead. Their behaviour definitely changed. We did a control experiment with two unknown people and were almost thrown out of shops or largely ignored. My explanation for this behaviour was based on Erving Goffman's dramaturgical theory in that we forced them from front stage (professional rule bound role) to back stage (relaxed and informal role) so that they broke their own rules because they had been pleasantly surprised. This celebrity effect is just one way we see changes in behaviour. If someone famous walks into the room, we stare. Or we purposefully don't stare. Either way, our behaviour is being modified. Whether or not this causes us to adopt different identities has yet to be established. But this we do know - everyone is capable of acting out multiple identities - to suit the changing environments and shifting contexts modern life presents.

Creative Commons Licence
Multiple identities by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Friday, 26 November 2010

Digital literacy 4: Watch your back!

I'm always asking myself the question - what do my students need to know to be able to use the web effectively? One of the important skills I identified in a previous post on digital literacies is how people manage and protect their privacy. This is aligned to e-safety, which is about protecting people online. Indeed, each of us is vulnerable because there is a huge potential for our privacy to be breached in any online environment. You would certainly be very angry if someone came snooping around your house and rifled through your personal belongings, wouldn't you? And yet many of us can be careless about the way we handle our personal data when we go online. And the extent to which many of us are now electronically connected to others is astounding.

This begs the question - can any of us protect our privacy on the web? Social media seem increasingly pervasive, and many millions of people put up details of their private lives every day - contact details, personal photographs, dates of birth etc - details they would never dream of giving to a stranger. Oh look, there's someone I haven't met before. Hellooo. I'm going to go up to them and give them my phone number and address, some photos of me on holiday in my swimwear, a list of my best friends and my date of birth! Oh, and they can have my credit card details too while I'm at it! Would anyone do that, even if they were very extremely attracted? It would be bizarre behaviour. And yet people do exactly that every day online. I'm amazed at the photos some students put up on social network sites. It's not just pictures of them falling out of a pub at 3 o'clock in the morning, it may also be pics of their friends too. With their permission or not? I wonder if they will still be happy about those photos in a few year's time when they apply for a job, and their potential employer Googles them to see who they are.

For me it's all a matter of choice. How many of your personal details you make available on the web is really up to you. Your privacy settings may help you to protect stuff. but even if you know how to choose the correct settings (and many students don't) how can you be really certain that your content is fully protected from prying eyes? Posting up your home address and telephone number, and then posting in your timeline that you are going on holiday next week, might be asking for trouble. How do you know who has access to your timeline? How do you know how many people read your Twitter feed or your updates?

You also leave a trail behind you wherever you go on the Internet. Google and other search engines maintain a record of all the sites you visit during your time online. Many sites send cookies to your pc when you enter them. Some of these can be malicious, allowing other people to gain access to your pc memory, and if spyware has been used, to also record your keystrokes when you pay for something on Amazon using your credit card. Although it's still quite rare for this to happen, this kind of criminal activity is on the increase, and without appropriate Internet Security software, you run the risk of being one of the victims. Have you thought about the amount of personal detail you hold about yourself and your friends on your mobile phone? If you use public wifi networks or open your mobile to bluetooth connectivity, you may also be opening up the entire content of your mobile for intruders to capture and use. This useful report from the BBC Click team reveals that although malware for mobile phones is on the increase, it is still simple user naivety that is responsible for the majority of problems of this kind.

For me, raising the awareness of students and other web users to the dangers of the Internet will always include the problem of maintaining privacy. The golden rules are: Be careful what sites you visit (your security software should alert you to any unsafe sites), be careful what you post up online that may have personal information in it (this is just common sense) and watch your back - protect your identity, because you never know who may be looking over your shoulder. On Monday: Managing digital identities.

Creative Commons Licence
Watch your back by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Sunday, 21 November 2010

Digital literacy 1: What digital literacies?

In June this year I presented a keynote speech at Middlesex University entitled Digital Tribes and the Social Web. One of the themes I developed during my speech was around the concept of new digital literacies. My argument is that new media and new opportunities for learning through digital technologies require new literacies. This is not just my view - it reflects the views of many other commentators including Lea & Jones (2011 in press), Beetham et al (2009) and Lankshear & Knobel (2006). Essentially, the literacies that have dominated higher education in the past are thought to be inadequate in the face of social network services, mobile technologies and pervasive computing.

Below are the digital literacies I have identified. They may not be exhaustive, and they may not be fully defined yet. But for me they constitute a kind of road map which enables me to develop themes and topics within the modules I teach to help students to maximise their learning potential using new and emerging technologies. I will try to develop my commentary around each of these in future blog posts.


Creative Commons Licence
What digital literacies? by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Monday, 4 October 2010

In your dreams

Children have an incredible sense of imagination, and it only takes a small amount of encouragement to turn this into creative outcomes in the classroom. Technology can have an important role to play in this creative process if it is applied appropriately. One of the most powerful approaches I have seen in recent years involves the use of interactive narratives. From the time of the early book based 'choose your own adventure' stories such as the classic Cave of Time by Edward Packard, the ability to plough your own furrow through seemingly endless possibilities is a captivating idea, not least because it mirrors real life decision making. Turning the pages to find your next scene was part of the process, but with new digital media, the task has become easier and quicker. What place could such tools have in the classroom?
While visiting the Queensland Gallery of Modern Art on the South Bank in Brisbane a few weeks ago, I was impressed by the installation artists exhibiting at the venue. One in particular caught my attention. It is entitled 'You were in my dream', was created by Isobel Knowles and Vanessa Sowerwine and consists of a box with a face shaped hole in it. You place your face in the hole, and a video camera captures a live feed of your features. It then incorporates your face into a wonderfully created stop motion animation which is located in a fantasy dream world. The idea behind the installation is that by using a mouse, you choose what your character will do next, and in doing so, you see your character transformed into a variety of fantasy characters, some ideal, some distopic. I was transformed slowly into a rabbit and then had to run for my life through a forest, with a ravenous wolf chasing. No matter how dangerous or dystopic a setting your character finds themselves in though, they always wake up from 'the dream'.
I can see such approaches being very valuable in the classroom for a lot of reasons. If similar setups were available at a reasonable price, lessons could be enlivened and children challenged in new directions, as they learnt decision making, problem solving and the consequences of their actions. It goes beyond role playing, taking on the nuances of identity construction and the complexity of moving through endlessly changing terrain. To quote from John Hedberg and Barry Harper: “....by enabling learners to be co-constructors of narratives, narrative-centered learning environments can promote the deep, connection-building, meaning-making activities that define constructivist learning.”
If you want a definition of Modern Art, there is one on the wall of the gallery: Modern Art is art that is created within the time period it represents. Such digitally mediated interactive narratives certainly capture the need for today's students to see how they fit into the world and interact with it - changing and being changed by their environments.
Image source

Creative Commons License
In your dreams by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Sunday, 5 September 2010

New wine in old bottles

I'm speaking at ALT-C this week in a symposium called 'New Bottles, Old Wine?' which will take the form of a debate over the ethics of research and intervention in Web 2.0 environments. I'm going to argue that it is in fact new wine in old bottles we need to concern ourselves with. Let me explain...

I'm going to argue that using, and researching the use of Web 2.0 tools is a difficult prospect to try to work through with many grey areas. There are a number of reasons. I'm going to raise a few issues: For example, users do not always behave consistently in different contexts. Students change their identities as they move from site to site, and the student behave differently depending on the communities within which they are members. Facebookers for example, generally use their real names and images. Flickrites on the other hand are often anonymised, using psuedonyms and images to represent themselves. It is often the same person, but they represent themselves differently. Is being a member of so many virtual clans confusing? Do they perceive themselves as acting differently in different environments, or simply complying with different digital sub-cultures? Such shifting digital identities can be subtle, but with the result that researchers have a problem trying ascertain whether students are presenting themselves truthfully online.

Another issue is whether participants modify their behaviour when they know they are being watched. In conventional research environments, we know this happens. Do such demand characteristics alter the results of Web 2.0 studies? That behaviour has a persistence in online environments. It's not as though the research has observed it once and then it's gone. It's there, archived for all to see and keep coming back to. Do we need a new set of methods to cut through these issues, or is it new wine in old bottles?

Another ethical issue is where students who are creating their own content may wish to keep that content to themselves. When placed within a shared, collaborative environment, such as a wiki, some students may not wish to have their work subsumed into a larger corpus of work. I have published several of my own papers on this topic. Students in my sample groups reported that they wanted to be awarded credit for the work they had done. They argued that they didn't want their work deleted, diluted, extended or otherwise modified by other students. Is it therefore fair to ask them to participate in any study involving openly editable websites, where collaboration was mandatory? Do researchers offer participants in such scenarios the right to withdraw without penalty?

Another ethical problem arises when researchers 'eavesdrop' on Web 2.0 users. In such situations, should researchers have total access to all a user's content? Should they see all a student's Facebook photos for example? Or have access to all their discussion posts, private messages etc? If they don't have access, can a full picture of life online be obtained? When students sign up for this kind of research, are they fully apprised about what they are letting themselves in for? A comment from a recent conference in Spain was about a camera that had been set up to capture and live stream a keynote speech. The camera was open for a long time before the speech began, picking up off the cuff remarks, and broadcasting on the web as the speaker set up his slides. One viewer remarked that they felt a little like a 'voyeur'. How does this kind of event amplification reconcile itself with ethical research? Upon whom is the onus for the maintenance of correct ethical behaviour in such cases? And if it's not research, is it still covered by ethical protocols?

Finally, I want to raise the issue of Twitter as a conference amplification tool and back channel. The tweckling or harsh tagging of keynote speakers has been discussed previously by a number of commentators. My blogpost Weapons of Mass Detraction cited some notable cases where the wisdom of crowds can very quickly descend to the stupidity of mobs, if a few harsh remarks are allowed to take hold. Before they know it, conference organisers have a car crash keynote on their hands. Again, are there any ethical guidelines for this kind of eventuality? It's a new problem, so again, I ask - is it new wine in old bottles? Do the new environments require new guidance, or are the old protocols sufficient?

Creative Commons Licence
New wine in old bottles by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Thursday, 22 July 2010

New spaces, new pedagogies

I'm kicking off the new academic year by presenting a keynote paper at the Annual International Conference of the Royal Geographical Society in London on Thursday, September 2nd. The session is entitled Innovative spaces of learning: debating their origin, nature and pedagogical significance, and is a sub section of the main RGS conference. Others speaking in the session include Derek France (University of Chester), Ruth Weaver (University of Plymouth) and Wendy Woodland (University of the West of England). Here's the abstract for my keynote:
New Spaces, New Pedagogies: Harnessing the Power of Social Media in Education

A rapid emergence of social media – the so called ‘Web 2.0’ – has opened up new opportunities for participatory learning in all sectors of education. Students now have the capability to create and share their own content through blogs, wikis, video- and photo-sharing services such as YouTube and Flickr. They can easily connect into and maintain contact with multiple communities of interest, gaining access to experts using social networking tools such as Myspace and Facebook. They can organise their own resources through free and easy to use tagging and social filtering tools. In this presentation I will argue that this rapid rise of user generated content is blurring boundaries between novice and expert, and challenging the traditional notions of knowledge, ownership, privacy and identity. In tandem with this, the proliferation of personal devices such as iPods and smart mobile phones is enabling students to move beyond the boundaries of the classroom into ‘any time, any place’ learning. In the light of these developments I shall explore new teacher roles, examine new learner expectations and explore some of the new learning territories that are emerging beyond the walls of the institution. I will offer some examples of how Web 2.0 tools have already been harnessed to support professional mentoring and to promote deeper engagement in learning through collaboration and reflection. I will discuss the concept of the personal learning environment and its potential to enrich student experiences. I shall speculate on the potential impact of emerging technologies such as augmented reality and touch screens and their potential in shaping the future of education.

Image source

Creative Commons Licence
New spaces, new pedagogies by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Based on a work at steve-wheeler.blogspot.com.

Wednesday, 16 June 2010

Show and TEL

I spent some time at the University of Plymouth's Technology Enhanced Learning Showcase today, which featured the best of a number of in-house led initiatives in e-learning. The event was the third Plymouth has held and was well attended by many academic and support staff. I went to a couple of sessions on podcasting and digital identity, which were short demonstrations of what lessons have been learnt so far during research and teaching fellowship activities. The digital identity session for example, covered not only how we represent ourselves in virtual environments, but also discussed acceptable use of personal content, protection of personal data and issues of privacy. We also talked about 'netiquette' - acceptable behaviour in online environments, and how people use Facebook and other social networking tools appropriately and innapropriately, and the implications.

These were by no means the only sessions on offer. There were also rolling presentations throughout the day on personal response systems (voting), computer aided assessment, plagiarism detection, Open Educational Resources, iTunesU, online submission systems, digital repositories, e-portfolios, learning through mobile devices, learning and communicating at a distance, and our own in-house development we call UpMedia. There is so much going on down here in Plymouth, it's difficult to keep up with it all, but try we must.

For a complete overview of all the learning technology and technology enhanced learning initiatives here in Plymouth, visit the TEL website. It's full of information, and also houses all of the learning technologists' blogs. You can also visit the MyBrand site for more on digital identity

Image source

Creative Commons Licence
Show and TEL by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.

Friday, 16 April 2010

PeLC's digital footprint

I'm sat here exactly one week after the 5th Plymouth e-Learning Conference - #PeLC10 - ended, and reflecting on another great event which everyone seemed to enjoy and learn from. As part of my reflection on the event I have been looking at the digital footprint the conference has left on the Web. There are blogposts, images, videos, and a huge Twitter stream searchable through the #pelc10 hashtag.

I'm sure there will be more accounts, images and videos posted (including the official videos of the two great keynote speeches by Josie Fraser (see the Video here) and Dave White (see the Video here) links of which will also appear soon on the conference website.

Here are just a few of the blogposts and other remnants of the event for you to revisit if you were there, or get a flavour of, if you were not able to attend this year...

Privacy has gone by James Clay

Don't feed the Pelicans by James Clay (includes a podcast and interviews)

Keep calm and carry on by James Clay (Podcast of debate)

Taking a step back by Fleur Corfield

Twitter is dead... Really? by David Hopkins

Learning without limits by Malinka Ivanova

PeLC10 e-learning debate by Bex Lewis

The view from our window by Our Lesson

5th Plymouth e-Learning Conference by Zak Mensah

Mypelc10 - Day 1 by Flea Palmer

Mypecl10 - Day 2 by Flea Palmer

5th Plymouth e-Learning Conference by Mark Pannell

Busy month ahead by Pat Parslow

Make sure you see the Pelican (Part 1) by Dan Roberts

Images of PeLC10 on Flickr by Dawn Wheeler

Community, privacy and identity by Steve Wheeler

Pushing all the right buttons by Steve Wheeler

Angels in the architecture by Steve Wheeler

There is also an aggregation of #pelc10 Delicious tags, Flickr images and Tweets here. And finally, here is an interesting statistical breakown of all the tweets that were tagged #pelc10 during the conference, courtesy of Andy Powell from Eduserv. It's a clever little application you can use to compare the #pelc10 statistics against those of other recent conference tags such as #jisc10 and #mootuk10. It is interesting reading indeed. If you know of any other pelc10 artefacts that are out there on the Web, please post a link in the comments box below.

PeLC10 final plenary session photo courtesy of Dawn Wheeler (from L to R: Steve Wheeler, Thomas Fischer, Josie Fraser, Dave White). The link to the uStream video of the final plenary session is here.
Creative Commons Licence
PeLC's digital footprint by Steve Wheeler is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.