Intersubjectivity is a social process used for building meaning: “In its weakest sense, intersubjectivity refers to agreement. There is intersubjectivity between people if they agree on a given set of meanings or a definition of the situation. Similarly, Thomas Scheff defines intersubjectivity as “the sharing of subjective states by two or more individuals.””More subtly intersubjectivity can refer to the common-sense, shared meanings constructed by people in their interactions with each other and used as an everyday resource to interpret the meaning of elements of social and cultural life. If people share common sense, then they share a definition of the situation.” This building of meaning is performed in groups.
Archive for the ‘Social Networking and Online Socializing’ Category
Tags: awareness, career, emotional and social skills, gossiping, intersubjectivity, personal development, rumors, social intelligence, social processes, social skills, status
Tags: a place at the table, comparative religion, data collection, diversity, global studies, history, inclusion, mapping, Participation in Government, pluralism, Pluralism Project, religion, United States of America, US History
US History teachers at the secondary school level, as well as Global Studies and Participation in Government teachers, should explore this site and try to answer the big questions posed in this site.
Tags: crowd sourcing, open source, problem solving, recombinant innovation
Open Innovation companies that help you innovate and solve problems. Click on a heading to add your comment or review.
Tags: business decision making, culture, culture and society, Decision making, leadership, morale, superstar performer, toxic employees
At some point in our careers, most of us have come across someone known as a “toxic worker,” a colleague or boss whose abrasive style or devious actions can make the workday utterly miserable. Such people hurt morale, stoke conflict in the office, and harm a company’s reputation.But toxic workers aren’t just annoying or unpleasant to be around; they cost firms significantly more money than most of them even realize. According to a new Harvard Business School (HBS) paper, toxic workers are so damaging to the bottom line that avoiding them or rooting them out delivers twice the value to a company that hiring a superstar performer does.
Tags: acknowledgement, dignity, human, respect, value
The most common response people offer is that dignity is about respect. To the contrary, dignity is not the same as respect. Dignity is our inherent value and worth as human beings; everyone is born with it. Respect, on the other hand, is earned through one’s actions.
Tags: interaction, social intelligence
Tags: Cold Case Project, cold cases, DoJ, FBI
The site displays the ongoing work of the school’s Cold Case Project and includes more than 150,000 pages of FBI findings, resulting stories, photographs and letters from the U.S. Department of Justice to the victims’ next of kin. That correspondence details what FBI agents found when they reopened unsolved cases from the 1950s and 1960s some eight years ago.
Tags: clients, complaints, customer service, praise, school leadership, social networking
When social media interactions are handled carefully, businesses can not only prove how professional they are, but will also boost brand visibility and loyalty with other customers. Listed below are some of the major types of feedback that businesses will encounter with social media, as well as tips to help you handle each problem or interaction.
Now take this statement and substitute “business” and “businesses” with school and schools. Not that I agree that schools should be run the same way businesses should be run, but much of the advice is about communication with people. School representatives, especially school leaders, need to respond to public concerns and comments that are slightly different from face-to-face interactions and phoned concerns.
Tags: blame, fortitude, judgment, Mindfulness, persistence, resilience, self development
Tags: cell phones, computer technology, domestic abusers, mobile phones, spyware, stalking, tracking
What to do:
- Use a safe computer e.g., at the library to change your passwords for accounts you want to keep secure and then do not access them from your home computer.
- Use a safe computer to create new email accounts with usernames that do not identify you. You might want to create a separate address for your financial accounts, one for trusted friends only and one that you can give to people who know both you and your abuser in case they forward correspondence on.
- Talk to your children about not opening attachments in case they contain spyware.
- Get a new computer if possible. Once spyware is on your computer, it may be extremely difficult or impossible to remove entirely.
- If you don’t think your computer has spyware on it yet, ensure you have a secure firewall and install anti-spyware software that is set to update automatically. Keep in mind, however, that if you already have spyware, these steps won’t stop it from continuing to gather data.
- Read more about spyware.
- Turn your phone’s GPS function off. Some phones have the option to allow GPS only when dialing 911; if your phone has this capability, use this feature.
- If you are receiving harassing phone calls, learn more about keeping logs and saving evidence to use in a legal case against your abuser.
- If you plan to go to a shelter or safe house, it is imperative to leave your phone behind. Even phones that are turned off can provide information. Instead, get a prepaid cellphone that doesn’t require a contract or identifying information. They are cheap and easy to find.
- Don’t post or share anything that you don’t want the world to know. Assume that anything you put on a social media account is open information and err on the side of caution.
- Maintain strict control over your privacy settings on all accounts.
- Facebook’s privacy settings change constantly, but they do allow you to customize them to an extent. Put people into different groups and give those groups different privileges. Change your settings so you must review tags before things are posted with you in them. Go through and untag previous posts.
- Ask your friends not to post or share anything about you online without your permission. Stress that it could put your safety in jeopardy.
- Consider unfriending people so they can’t see everything or deleting your social media accounts entirely.
- Make these changes from a safe computer if you suspect yours has spyware.
- If you believe you are being tracked or stalked, first see if there’s a GPS tracking device on your car and remove it. A small device may also be implanted in your clothing, shoes or purse. If you decide to go to a safe house or shelter, do not wear any old clothing; buy something new in case your old clothes were compromised.
- Look for nanny cams and other surveillance devices in your home and at work.