Revisiting IT Policy #3: Harassment

The so-called “star wars” campuses of the mid-1980s (Brown, Carnegie Mellon, Dartmouth, and MIT) invented (or at least believe they invented–IT folklore runs rampant) much of what we take for granted and appreciate today in daily electronic life: single signon, secure authentication, instant messaging, cloud storage, interactive online help, automatic updates, group policy, and on and […]

You Report. We Decide?

“It’s one of the real black marks on the history of higher education, ” Leon Botstein, the long-time President of Bard College, recently told The New Yorker’s Alice Gregory, “that an entire industry that’s supposedly populated by the best minds in the country … is bamboozled by a third-rate news magazine.” He was objecting, of […]

Notes on “Swag”

(…with apologies to Susan Sontag, of course.) Visiting the trade show at the EDUCAUSE conference requires strategy. At one time it was simple: collect every pen being given away (having some conversations with vendors in the process), so that back home the kid could give them to his friends at school. Kid grew up, though, and […]

Michael

Kim reread the message from Jack Oiler: My concern is about one Michael Zareny, who is using his University identity to post comments in Reddit and elsewhere and to send messages with extremely derogatory claims about gay men. Normally I would be most solidly against censorship, but if similar remarks about the immorality of Jews […]

Bobby

“All I really wanted to do last night,” Kim complained to a friend, “was find out how badly the Red Sox had lost in the afternoon game.” Then, the way these things unfold on the Internet, one thing led to another. I started looking at blog posts about the game, then at game pictures random […]

Alex

“You can’t possibly be serious!,” Jamie shouted, near the end of a long meeting, one that no one thought would turn out so controversial. “Are you saying that privacy is more important than security?” The issue was whether to put surveillance cameras in the campus’s parking-lot stairwells, in the hope that the cameras would discourage […]

Judy

Is there a computer cluster somewhere where someone can be safe from pornography and harassment? I’m sick of this. Kim, the University’s Director of Academic Computing, knew from a conversation with the University Ombudswoman what Judy Hamilton was complaining about: she had gone into a public computing cluster and sat down next to a male […]

Mythology, Belief, Analytics, & Behavior

I’m at loose ends after graduating. The Dean for Student Affairs, whom I’ve gotten to know through a year of complicated political and educational advocacy, wants to know more about MIT‘s nascent pass/fail experiment, under which first-year students receive written rather than graded evaluations of their work. MIT being MIT, “know more” means data: the Dean wants […]

Revisiting IT Policy #2: Campus DMCA Notices

Under certain provisions from the Digital Millennium Copyright Act, copyright holders send a “notification of claimed infringement” (sometimes called a “DMCA” or “takedown” notice) to Internet service providers, such as college or university networks, when they find infringing material available from the provider’s network. I analyzed counts of infringement notices from the four principal senders […]

Revisiting IT Policy #1: Network Neutrality

The last time I wrote about network neutrality, higher education was deeply involved in the debate, especially through the Association of Research Libraries and EDUCAUSE, whose policy group I then headed. We supported a proposal by the then Federal Communications Commission (FCC) chairman, Julius Genachowski, to require public non-managed last-mile networks to transmit end-user Internet traffic neutrally. […]