The Time Spent Talking Among the Class and Clothes for the Week

Group Table numbering
Group Table numbering

For Data Collection and Observations this week, I tracked and totaled the amount of time spent talking within the class. I tracked the amount of time spent talking by groups and professor Sample along with the amount of collaboration among the group.

Tuesday

29 total in class= 11 long sleeve shirts and 3 pants were worn.

Talking Among the Groups

Professor Sample- 23 mins, 25:58 seconds

Group 1- 1 min, 39:16 seconds

Group 2- 4 mins, 39:30 seconds

Group 3- 1 min, 27:20 seconds

Group 4- 2 mins, 14 seconds

Group 5- 2 mins, 56:13 seconds

Group 6- 1 min, 44:46 seconds

Group 7- 1 min, 35:23 seconds

Group 8- 1 min, 23:42 seconds

Collaboration Among the Groups- 33 mins, 54:52 seconds

Longest streak of groups responding to each other- 9 (when talking about Genius.com)

Professor Sample spoke the most whenever introducing the next part of the lesson for the day. Within the different sections of the lesson, student groups controlled the flow of conversation.

Thursday

29 total in class= 19 long sleeve shirts and 25 pants were worn.

Talking Among the Groups

Professor Sample- 16 mins, 52:04 seconds

Group 1- 22:01 seconds

Group 5- 8:21 seconds

Group 6- 5:12 seconds

Collaboration among the groups- 57 mins, 32:22 seconds

Longest streak of talking among groups= 2

Lots of Collaboration due to the workshop.

Meaning Behind a Digital Network

Through technology, we choose who we associate ourselves with. The association with someone would create an edge between nodes. The edge forms a network that connects two nodes together where the nodes of family, friends, and associates are now connected to both nodes. For example, Facebook is a digital network where two people can become friends on Facebook. Now, the friends of these two individuals are connected through a path that are formed by two individuals, unless the friends already have mutual friends. Ulises Ali Mejias states in Off the Network how “to ‘Friend’ in a social network that establishes a correspondence between two records of data (47). Every day, Facebook users are being connected together as one can find Facebook to consist of a giant component that encompasses every Facebook user being connected through edges. Even if one creates a new Facebook account, then they will soon friend someone else that will tie them into the giant component. Yet, the downfalls behind the giant component of Facebook include disruptive forces like a person impersonating a real-world friend that could disrupt the connection between you and your friends.

Furthermore, through Facebook, we witness various Facebook users discover their friends to have hidden mutual friends that may have not been discovered through technology. David Easley and Jon Kleinberg states this idea, small-world phenomenon, where the world looks “small” when you think of how short a path of friends it takes to get from you to almost anyone else (35). The downside from this phenomenon is it doesn’t mean you’re socially close to them.

Facebook friends
http://socialmediaiseasy.blogspot.com/2012/11/learn-how-to-use-facebook-basics.html

David Easley and Jon Kleinberg, “Graphs” from Networks, Crowds, and Markets: Reasoning about a Highly Connected World (2010)

Ulises Ali Mejias, “Computers as Socializing Tools” from Off the Network: Disrupting the Digital World (2013)

Data Collection for Week 4

Tuesday

  • 19/29 students had jackets (66%)
  • 2/19 wore jackets inside the classroom, while 17/19 were placed on chairs
  • Total of 10 drinks on the table (34% of classroom with a drink)
  • 7 waters, 2 coffees, 1 soda, 0 juice
  • 10/29 printed out the articles for the day.

Thursday

  • 14/26 students had jackets (54%)
  • 3/14 wore jackets inside the classroom, while 11/14 were placed on chairs
  • Total of 9 drinks on the table (35% of classroom with a drink)
  • 6 waters, 2 coffees, 0 soda, 1 juice
  • Plus, 1 candy eaten today in class= Skittles
  • 4/26 printed out the article for the day.
  • Time spent chatting with Micki= 25 minutes

Interestingly, out of both day, there was only one person who ate something during class, which was the candy. Also, with the temperature increase from Tuesday to Thursday, less jackets were brought to class as there was a 12 percent decrease.

The United States’ Surveillance

data surveilllanceConstantly, we are monitored and observed by the United States government. The government has a complex surveillance system that controls the flow of information and data through the usage of flagging people and intercepting communication messages through the internet or postal service. In Nineteen Eighty-Four by George Orwell, one can see a government have total control over a society through surveillance. The government utilizes electronic media to manipulate the citizens through the censoring of information. The censorship of information involved destroying knowledge that existed and creating new information to control the population. They eliminated any information that would disagree with the way the government rules, since it could fuel or potentially start a revolution. Also, the government “kept those watched subordinate by means of uncertainty” (Lyon 60). In other words, the citizens always had a possibility that someone was watching them or reading their minds. They had a certain pressure to be always be in line with the government because they never knew when Big Brother was watching.

Furthermore, the surveillance utilized in Orwell’s book is similar to how our government controls the flow of information today. The United States government utilizes the identification of code or key words that alerts the government of potential threats. Also, the government can listen in on phone calls and intercept text messages to get rid of potential threats. In addition, the government has a detailed account of every single citizen through the categorization of search engines. Clearly, the government in Orwell’s book is very similar to our government today.

David Lyon, “From Big Brother to the Electronic Panopticon” from The Electronic Eye: The Rise of Surveillance Society (1994)