Identity graphs as a ‘source of truth’

Week 4 on Identity in Stephen Downes’ E-Learning 3.0 MOOC has come to an end. It was another very interesting week. Stephen has summed up the week with a video and a paper, both of which I will link to in this post. They deserve to be widely distributed.

Whilst the topic title for Week 4 was ‘Identity’, and we had some discussion about identity in general as a philosophical idea that ‘runs through the history of education in a single thread’, the week mainly focussed on digital identity, which Stephen clearly said is not the same as ‘my identity’.

I was pleased to hear him say this, as throughout the week I consistently felt that our digital identity is nowhere near the whole picture of who we are. As Stephen says it is just one outcome of ‘myself’, through which I can recognise parts of myself and others can get glimpses of me, or if they know me can recognise a bit more.

I subscribe to National Geographic and this week I received a mailing from them which included this stunning photo by Yuri Andries.

But it was the text underneath that caught my attention. ‘…. the photo was taken in Ladakh, a remote alpine region of northern India where Tibetan Buddhists, Shia Muslims, Sunnis, and Christians live in villages connected by rocky roads. There’s no phone signal, Internet, or gas stations, and hardly a single person in sight.’ So no digital identity for anyone living there, but of course that doesn’t mean no identity.

I was struck by this because also this week I have been trying to understand what Stephen means by the ‘source of truth’ for the identity graphs we have created. How do we know the graph is an accurate representation of who we are? Where does the information come from? In his video Stephen says ‘we are the source of truth for our digital identity’; we are the thread that runs through the disconnected and distributed data that makes up our digital identity graph. Instead of our digital identities being about quantified demographics, they will (in E-Learning 3.0) be about quality, about the rich tapestry of data relations we have.

In case your were wondering, there is a link in my thinking between the people living in Ladakh with no digital identity, the many of us who do have a digital identity of one sort or another, and the idea of a source of truth, because it occurred to me that the truth about identity has to also include what is neglected, hidden or invisible. The emergent identity from the graph must surely be as much about what is not there as what is there.

As I was thinking about this Vahid Masrour published a post in which he writes about how he discusses online identity with this students. He urges his students to consider how their digital identity might be interpreted by future employers. This highlighted for me the idea that we have to manage our identities, deciding what to reveal and what to hide.

Stephen has said that identity in E-learning 1.0 and 2.0 was about the ‘quantified self’ where our digital identities were represented by demographics and numbers. E-Learning 3.0 will see us shift towards digital identities which reflect the qualified self and ultimately the connected self.

For the connected self, being represented by numbers (the quantified self of E-Learning 1.0) and facts (the qualified self of E-Learning 2.0) will not be sufficient. The connected self will be more about our relations and interactions. Will this lead to a more ethical Web? Will digital identity as a ‘connected self make the ‘source of truth’ of these identities more visible? Will the ‘connected self’ be more reflective? Will ‘the connective self’ more honestly reflect our hopes, aspirations and dreams?

Much of what is being discussed in this course is new to me and that includes the idea of identity graphs and the qualified and connected self. Stephen has clearly been thinking about this for some time. For further insights into his thinking I can recommend watching the video embedded above and reading this paper, which he shared as a summary of the week.

E-Learning 3.0, Part 4: Identity – https://el30.mooc.ca/cgi-bin/page.cgi?post=68516

Further resources

Digital Identity on the Threshold of a Digital Identity Revolution – http://www3.weforum.org/docs/White_Paper_Digital_Identity_Threshold_Digital_Identity_Revolution_report_2018.pdf

The Economic Impact of Digital Identity in Canada – https://diacc.ca/wp-content/uploads/2018/05/Economic-Impact-of-Digital-Identity-DIACC-v2.pdf

Canada’s Digital Economy Relies on a Foundation of Digital Identity – https://diacc.ca/2018/05/16/the-economic-impact-of-digital-identity-in-canada/

Identity as an Analytic Lens for Research in Education https://journals.sagepub.com/doi/10.3102/0091732X025001099

See also the resources listed on the course site: https://el30.mooc.ca/cgi-bin/page.cgi?module=8

The Quantified, Qualified and Connected Self

This week the topic on the E-Learning 3.0 MOOC has been Identity. We have tried to answer questions such as:

  • How do we know who someone is?
  • How do we project ourselves on the internet?
  • How can we be safe and secure?

To answer these questions we have discussed what identity means, digital and otherwise, we have created identity graphs (there are some great examples, see the end of this post) and Stephen Downes, convener of this MOOC, has introduced us to the idea of encryption keys.

For me there remains a topic which perhaps needs further discussion, and that is, what do we mean by quantified self, qualified self and connected self, what is the difference between them and why do we need to know?

Stephen has written:

We were the client, we were the product – are we, at last, the content? We are the thread that runs through an otherwise disconnected set of data, and knowledge about ourselves, our associations, and our community will create an underlying fabric against which the value and relevance of everything else will be measured. Instead of demographics being about quantity (sales charts, votes in elections and polls, membership in community) we will now have access to a rich tapestry of data and relations.

If this becomes the case, then we will have an unparalleled opportunity to become more self-reflective, both as individuals and as a community. The “quantified self” will give way to the “qualified self” and ultimately to the “connected self” as we begin to define ourselves not merely by simple measures of ethnicity, language, religion and culture, but through thousands of shared experiences, affinities, and inclinations. Evidence for this trend already exists and can be found through the exploration of expression of communities and culture online.

I am familiar with the idea of the Quantified Self. I’m aware that I could track and measure a lot of what I do if I so wished; my calorie intake, how much I sleep, how many steps a day I take, my heart rate etc. etc.  In the past, I have done a little of this. I did once own a Fitbit and I do have a Strava account, but my interest in them waned very quickly, and I now don’t use either. I find I don’t need a machine to tell me when I am eating badly or am not fit enough – I know. And I don’t want to think of my body, or myself, as a machine. I was dismayed when searching for information on the Quantified Self to find reference to the Quantified Baby. I would suggest there’s a limit to how much we should be measuring human beings. And that goes for activity on social media too. I have observed people on social media who admit to measuring themselves by the number of followers / friends etc. they can display on their sites. Like Geoff Cain (see his tweet below), I am happier with two or three in depth interactions and I am even happier if these happen in private rather than public.

geoffcain @geoffcain Analytics does not mean very much in the end. I have been happier lately with the two or three in depth interactions I have had with people online than I have with months of high traffic “hits.” #el30 #highered #edtech

So I am not a fan of the Quantified Self, for myself, although that’s not to deny its uses, in terms of health and well-being.

The Qualified Self sounds like a move in the right direction, but what does it mean? According to one recently published author, it means a more ‘well-rounded’ self ( see Humphreys, L. 2018. The Qualified Self. Social Media and the Accounting of Everyday Life, MIT Press, http://mitpress.mit.edu/books/qualified-self )

I haven’t read the book but José van Dijck, Distinguished University Professor, Utrecht University; author of Mediated Memories in the Digital Age and The Culture of Connectivity, has endorsed the book as follows:

The Qualified Self offers a new perspective on how social media users construct and distribute ‘self-portraits’ through media technologies. Lee Humphreys has delivered a truly original revision of ‘mediated memories’ and a much-needed update to the age of connectivity.

Lee Humphreys, from the reviews I have read, believes that online sharing of the minutiae of our daily lives, ‘selfies’ and so on, is not narcissistic, but simply a continuation of an age old tradition of diary writing and similar activities. As I say, I haven’t read the book, but I would want evidence that the sharing of the ‘diary writing’ is not for the purpose of collecting more followers and more clicks, if we are to believe in a fully Qualified Self. Of course the Qualified and Quantified selves could presumably exist alongside each other.

Stephen has suggested that our identity graphs will provide the rich data of tapestry and relations which will give us the opportunity to become more self-reflective, both as individuals and as a community and shift from the Quantified Self to the Qualified Self. This is not statistical data. It is data reflecting self-knowledge.

It has been hard to find anything very much online about the Qualified Self, but there is a good post written in 2014 by Mark Carrigan, which seems to align with Stephen’s and Lee Humphrey’s writing. In this post, Mark writes:

….. I’m suggesting qualitative self-tracking can be thought of as a distinct type of practice.

…. My point at the time was that the ethos of self-knowledge through numbers does very little for me personally. But I’m intellectually drawn to the Quantified Self because it’s a fascinating example of the intensification of reflexivity in contemporary society. (Mark has written Quantified Self in this final sentence, but I think it’s a typo and he means Qualified Self. That would make more sense in the context of his writing)

And then he goes on to attempt to define the Qualified Self,

Here’s an attempt at a definition of qualitative self-tracking: using mobile technology to recurrently record qualities of experience or environment, as well as reflections upon them, with the intention of archiving aspects of personal life that would otherwise be lost, in a way susceptible to future review and revision of concerns, commitments and practices in light of such a review. So obviously things like personal journals would fall into this category.

From this, the Qualified Self is more reflective and less concerned with measurement and numbers.

That leaves the Connected Self. I’m assuming this means being connected to our inner selves and our own ‘Being’, which would be a progression from the Qualified Self, but would also mean being connected to the selves of ‘Others’. The Connected Self would be a more ‘embodied’ self, which understands itself in terms of relations and ‘betweenness’. ‘Betweenness’ is a topic I was exploring before starting this MOOC. On reflection I think it is relevant to both the Qualified Self and the Connected Self.

I have not found it easy to unpick what Qualified Self and Connected Self mean. If you are reading this post, perhaps you have some thoughts / alternative perspectives you would be willing to share?

Source of imageHarvard Business Review

Participants’ Identity Graphs

Matthias Melcher – https://x28newblog.wordpress.com/2018/11/14/el30-week-4-identity-graph-1st-attempt/

Roland Legrand – https://learningwithmoocs.com/education/el30-task-identity-graph/

Kevin Hodgson – http://dogtrax.edublogs.org/2018/11/15/messing-around-with-identity-graphs/

Geoff Cain – http://geoffcain.com/blog/conceptmaps/week-4-el30-graphs-and-decentering-the-self/

Frank Polster – http://frankpolster.com/blog/elearn30/franks-identity-graph-week-three-2nd-task/

Laura Ritchie – https://www.lauraritchie.com/2018/11/16/my-graph-el30/ 

Ioannou Karvelas – https://ioannouolga.blog/2018/11/16/id-graph-e-learning-3-0-1st-draft/

Vahid Masrour – https://outdoingeducation.wordpress.com/2018/11/19/e-learning-3-0-identity-mine-and-others/ 

Keith Hamon – https://blog.keithwhamon.net/2018/11/el30-prepositions-on-edge-of-identity.html

Identity from the perspective of authentication

In this video Stephen Downes, convener of the E-Learning 3.0 MOOC explains that in the future our safety and security online will be managed through the use of identification keys. We will each have a private key and a public key, which we will plug into our computers instead of signing on with a password.

Source of  image –  Yubico.com

In the future everyone will be logging in like this and passwords will become a thing of the past.

Why do we need two keys? This is to ensure maximum security and encryption.  The two keys act like a two-way security system. We can think of our private key as our ‘key’ and our public key as the ‘lock’, i.e. the one won’t work without the other. You can only get through the door if you have the right key and the right lock.

So, an example found on Quora  explains how you can use private and public keys to send and receive encrypted messages like this:

Robert wants to send Katie a file. Robert would request Katie’s public key to encrypt the file and then encrypt it with her public key. Robert would then send the file to Katie. Katie would then decrypt the file with her private key.

In this way, Katie’s public key is only used to encrypt but can never be used to decrypt, keeping the data safe. And Katie can only decrypt the data with her private key and would never exposes her private key to anyone, keeping her private key safe. (Source: https://www.quora.com/profile/Ken-Mafli-1)

Stephen in his video (starting at about 7.00 minutes in) explains this in more detail and makes it very clear that a signature on the sent encrypted message would be needed to make it absolutely secure, otherwise you couldn’t be sure who had the public key. The point is to be able to prove who you say you are and keep your communications online safe, without the use of passwords. Your digital identity (based on your identity graph/s) becomes your public key, which is unique to you, and your private key keeps you safe.

Stephen believes that in ten years’ time this is how we will all be accessing the internet. I wonder how straightforward this will be for the average user. I will be in my 80s in 10 years’ time. Will this make it easier for me and people like me, or, as Stephen asks elsewhere on the E-Learning 3.0 course site,

“Will we be lost in the sea of possibilities, unable to navigate through the complexities of defining for ourselves who we are, or will we be able to forge new connections, creating a community of interwoven communities online and in our homes?”

Hopefully there will be more courses like this one which will help us to keep abreast of developments and where we are headed.

This is only a brief summary of the key points in Stephen’s video, as I see them. You need to watch the 25 minute video to get a more complete picture.

And have a look at the Resources – provided by Stephen which I have copied below:

FIDO U2F
Yubico, 2018/11/15

As explained on the Yubico website, “U2F is an open authentication standard that enables internet users to securely access any number of online services with one single security key instantly and with no drivers or client software needed.  FIDO2 is the latest generation of the U2F protocol.”

Public-key cryptography
Wikipedia, 2018/11/15

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. This accomplishes two functions: authentication, where the public key verifies that a holder of the paired private key sent the message, and encryption, where only the paired private key holder can decrypt the message encrypted with the public key.

Keybase.io – Downes
Stephen DownesKeybase, 2018/11/15

This is my Keybase page. Here’s what Keybase says about itself: “Keybase is a new and free security app for mobile phones and computers. For the geeks among us: it’s open source and powered by public-key cryptography. Keybase is for anyone. Imagine a Slack for the whole world, except end-to-end encrypted across all your devices. Or a Team Dropbox where the server can’t leak your files or be hacked.” See also (very technical) Keybase for Everyone. And Keybase writing to the blockchain.

E-Learning 3.0 : Identity Graphs

We are now in the fourth week of this E-Learning 3.0 open course/MOOC. The task for this week is to create an Identity Graph, which Stephen Downes (convener of this course) has outlined as follows:

Identity – Create an Identity Graph

  • We are expanding on the marketing definition of an identity graph. It can be anything you like, but with one stipulation: your graph should not contain a self-referential node titled ‘me’ or ‘self’ or anything similar
  • Think of this graph as you defining your identity, not what some advertiser, recruiter or other third party might want you to define.
  • Don’t worry about creating the whole identity graph – focusing on a single facet will be sufficient. And don’t post anything you’re not comfortable with sharing. It doesn’t have to be a real identity graph, just an identity graph, however you conceive it.

Here is my graph, which I created using Matthias Melcher’s Think Tool – Thought Condensr, which is very quick and easy to use.

Like Matthias,  I puzzled over why Stephen required that the graph – “should not contain a self-referential node titled ‘me’ or ‘self’ or anything similar”. How could I avoid this if the graph is to be about my identity? In the event, it became obvious that not only is it possible to create the graph without referring to me, but also that doing this clearly demonstrates that knowledge of my identity is in the network rather than any specific node. My identity begins to emerge from the graph, without me having to specify it.

You can see from the graph that there are three links which don’t connect. I did this by simply cutting them off for the screenshot of the graph, because I wanted to suggest that this graph could, in fact, go on and on. This image provides only a glimpse of my identity. I could not only expand the graph, by making more links and connections, but I could also make more connections within this section of the graph. I am also aware that if I started afresh and drew this tomorrow it would be different because my identity and how I think of it is fluid and evolving.

I was also aware in drawing the graph that pretty much all of it is traceable online. It reminded me of the introductory task that was set on Etienne Wenger’s online course  Foundations of Communities of Practice that he ran with John Smith and Bron Stuckey in 2008. The task was based on the idea of six degrees of separation. “Six degrees of separation is the idea that all living things and everything else in the world are six or fewer steps away from each other so that a chain of “a friend of a friend” statements can be made to connect any two people in a maximum of six steps” (see Wikipedia). At the start of that course we were given the name of an unknown fellow participant and had to find out enough about them to be able to link to them in six steps and then share this information. This was a very good way of learning more about fellow participants at the start of the course, but also of recognising that we can easily connect to anyone across the world in just a few steps.

Stephen set some further optional questions for us to consider:

  • What is the basis for the links in your graph: are they conceptual, physical, causal, historical, aspirational?

They seem to be physical and historical, whereas Matthias’s graph seems to emphasise the conceptual. 

  • Is your graph unique to you? What would make it unique? What would guarantee uniqueness?

I think it must be unique. The nodes are not unique, but the relations between the nodes, whilst they might not be unique individually, as a whole must be unique. I think it would be impossible to guarantee its uniqueness if it remained static. Anyone could come along and copy or mimic it. Uniqueness can only be guaranteed if the graph is continually updating, evolving and new connections are being made. I am not sure whether old connections can be broken, or do they just become inactive and move way off to the edge of the graph?

  • How (if at all) could your graph be physically instantiated? Is there a way for you to share your graph? To link and/or intermingle your graph with other graphs?

I’m not sure if I have understood the question correctly? Isn’t the graph I have created using Matthias’s Think Tool, and posted here, a physical instantiation? Does physical instantiation have a specific meaning in relation to graphs? I think I might have missed the point – but I can see that it would be relatively easy to intermingle my graph with Matthias’s graph. It might be necessary for us both to add a few nodes and links, but not many, to be able to connect the two graphs fairly seamlessly (a bit like the six degrees of separation task described above).

  • What’s the ‘source of truth’ for your graph?

This is a big question as it raises the whole question of what we mean by truth. I have been grappling with this for quite a few months now. In my most recent blog post about ‘truth’ –  I reported that both Gandhi and Nietzsche have expressed the view that “human beings can only know partial and contingent truths and perspectives; there are a multiplicity of truths and perspectives.” So in these terms, the truth of my graph can only be partial or contingent. Even if I have not knowingly lied, I have selected what to include in the graph and therefore I have also selected what to leave out.

But Stephen’s question is about the ‘source of truth’. Is he asking about ‘source of truth’ as defined in information systems?  This is not a subject I know anything about.

In information systems design and theory, single source of truth (SSOT) is the practice of structuring information models and associated data schema such that every data element is stored exactly once. Any possible linkages to this data element (possibly in other areas of the relational schema or even in distant federated databases) are by reference only. Because all other locations of the data just refer back to the primary “source of truth” location, updates to the data element in the primary location propagate to the entire system without the possibility of a duplicate value somewhere being forgotten. https://en.wikipedia.org/wiki/Single_source_of_truth

In these terms I’m not sure how to answer Stephen’s question about ‘source of truth’. If someone could enlighten me that would be great.

Some Thoughts on Identity

The topic for Week 4 of Stephen Downes’ E-Learning 3.0 MOOC is Identity. The focus of this topic is on digital identity – exploring questions such as:

  • ‘How do we know who someone is?’,
  • ‘How do we project ourselves on the internet?’ and
  • ‘How can we be safe and secure?’

Stephen also writes on the course site:

Our new identities have the potential to be an enormous source of strength or a debilitating weakness. Will we be lost in the sea of possibilities, unable to navigate through the complexities of defining for ourselves who we are, or will we be able to forge new connections, creating a community of interwoven communities online and in our homes?

Looking back through this blog, I see that I have written a few posts about identity, the first about ‘Identity in the Network’ in 2008. It has been interesting to read back through these posts and I am not surprised to see that the biggest influence on my thinking about identity has been Etienne Wenger’s book: Communities of Practice. Learning, Meaning and Identity, which is one of the best thumbed books on my bookshelf.

Back in 2011, I attended a talk given by Etienne Wenger at Lancaster University, where I heard him say:

‘The 21st century will be the century of identity’ and ask ‘How do you manage your identity in a world which is so complex and in which there are so many mountains to climb – in which there are too many places to invest in who you want to be?’  which relates to Stephen’s question – ‘How do we project ourselves on the internet?’  There is quite a bit of overlap between Stephen’s writing and what Etienne has written.

According to Etienne, identity is a negotiated expression of the self and there are many landscapes and communities in which to do this, which means that we have to manage multiple trajectories all at once. On page 5 of his book, he writes that identity is ‘a way of talking about how learning changes who we are and creates personal histories of becoming in the context of our communities. It is not just what we say about ourselves or what others say about us. It is not about self-image, but rather a way of being in the world – the way we live day by day – He expands on this on p.151 of his book, writing:

An identity, then, is a layering of events of participation and reification by which our experience and its social interpretation inform each other. As we encounter our effects on the world and develop our relations with others, these layers build upon each other to produce our identity as a very complex interweaving of participative experience and reificative projections. Bringing the two together through the negotiation of meaning, we construct who we are. In the same way that meaning exists in its negotiation, identity exists – not as an object in and of itself – but in the constant work of negotiating the self. It is in this cascading interplay of participation and reification that our experience of life becomes one of identity, and indeed of human existence and consciousness.

Etienne’s book from which this paragraph is quoted was written in 1998. There is no mention of the internet or online learning in this book. But in 2009 he turned his attention to Digital Habitats in a book he co-authored with Nancy White and John Smith. I am again going to quote a paragraph from p.180 of this book. I am quoting it in its entirety because it seems particularly pertinent to our thinking about identity for the E-Learning 3.0 MOOC.

Our engagement with the socially active medium created by new technologies leaves traces each time we do something on the web. These traces become an impressionistic picture of the self – one that is scattered like dots of paint in a networked canvas, which includes discussions, product reviews, blog posts, pictures, podcasts and videos, instant messages, and tags, as well as comments from other people posted on our traces and comments we add to others’ traces.  This “digital footprint” [my bold] is an evolving (but enduring) image of ourselves over which we only have very partial control. Admittedly, we have always participated in many conversations and interactions; we have always had multiple means to store our memories; our identities have always combined what we produce ourselves and what others reflect and project on us. Recorded in a socially active medium, however, our traces are searchable; they can be found and reassembled dynamically; they are inspectable, manipulable, and remixable. Even when we think we have deleted them, they are found again. Scattered and computable, our footprints create reconstructable trajectories in a public space, largely out of our control. Who are we in this mirror that remembers and talks back with a voice that is only partly our own? Does the potential to remember so much mean that we know ourselves and each other better? Or could our digital footprints hide as much as they reveal, as if their very transparency only added to the mystery of identity?

I can relate to Etienne’s writing. I have questioned in the past, and continue to question, whether I have one identity or multiple identities, how I can know who I am, how I can and whether I should try and keep knowing who I am separate from what others say about me, and how I can know whether the perceived identity of myself, by myself or by others, is ‘true’.

Stephen’s questions (below) are new to me and I’m looking forward to hearing how others on this course react to them. I will need some time to think them through.

  • What do we become in a world of artificial intelligence, linked data and cryptographic functions?
  • We were the client, we were the product – are we, at last, the content?
  • Will we be lost in the sea of possibilities, unable to navigate through the complexities of defining for ourselves who we are, or will we be able to forge new connections, creating a community of interwoven communities online and in our homes?

At the moment, I would like to think that I am, and always will be, more than ‘content’.

References

Wenger, E. (1998). Communities of Practice. Learning, Meaning, and Identity. Cambridge University Press

Wenger, E., White, N. and Smith, J.D. (2009). Digital Habitats. CPsquare: http://cpsquare.org

Posts relating to identity on this blog – https://jennymackness.wordpress.com/?s=identity

Source of image 

Thinking of knowledge as a graph

This is a response to the E-Learning 3.0 task  for course participants created by Matthias Melcher. See https://x28newblog.wordpress.com/2018/11/09/el30-graph-task/

The task requires that we select from one of the topics of this course, and create a map from the list of keywords for the topic provided by Matthias. Matthias took the keywords from the synopsis for each topic written by Stephen Downes. The task is to connect and annotate the keywords.

Matthias provided links to two types of mapping tool – cmap.ihmc.us  and  a tool he has created himself – http://condensr.de/download-page/ . I have used both tools in the past, but I am more familiar with Matthias’ tool, so I used that.

I selected the ‘Cloud’ list of keywords, to create this map.

  • storage
  • electricity
  • server virtualization
  • vmware
  • docker
  • amazon web services
  • edx
  • coursera
  • yaml
  • vagrantfile
  • jupyter
  • redefine textbooks
  • experience
  • algorithm
  • containers
  • load-balancing

Creating the map

Since I have used this tool before (see A new mapping tool: useful for research purposes) I did not find it technically difficult.

Here is a screenshot of the map I created. Click on the image to enlarge it.

And here is a link to the interactive map, which is much more interesting, because by clicking on a node you can see the annotations – http://x28hd.de/tool/samples/JM%20Cloud%20Map.htm 

(I contacted Matthias to ask him to create this link for me. WordPress does not host .htm files; at least, as far as I am aware it does not)

Despite the lack of serious technical difficulties,  I did somehow manage to inadvertently make 4 copies of my map, one under the other. I found that it took a while to delete each node and link individually. And at another stage I managed to lose the map entirely (I think I swiped it off the screen). I have done this before, but I couldn’t remember how to get it back. I had saved the xml file though, so just uploaded it again. I know that Matthias is refining this tool all the time, so a block delete function sometime in the future would be great. (Update 13-11-18 – See http://condensr.de/2018/11/12/a-user-question/ for Matthias’s video explanation of how to overcome these minor difficulties that I had)

I created the map using the text from Stephen’s synopsis. This revealed the aspects of the topic that I still haven’t understood. I made a note of these in the text annotations (in italics). I did look up definitions and explanations of some terms and added text if an explanation wasn’t evident in Stephen’s text, e.g. algorithm. If I were to continue to develop the map, I would do more of this.

Thinking of knowledge as a graph

This is the real challenge, i.e. moving from thinking and seeing knowledge in a linear way to thinking and seeing knowledge as a network/graph.  I like lists, but in recent years I have come to appreciate that when you organise and categorise terms in lists you miss the richness of connections. Some terms need to be in more that one category. A map shows us how ideas are interconnected. A list cannot do this. Matthias explains this really well at the start of his video, which is posted on his website download page – http://condensr.de/download-page/

I know from my experience of using this tool, that my tendency is to use it as a repository for resources. It is actually great for this. I have used it for research purposes, as a place to store information and thoughts about related articles, but as Stephen writes

The graph, properly constructed, is not merely a knowledge repository, but a perceptual system that draws on the individual experiences and contributions of each node. This informs not only what we learn, but how we learn.

To develop my knowledge of the Cloud, to learn and understand more about it, I need to grow my connections and the links between them. The state of my knowledge can then be represented by the map. A  key affordance of Matthias’ Think Tool is that it is easy to ‘grow’ the map, adding nodes and links, and storing information about them, as this growth occurs.

A graph is a distributed representation of a state of affairs created by our interactions with each other. The graph is at once the ­outcome of these interactions and the source of truth about those states of affairs. The graph, properly constructed, is not merely a knowledge repository, but a perceptual system that draws on the individual experiences and contributions of each node. This informs not only what we learn, but how we learn. (Stephen Downes – https://el30.mooc.ca/cgi-bin/page.cgi?post=68472)

I do not yet fully understand the link that Stephen makes between graphs and the “source of truth”. I have yet to read the article he links to – Epistemology in the Cloud, which I think might help. Stephen has written

The source of truth, if there is any, lies in how those links are created and maintained ….. and that …. it’s not the individual idea that’s important, but rather how the entire graph grows and develops. It protects us from categorization errors and helps prevent things like confirmation bias.

This links to what Matthias says, at the beginning of his video, about the dangers of pigeon-holing things.

These ideas go beyond what Matthias asked for in his task, but I do see that in order to start thinking of knowledge as a graph, we probably need to start by creating graphs, and his Think Tool helps to make the shift from thinking of knowledge as a representational system to thinking of knowledge as a perceptual system.

And finally, I now realise, more than before, that I have already been thinking about this, implicitly, in my search for understanding what Iain McGilchrist means by ‘betweenness’, which I was writing about last month on this blog. See

‘Betweenness’ : a way of being in the world – https://jennymackness.wordpress.com/2018/10/02/betweenness-a-way-of-being-in-the-world/

Understanding ‘Betweenness’ – seeing beyond the parts – https://jennymackness.wordpress.com/2018/10/10/understanding-betweenness-seeing-beyond-the-parts/

Edusemiotics, the Divided Brain and Connectivism https://jennymackness.wordpress.com/2018/09/17/4436/

Resources

Matthias Melcher Thought Condensr website – http://condensr.de/

E-Learning 3.0, Part 3: Graph – https://el30.mooc.ca/cgi-bin/page.cgi?post=68472 and associated video https://youtu.be/WiaxHxiN_IA  (Stephen’s summary of the week)

E-Learning 3.0: Conversation with Ben Werdmuller

The guest for this third week of Stephen Downes’ E-Learning 3.0 MOOC was Ben Werdmuller. I took a screenshot from the Hangout, because he has such a winning smile. Just what you need for a difficult topic!

These weekly conversations with different guest speakers are proving very interesting – a window into another world, for me. Ben Werdmuller, was a co-founder of Elgg.  I did have an Elgg account in the early days, but it’s so long ago that I don’t remember exactly when. Probably about 10 or more years ago. I do remember though that I never felt comfortable in Elgg. I could never work out where I was and always felt disoriented, but those were early days in online learning for me. Recently Ben left Matter to join Unlock. Unlock is a protocol which enables creators to monetize their content with a few lines of code in a fully decentralized way. As Ben explained, Unlock enables anyone on the web to make money from your own website without going through a middleman, although it does not have to be about money. It can also be thought of as a decentralised access control system.

My take from this conversation between Stephen Downes and Ben Wedmuller was

  1. That open is not always good (I found it refreshing to hear this cautionary but not rejecting perspective).
  2. Everyone should have their own website.

The warning that open is not always good was discussed in association with a conversation about Blockchain. Stephen has been ‘beefing up’ on this for a while and has shared the resources he has collected for those who want to know more about blockchain (see the end of this post). My focus this week has been on Graph, and I continue to think about the human issues related to these technology developments (see my previous post) , so I have not yet had time to follow up about Blockchain.

Ben warned that Blockchain can be misused because it is open, and that there are a lot of privacy and security implications associated with Blockchain. Blockchain could become a safe haven for those communities wishing to cause harm, although whilst users of Blockchain might think they are anonymous, the metadata can be used to figure out who someone is – but it’s harder in Blockchain. One of the unintended consequences of making everything open is that individuals with less power have less control over their data. Those with a lot of money can make their data opaque, but for others their data is transparent. For Ben, not all information should be open. A lot of information is sensitive. However, Blockchain has made people see the value of decentralization.

There was then a discussion about the IndieWeb – what is it? The idea behind the IndieWeb is that we should be able to share, discuss and publish from our own websites, ideally with our own domain names. Our sites would then not be controlled by a single company. The problem with these wealthy companies is that their policies affect discourse, for better and worse. They are getting better at dealing with hate speech, but some of their rules do not reduce online abuse, e.g. Facebook insists on the use of real names, which is a problem for, for example, transgender people. The IndieWeb allows you to organise your online activity in a space that you control.

Stephen and Ben then talked about the importance of having your own website which you can control, but it is not easy to run your own website. Ben spoke of the bottleneck being hosting, not web technology, and spoke highly of Reclaim HostingReclaim Hosting provides institutions and educators with an easy way to offer their students domains and web hosting that they own and control.

I have used both Dreamweaver and GoDaddy to create websites in the past and found them hard work. I have considered whether to move this WordPress site to Reclaim Hosting, but there is very little cost difference (I only pay for two plugins which I renew each year on WordPress) and I am very happy with WordPress. I find it easy to use. I do use a template which I am not 100% happy with, but I don’t feel strongly enough about it to take full responsibility for my own website.

At the moment WordPress does everything I need it to do. However, given what has recently happened with Flickr (see – here and here) I can see that it’s important to have a good backup plan. I have recently downloaded all my Flickr photos. They are CC licensed, but it’s better to be safe than sorry. I suppose the same situation could arise with WordPress and Reclaim Hosting. As Stephen mentioned earlier in the course, never forget to Back Up!

The suggested solution to these sorts of problems, by Ben, was home-servers, which can host their own websites, but this of course would mean, as with some web hosting sites, that the user needs to know HTML.

Even if you don’t care about ownership and control, there are still, according to Ben, lots of reasons to have your own website. By posting on your own website rather than Twitter or Facebook or the like, you are adding value to your own voice and not fitting into a template. You can decide how to organize the different types of data on your own website. Ben discussed how he has managed his own website and on this course Stephen has published a number of posts about how he has set up and organised gRSShopper. Currently HTML is the barrier to becoming independent and breaking out of templates. I can relate to this, as I don’t want to spend a lot of time ‘under the hood’. So, according to Ben, there is room for more communities to develop a usable independent web, and human-centred design, based on a deep understanding of people, which meets users where they are and is desirable, feasible and viable. This was music to my ears and a good end to the conversation.

For further thoughts on this conversation, see Laura Ritchie’s post – https://www.lauraritchie.com/2018/11/09/notes-on-el30-web-chat-ben-werdmuller-stephen-downes/ 

And – for a very clear and comprehensive summary of the discussion between Stephen and Ben Werdmuller, see Roland Legrand’s post – https://learningwithmoocs.com/decentralized-web/dispatch-from-the-frontline-of-the-decentralized-web/ 

Resources

Blockchain and Distributed Ledger Technology 

(Resources provided by Stephen Downes and copied here from https://el30.mooc.ca/archive/18/11_06_course_newsletter.htm )

Today we’ll take a brief look at blockchain. Although presented as a type of currency, blockchain is in essence a graph technology. It creates a record of transactions by chaining them together such that you cannot change or revise one transaction without revising or changing all transactions. Because this is expensive and in some cases impossible, blockchain becomes a permanent record of transactions.

Topics in Distributed Ledger Technology 
This is a presentation I gave twice this fall, summarizing some of the major themes in blockchain, describing how it works, surveying a number of applications, and discussing issues related to its use. https://www.downes.ca/presentation/495

The Blockchain Papers 
This is a very large resource shared as a Google Doc assembling a lot of the reading I have done on blockchain over the last year or so. I am constantly contributing to it (and welcome suggestions or ideas for additional resources). Here’s the link: https://docs.google.com/document/d/1DX5nYbkd5mQ81xrLggovceIkE43rCFrOMbFLYUkBhZQ/edit#

Building a Blockchain 
I also built my own toy blockchain engine last spring. Here it is: https://halfanhour.blogspot.com/2018/03/building-blockchain.html It steps the reader through fundamental concepts of a blockchain and the major elements of a blockchain engine.

This is just the Beginning 
Although this is the only day in the course dedicated specifically to blockchain, really what we should see is that blockchain is just one step in the narrative we’ve already been developing while talking about linked data and cloud technology, and a narrative that will continue through the remaining weeks of the course. As with the other topics in the course, it is possible to dive very deeply into the subject. From the perspective of E-Learning, though, the idea is to get an overview of what is happening and seek to apply it to a projection of likely trends in the next decade or so.

Blockchain Technology Overview

Peter Mell, Nik Roby, Karen Scarfone, Dylan Yaga, National Institute of Standards and Technology, 2018/11/06

This is a good crisp summary that doesn’t shy away from technical detail but steps through the major elements of blockchain technology with clarity and precision. The sections on blockchain components (section 3) and consensus models (section 4) are particularly strong. It even comes with a fun blockchain use case flowchart.

Blockchain explained: What it is and isn’t, and why it matters

Brant Carson, Matt Higginson, Simon London, McKinsey, 2018/11/06

This podcast transcript provides a level-headed overview of blockchain technologies focusing especially on the trade-offs the use of blockchain entails (for example: less efficient databases in exchange for immutability). There’s also a nice table depicting the major use cases for blockchain. And there’s a nice look at the different motivations for employing blockchain.

Blockchain in Education

Alexander Grech, Anthony F. Camilleri, Joint Research CentreEuropean Commission, 2018/11/06

This is a long (136 page PDF) and detailed report on blockchains in education. The authors work slowly and deliberately in their pursuit of accuracy and clarity, which results in a presentation that will be easily understood by most readers. There is a wealth of examples in the document describing use cases, scenarios and pilot projects, and companies involved in the space.