Using Mindfulness to Improve Online Communication

Using Mindfulness to Improve Online Communication

Have you ever noticed a disconnect between interactions of people online and in person? Maybe you have a friend who is normally shy but becomes outspoken when they get behind a keyboard. Or perhaps you’ve noticed how people who otherwise behave considerately can abruptly become insensitive when communicating online. It turns out that mindfulness may be the missing link.

Annie Murphy Paul recently gave a lecture at UBC titled, ‘The Science of How to get Smarter,’ where she spoke about how mindfulness can be used to increase intelligence. Intelligence, she says, is limited by internal factors: our working memory has a relatively small and fixed capacity; our attention and focus can only be extended for so long; and our logical reasoning ability, motivation, and creativity, have their own internal limitations. Overloading these finite resources can lead to communication fallout, especially online.

Audience at Annie Murphy Paul Keynote Address at UBC - Photo Credit: Centre for Teaching, Learning and Technology.

Audience at Annie Murphy Paul Keynote Address at UBC – Photo Credit: Centre for Teaching, Learning and Technology.

The brain doesn’t operate in a vacuum, it extends itself into the external world. Annie says, “we got smarter not by using our brains, but by thinking outside of our brains.” In order to overcome our brain’s internal limitations, we need to understand the impact of our external environment. For example, by simply observing the rhythm of our breathing, we’ll be able to overcome the internal limitations of the brain’s inability to focus, and we’ll expand our attention spans and increase our intelligence.

When we go online and communicate, it becomes very easy to lose our sense of physical identity as we become consumed by our virtual selves. But by periodically getting up and moving around, we’re able to practice mindfulness by observing our sensory experiences. As Murphy Paul suggests, mindfulness improves attention and attention is what is required to make thoughtful decisions about what, how and to whom we communicate online.

Ways to practice mindfulness when communicating online:

  1. Move around – watch for poor posture and improper breathing
  2. Slow down and be thoughtful about what you post and to whom.

For more ideas about “thinking before you ink” check out 5 Types of People on Social Media – for tips on what to avoid.

DT Exclusive: Social Media in the Classroom with Steve Woodward

Social media in the classroom has been a subject of some tension in the academic world, as many are concerned that the mandatory use of social media platforms might put student’s data at risk. However, as the new technology becomings increasingly intertwined with our day-to-day lives, some professors have started to integrate the new media into their courses. The Digital Tattoo had the opportunity to sit down with Steve Woodward, a Pulitzer Prize winning journalist and visiting professor at the UBC School of Journalism to discuss his use of social media in his undergraduate journalism course, New Media and Society.

You can watch the full interview with Steve Woodward here, where he discusses some of the challenges social media can pose in the classroom.

Round 3: Privacy concerns emerge after FBI breaks into iPhone

It looks like the FBI didn’t need Apple’s help after all.

The United States government has asked a federal judge to remove the dispute order over Apple after the FBI successfully bypassed the security encryption on an iPhone recovered from a domestic terrorist attack last winter.

The order has ended what was being anticipated as a long and arduous legal battle between one of the world’s leading technology brands, and the US Federal government. However, with this development has come a slew of implications regarding the state of online privacy.

After the FBI contracted out the development of the new bypassing software, it remains unclear as to what the new technology means to existing iPhone users. Has Pandora been let out of the box? We currently don’t know if unique software holds the capacity to only circumvent of the iPhone 5C (the model of the phone recovered from the scene), or later versions as well. In turn, the very existence of this software is threatening the integrity of Apple products– and personal electronics in general.

The LA Times reports that Apple is now hoping that the FBI will share the details on exactly how this software was developed, a measure that would ensure that Apple products can maintain the highest security standards in the industry. This development would surely be welcomed by consumers, but it remains unclear if the US Government will comply.

According to LA Times writer Dave Paresh:

Governments regularly develop or purchase hacking techniques for law enforcement and counterterrorism efforts, and put them to use without telling affected companies.

It seems that a major ethical dilemma has emerged, and the ball is in the US governments court: should technology companies be made aware of potential flaws and security in their products, specifically when major players like the US government are aware of them? To what extent does the government owe its citizens, many of whom are consumers of this technology, the highest standards of personal security? Should the government leave these channels open, and technologies flawed, in the name of national security? We would love to hear your thoughts!

Apple pleads their case at latest launch; the FBI remains crafty

The latest renditions of the iPhone and iPad weren’t the only things on display at Apple’s latest product launch in Cupertino, California. CEO Tim Cook used the stage to acknowledge the company’s proactive stand against the FBI, ensuring his customers that Apple will do whatever it can to protect the privacy and data of its users.

The comments come on the heels of a high profile legal dispute, after Apple refused to comply with a court order to provide the FBI with software that could bypass the iPhone’s advanced security systems.

“We did not expect to be in this position — at odds with our own government,” Cook said, as transcribed by VOX’s Tara Golshan. “But we believe strongly that we have a responsibility to help you protect your data and your privacy. We owe it to our customers and we owe it to our country. This is an issue that impacts all of us, and we will not shrink from this responsibility.”

“We built the iPhone for you — our customers,” he added. “And we know it is a deeply personal device. For many of us, the iPhone is an extension of ourselves. … We need to decide as a nation how much power the government should have over our data and over our privacy.”

Cook’s legal team was scheduled to appear in federal court on Tuesday, where witnesses from both parties would have taken the stand. That was, until the FBI took matters into their own hands.

On Monday, the Telegraph reported that the FBI had been shown from an outside how to bypass Apple’s encryption.

If the bypass happens to be successful, it is likely that it would eliminate the need for Apple to assist the FBI, likely ending what could become a long and drawn out (and expensive) legal battle.

For now, the court has only postponed the Tuesday’s hearing.

Keep an eye on the Digital Tattoo for all the latest updates on the story!

UBC’s Engaging Students in Open Education: a social media snapshot

Open education continues to be a hot topic across the province, most notably when the Province allocated over $500,000 to the development of free and affordable textbooks. This past week at UBC carried on the momentum for the open learning movement, marking the campus’ inaugural Open Education series, highlighted by a panel of provincial leaders in the field of open learning resources. Check out the Digital Tattoo’s social media snapshot of UBC’s Engaging Students in Open Education event:

For more information, check out UBC’s Center for Teaching, Learning and Technology’s Open Dialogue series

Why all the kids are flocking to the ephemeral web

It seems like just yesterday Generation Y’ers like myself would hide from our parents on the private recluse that is the world-wide-web. Our obnoxious dial-up modems opened new channels of communication that extended far beyond the household landline. Suddenly I could hold private conversations with my friends while building a solid network of contacts on old-school apps like the MSN and AOL messenger systems, my face glued to the computer screen and my parents clueless as to what I was doing. Social networks like Nexopia, Hi5 and MySpace burst onto the scene as venues where my teenagers could muse about weekend parties, share viral videos (remember EbaumsWorld and break.com?) and gossip about all things high-school. Soon thereafter, Zuckerberg hit a home-run when he launched FaceBook. Clean, user-friendly, and undoubtedly the cool new kid on the block, everyone with a MySpace profile defected to Facebook (sorry, Tom).

But little did we know, Zuckerberg didn’t just want to tap into the youth; he wanted everyone.

It wasn’t long until our parents were sending us friend requests and our future bosses were scanning our profiles. Suddenly all of our teenage antics were made available far beyond the small network of our closest friends, and for some of the more unfortunate, it came back to haunt them.

Enter SnapChat.

Launched in 2011, SnapChat has grown faster than all of its competitors in its short lifespan. How did it manage to pick up so much steam over five short years? Well, according to a growth study on GrowthHackers.com, it offers a ‘fleeting’ alternative to the other social networks we are accustomed to:

In an age of permanence, timelines, and revenge posts, Snapchat created a way for teens to share photos freely—without the ramifications of other social services like Facebook. The easy-to-use, self-destructing transiency of the experience feels more human in its interaction than regular MMS, Facebook, Instagram, and Twitter. It goes from a timeline point of view—a historic record of activity—to fleeting, in the moment captures that allow users to drop many of the filters we’re taught to put on what we share.

In many ways, SnapChat is the antithesis to Twitter, Facebook and Instagram, allowing for a much more targeted sharing format based on private, disappearing content, all the while tapping into self-expression that has driven the success of its competitors, albeit in a far more comfortable way. It has become the private recluse that was lost once Facebook became a global human catalogue– Snapchat’s users remain comfortably hidden.

That being said, recent changes have threatened the ephemerality that SnapChat has been founded upon. You can read more about the changes to SnapChat’s privacy policy on the Digital Tattoo.

Do you find yourself more active on Snapchat compared to other social media sites? Or do you feel comfortable sharing content on all platforms? Share your thoughts in the comment section.

Tale of the Tape: Apple vs. the FBI

What happens when one of the largest technology companies on the planet goes toe-to-toe with the most iconic domestic police agency in history? Hint: it’s going to be nothing short of a fifteen-round slugfest.

Apple made waves earlier this month when it refused to alter it’s iPhone technology for an FBI investigation. The tech giant’s refusal goes directly against a court order by the department of justice has sparked mass media attention, and it is likely their defiance will place them on a long–and expensive–legal battle with the FBI.

So what exactly happened? Well, you can try asking Siri. But if she doesn’t have the answer for you, here’s the Digital Tattoo’s guide to what will likely become the most important security battle of our time.

A heavyweight tilt for the ages

Last December, a pair of islamic terrorists opened fire on a local government office in San Bernardino, California. After the assault, which left 16 dead, including the two perpetrators, authorities were able to recover an iPhone belonging to shooter Syed Farook– only, the smartphone’s software left it locked up tight.

Farook’s phone was believed to contain integral information for the investigation the ISIS-inspired attack, and so the FBI pursued every available avenue to get inside the device. This included an appeal to Apple to provide the latest backup data stored on the iCloud server, to which Apple unequivocally complied. However, it turned out that the latest data available on the server was from mid-October, leading the FBI to make a far more staggering request: have Apple hack the iPhone themselves.

The FBI was able to obtain a federal court order mandating that Apple create a software to hack their own products. This “backdoor to the iPhone” would bypass the phone’s tightly knit security system that protects all of the product’s users.

This has in turn ignited a widespread debate, none too far off from what occurred after the inception of the Patriot Act: when exactly do matters of national security end and invasions of personal privacy and liberty begin?

“We have no sympathy for terrorists,” said Apple CEO Tim Cook in an open letter to Apple Customers. “But now the US government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.”

The belief is that once Pandora’s Box is opened– or once this game-changing software is created– is that it could somehow end up in the wrong hands, or the powers that be could ultimately abuse it. Granted, the software is being produced in the name of national security; however, privacy advocates maintain that the implications could be staggering.

Cook further elaborated in an email sent to Reuters:

“This case is about much more than a single phone or a single investigation. What’s at stake is the data security of hundreds of millions of law-abiding people, and setting a dangerous precedent that threatens everyone’s civil liberties.”

With Apple currently appealing the FBI’s court-ordered request, it is likely that the two giants will enter a hotly contested legal battle that could reach all the way up to the US Supreme Court. Now we here at the Digital Tattoo are very interested in all matters of online privacy and security, and are very interested our readers have to say. Do you think that Apple is justified in holding its ground against the FBI and a matter of national security? Do you think it’s important to take whatever precautions necessary when dealing with acts of terrorism? How would you feel if this technology existed? Please share your thoughts on the comment section below, and you can bet that we’ll have more coverage on the story as it develops!

Stay sharp on social media: 10 LinkedIn Do’s and Don’t’s

As the last members of the human race that will be able to remember video stores and landlines, millennials are also the first generation to have their entire adult lives recorded by social media. The Generation Y’ers are finally starting to cultivate their professional careers, and keeping up a positive presence and reputation online is the key to making those career aspirations a reality. After all, with over a quarter of the earth’s population registered on some form or another of social media, few of us are safe from a quick Google search.

LinkedIn is starting to gain a lot of traction in the professional realm, as recent data suggests Google is doing is driving a ton of traffic to the social media platform. So the next time you apply for a job, there’s a pretty good chance that your prospective employer will be redirected to your LinkedIn profile. And with summer job opportunities right around the corner, I can’t think of s better time for the Digital Tattoo’s inaugural guide to LinkedIn: 10 Do’s and Don’ts.

DO: Have a good headshot

The most notable thing on any social media page is the profile picture. So why not use this as an opportunity to share that beautiful face of yours with prospective employers? Of course, a lot of us don’t have those professional looking headshots that some of our peers do, but some universities do offer free headshot workshops. Keep your eyes open for what services your campus might offer. And remember, worst-case scenario, you can always throw on a collared shirt and start firing away selfies.

DON’T: Leave your profile picture blank

Nobody likes a silhouette. Remember, in the age of social media, that face of yours is what’s going to draw attention to your page—and not having could even leave a negative impression on employers.

DO: Let your personality shine

If a good headshot is the heart of a good LinkedIn profile, than your ‘about me’ section is definitely the soul. You can use that space to not only highlight your most prized accomplishments, but it’s also an opportunity for them to get to know your personality. Treat it like a writing sample, letting them know where you’ve been and what your goals are. And don’t forget, a little humour can go a long way.

DON’T: Lie about your experience

This one seems obvious, although there is a fine line between up-selling some of your experience and outright lying. While I’m sure many of us are guilty of jazzing up of their work titles (I’ll admit, in my early days of moving furniture I would market myself as a ‘relocation technician’), outright falsifying work experience is a considerable offence. It’s easy to burn bridges when telling fibs, and you might even find yourself on the wrong end of a blacklist. Make sure you’re honest—you never know when a lie will comeback to haunt you, and the internet has made it a lot easier to single out the cheaters.

DO: Link to past work and accomplishments

A unique feature of LinkedIn is that it allows you to share samples of your work, essentially acting as an online portfolio. Share some of your proudest work to show potential employers what you can do.

DON’T: Link to Twitter

Twitter is a horse of a different colour. There’s a limit to what 150 characters can say, and often times the meaning of your old tweets can get lost over time. Don’t risk having a single tweet be taken out of context by your future boss.

DO: Keep all your jobs up to date

It’s a good habit to update your LinkedIn page every time you take on some new work. Not only will you let your connections know about your sweet new gig, but you’ll save yourself from one mega-update in the future.

DON’T: Undervalue your previous jobs

A lot of students come out of university with very little professional experience, so it’s always important to highlight some of the skills and techniques you might have acquired from previous jobs that might, on the surface, appear to have no relevance to your new career path. For example, you might feel silly sharing your experience as a burger flipper on the professional network, but working in a kitchen can require a lot of teamwork, communication, problem solving, and working under pressure. Don’t sell yourself short.

DO: Endorse the work of your connections

LinkedIn allows you to vouch for the abilities of your connections by ‘endorsing’ some of their skills. It doesn’t take too much effort to endorse a connection, and in doing so, you might just get a few endorsements back. These points of reference can be very appealing to potential employers, especially if you have some reputable endorsers.

DON’T: Try to make false connections

It’s common belief that the more followers we have, the more important we are—but LinkedIn doesn’t quite follow that logic. A good profile—complete with awards, accomplishments and writing samples—can stand on it’s own. Have faith in who you are, not how many connections you have.

Think there’s something we missed? Hit our comment section below to share some of your LinkedIn tips and experiences!

How ‘open data’ can actually be closed

Last October, I had the privilege of covering Open Access Week for the Digital Tattoo Project, where some of the most forward-thinking minds in the world of ‘open access’ learning delivered a series of presentations that ultimately boiled down to one essential idea: everyone should have access to knowledge and information.

The premise seems obvious, and to the average college student, it might even seem redundant– after all, between the combined efforts of Google and Wikipedia, you can pretty well figure out everything you need to know, can’t you? Well, it’s not quite that simple.

According to a 2012 STM report, each year, research institutions across the world churn out about 1.8 million articles across 28,000 journals. The unfathomable number represents an ever-increasing body of knowledge. However, these numbers become worrisome when we actually consider just how many people actually have access to this material. The bulk of these journals are confined to university libraries, while strong academic language can confuse even the sharpest of undergrads (if I had a nickel for every scholarly sentence that flew over my head, I’m sure I could have shaved a few thousand off of my tuition).

The major point of concern is that most of the knowledge being produced today is inherently exclusionary. And to quote the passionate Dr. Jon Willinksy from his keynote speech at Open Access Week, “knowledge is of no use locked up.”

The emergence of MOOC’s and ‘Open Textbooks’ indicate that there are more accessible models of education are opening up. And while they might not be the norm (at least not yet), they’re definitely growing. But according to Dr. Willinsky, the next frontier is ‘open data’.

‘Open data’ refers to datasets provided by research institutions and governments. Local governments are one of the most popular open data gatherers. A quick look at the B.C. Governments data catalogue offers everything from the results of rural land surveys to public high school graduation rates. However, just because the information is public does not mean it is accessible.

A major problem with open data is that it is inherently closed: they’re supplied in large and complex excel worksheets and their meaning is hidden amidst a barrage of columns and rows. To make sense of such data not only requires the use of visualization software (many of which are quite expensive), but also a technical proficiency that only comes after years of practice.

Some argue that there should be standards set in place for open data catalogues to be more digestible for the general public, especially when coming from local governments. But in British Columbia, both the provincial and municipal governments continue to churn out raw spreadsheets. At any rate, there are a multitude of online resources that can allow you to play around with some of these datasets (and who knows, maybe even find a breaking news story hidden inside!). Google Fusion Tables, Many Eyes, and Tableau Public are free online visualization tools that are quite user friendly (in the case of Tableau Public, a free demo is offered). Take a look at some of the user generated content (like this glimpse into the traffic habits of Vancouver cyclists), and see how others are helping to interpret the ‘open data’.

Do you guys think local governments and research bodies should make their ‘open data’ a little more digestible? Hit the comment section below with your thoughts.

For further information, take a look at our page on Open Learning