Archive for the ‘Social Networking and Online Socializing’ Category

Intersubjectivity is a social process used for building meaning: “In its weakest sense, intersubjectivity refers to agreement. There is intersubjectivity between people if they agree on a given set of meanings or a definition of the situation. Similarly, Thomas Scheff defines intersubjectivity as “the sharing of subjective states by two or more individuals.”[2]”More subtly intersubjectivity can refer to the common-sense, shared meanings constructed by people in their interactions with each other and used as an everyday resource to interpret the meaning of elements of social and cultural life. If people share common sense, then they share a definition of the situation.[3]” This building of meaning is performed in groups.

Source: “Don’t You Think She Looks Tired?” | Duane Sharrock | LinkedIn

Advertisements

US History teachers at the secondary school level, as well as Global Studies and Participation in Government teachers, should explore this site and try to answer the big questions posed in this site.

Although this site focuses on religious diversity in the United States, it is also about answering the bigger questions about citizenship. It asks who Americans are when they say, “One nation under God”? So often, people make comments in social networks and in face to face conversations about the endangering of Christian beliefs and make claims that the USA is a Christian nation. They dismiss or forget the USA’s exceptionalism is linked to its pluralism. For the country to be “great”,  it must uphold and appreciate this history of inclusion, but must also include the ability to dialogue–not just talk for or talk at others–but to actually dialogue. Diana Eck explains: “Dialogue means both speaking and listening, and that process reveals both common understandings and real differences. Dialogue does not mean everyone at the “table” will agree with one another. Pluralism involves the commitment to being at the table — with one’s commitments.”

I have learned about this site from a Great Courses audiobook by Prof. Charles Kimballhttp://www.thegreatcourses.com/courses/comparative-religion.html. As I listen to the first few discs, it occurs to me that Marshall McLuhan’s descriptions of violence and tribalism are manifesting. We have to educate more people with messages from the Pluralism Project to drive back the tide of fear and intolerance.

Source: History of the Pluralism Project | The Pluralism Project

Open Innovation companies that help you innovate and solve problems. Click on a heading to add your comment or review.

Source: IdeaConnection: Outsourcing Innovation, Open Innovation

At some point in our careers, most of us have come across someone known as a “toxic worker,” a colleague or boss whose abrasive style or devious actions can make the workday utterly miserable. Such people hurt morale, stoke conflict in the office, and harm a company’s reputation.But toxic workers aren’t just annoying or unpleasant to be around; they cost firms significantly more money than most of them even realize. According to a new Harvard Business School (HBS) paper, toxic workers are so damaging to the bottom line that avoiding them or rooting them out delivers twice the value to a company that hiring a superstar performer does.

Source: Beware those toxic co-workers | Harvard Gazette

The most common response people offer is that dignity is about respect. To the contrary, dignity is not the same as respect. Dignity is our inherent value and worth as human beings; everyone is born with it. Respect, on the other hand, is earned through one’s actions.

https://www.psychologytoday.com/blog/dignity/201304/what-is-the-real-meaning-dignity-0

Romantic, personal and professional relationships are fraught with danger, but a University of Queensland researcher has found the secret to interacting successfully with others in such settings.

Source: Study reveals how to be socially successful

The site displays the ongoing work of the school’s Cold Case Project and includes more than 150,000 pages of FBI findings, resulting stories, photographs and letters from the U.S. Department of Justice to the victims’ next of kin. That correspondence details what FBI agents found when they reopened unsolved cases from the 1950s and 1960s some eight years ago.

via LSU launches cold case website – Hanna Newspapers: The Concordia Sentinel.

How to Handle Different Types of Social Engagement | Social Media Today.

When social media interactions are handled carefully, businesses can not only prove how professional they are, but will also boost brand visibility and loyalty with other customers. Listed below are some of the major types of feedback that businesses will encounter with social media, as well as tips to help you handle each problem or interaction.

 

Now take this statement and substitute “business” and “businesses” with school and schools. Not that I agree that schools should be run the same way businesses should be run, but much of the advice is about communication with people. School representatives, especially school leaders, need to respond to public concerns and comments that are slightly different from face-to-face interactions and phoned concerns.

 

5 Ways to Stay Mentally Strong When You’re Not Feeling “Good Enough”.

What to do:

  • Use a safe computer e.g., at the library to change your passwords for accounts you want to keep secure and then do not access them from your home computer.
  • Use a safe computer to create new email accounts with usernames that do not identify you. You might want to create a separate address for your financial accounts, one for trusted friends only and one that you can give to people who know both you and your abuser in case they forward correspondence on.
  • Talk to your children about not opening attachments in case they contain spyware.
  • Get a new computer if possible. Once spyware is on your computer, it may be extremely difficult or impossible to remove entirely.
  • If you don’t think your computer has spyware on it yet, ensure you have a secure firewall and install anti-spyware software that is set to update automatically. Keep in mind, however, that if you already have spyware, these steps won’t stop it from continuing to gather data.
  • Read more about spyware.
  • Turn your phone’s GPS function off. Some phones have the option to allow GPS only when dialing 911; if your phone has this capability, use this feature.
  • If you are receiving harassing phone calls, learn more about keeping logs and saving evidence to use in a legal case against your abuser.
  • If you plan to go to a shelter or safe house, it is imperative to leave your phone behind. Even phones that are turned off can provide information. Instead, get a prepaid cellphone that doesn’t require a contract or identifying information. They are cheap and easy to find.
  • Don’t post or share anything that you don’t want the world to know. Assume that anything you put on a social media account is open information and err on the side of caution.
  • Maintain strict control over your privacy settings on all accounts.
  • Facebook’s privacy settings change constantly, but they do allow you to customize them to an extent. Put people into different groups and give those groups different privileges. Change your settings so you must review tags before things are posted with you in them. Go through and untag previous posts.
  • Ask your friends not to post or share anything about you online without your permission. Stress that it could put your safety in jeopardy.
  • Consider unfriending people so they can’t see everything or deleting your social media accounts entirely.
  • Make these changes from a safe computer if you suspect yours has spyware.
  • If you believe you are being tracked or stalked, first see if there’s a GPS tracking device on your car and remove it. A small device may also be implanted in your clothing, shoes or purse. If you decide to go to a safe house or shelter, do not wear any old clothing; buy something new in case your old clothes were compromised.
  • Look for nanny cams and other surveillance devices in your home and at work.

via Domestic violence abusers use technology to stalk victims.