Values in the workplace

Dave Snowden has this appealing habit of making provocative points in his blog – I’m sure he appreciates that! Anyway, in his latest he writes (emphasis original) “Good leadership does not attempt to control values, it lives them.

I’ll willingly pick up a role I have already tried out, that of Dave’s extender (though not too much like a mediaeval rack, I hope). There is an ambiguity between one’s own values and the values of others which needs to be drawn out. The only values one can live out are one’s own, but the values Dave is noting the control of are the values of others.

What could better be said, in my opinion, is that good leadership develops the values of others, and develops (probably only) one of their identities. That process of development of values should be the natural follow-on to more prosaic personal or professional development, which at the prosaic end deals with skills and competence.

Developing values involves reflection. It can be the classic “can I look at myself in the mirror” scenario – that is, am I comfortable with my self-image as a person who does that kind of thing I am reflecting on. Ideally it involves rooting out hypocrisy – if I espouse one value in one context, I shouldn’t be doing something different in another context. To me, that’s a major moral imperative.

If hypocrisy is tolerated, the danger is that the substitute process can take place of moulding one’s ethical behaviour in a certain situation just to match the prevailing values practiced in that situation, or indeed to match the values of the people responsible for one’s promotion – which is what Dave is rightly complaining about.

To relate this to work (and JISC CETIS) I could point out that values include educational values, which are vital to learners’ engagement in educational processes.

Recording and reflecting

Nicholas Carr has a blog entry pointing to his Guardian article in which he writes
“As for Socrates, it’s hard to imagine that he’d be pleased with any of this. We’re so busy recording our lives that we have little time left to examine them. And perhaps that, more than anything else, is the real point.”

But the movement most concerned with e-portfolios as a PDP tool would precisely stress the value of the reflection. Indeed, there is no point in recording everything if there will be no reflection, but Carr seems to have forgotten the point that unless material is recorded, refection is prone to being inaccurate reconstruction, with the inevitable likelihood of self-deception. And the more the recording is automatic, the less time is spent on the process of recording, the more time there is to reflect. Though ideally, the process of recording is itself reflective.

LSE SSIT 7 workshop, 2007-03-19

The LSE’s SSIT 7 workshop “Identity in the Information Society: Security, Privacy, The Future” took place 2007-03-19 and 20 (Monday and Tuesday).Well, it was certainly a change for me to attend an event where there is no one who I have met before, and where my badge, declaring “JISC CETIS Portfolio SIG” drew curiosity but no recognition. The usual suspects were absent. And it’s refreshing to be reminded that there are a whole lot of people out there interested in identity coming from different starting points.

One of the starting points, relating to the venue at LSE, was the political slant. Human rights good, government interference bad; social workers good, information systems – well, if not entirely bad, then certainly highly suspect of being tools in the hands of an oppressive government. Confronted with what seemed to me like ancient lefty attitudes, I didn’t know whether to laugh, cry, or just throw in a couple of questions into the pot. I tried the last, but to little effect I think.

What did puzzle and disappoint was that this workshop seemed to be put together on the premise that people wanted to get together to join in criticism for anything that could remotely be associated with surveillance and control, and in particular identity cards and databases with personal information, but neither to accept any positive reasons why these things should be put forward in the first place, nor to offer any constructive alternatives. The spectre of Orwell’s 1984 still seems to have the power to deprive people of many of their critical faculties, despite times having moved on. Why don’t people bother at least to suggest ways in which the feared technology could be kept more under control?

Bruce Schneier seemed to fit well into this mould. I felt there was an element of scaremongering, and I couldn’t discern much by way of serious analysis. I look forward to having a look at his newsletter, “Crypto-Gram“, to find the constructive and valuable things that I didn’t get from this presentation. A serious point of criticism I have relates to his view of law. If we want protection, we must have laws that enact that protection, he seemed to be suggesting. But since when have criminals, and particularly organised criminals, respected laws? Laws do “change the dynamic” for law-abiding citizens, but I’d say that law-abiding citizens aren’t the main problem.

Bruce thought that the idea of the “death of privacy” was overrated. But what exactly, I started to wonder, is this “privacy” that people champion? Do people want to interact with the information society by withholding all information about themselves, and being asked every time for their permission to access every smallest piece of it? That would seem pretty shortsighted and timewasting to me: the thought wasn’t mentioned in any case.

The next speakers were at least very stimulating and entertaining. Simon Davies and Gus Hosein (of Privacy International as well as visiting fellows of LSE) seem to have made a bit of a career out of challenging the government specifically about the Identity Card proposals. Nice to see some material reported that could have come out of Private Eye.

The highlight of the day for me came in the afternoon, when I was about to give up hope of anything solidly interesting. Prof Brian Collins is the Department of Transport’s Chief Scientific Advisor, with a distinguished earlier career. He gave a thoroughly professional presentation on some of the technical pitfalls and challenges associated with Identity Management. He sees no reason why people should not use multiple identities, allied to an assumption of minimum disclosure. I hope his slides become available to prompt more recall.

The following morning we were back to old themes for a while. Terri Dowty, the Director of Action on Rights for Children, did give a useful catalogue of the different databases on which personal information about children may appear, now or planned. But this was all in a sinister-toned presentation which, for example, almost portrayed the Connexions service as an agent of repression. How about, I asked, proposing something positive, rather than just criticising the negative aspects of current and planned databases? What would she suggest? More front-line workers like social and youth workers; more money to help families … you probably get the picture, though she didn’t say “tax the fat cats”. What I rescued with my other question was that parents and children are in principle allowed to see records on “ContactPoint” (used to be called “information sharing index”) which is where much of this information is brought together. Perhaps that is what we ought to be advising people to do: at least to know what is there, and correct if needed.

Terri seemed to have a pretty rosy picture of the world in which only about one in 500 children need any urgent intervention. She portrayed a society where the constant intrusion into children’s private lives accentuates their dependency and interferes with the development of their sense of self. I couldn’t see it, personally. What is credible is that people won’t use a service if they suspect the information may be passed on to others. I think that lesson has been taken on board in the e-portfolio community already. What it does highlight for me is the need to elaborate ideas on ethical development.

Another positive highlight followed: Ross Anderson of Cambridge University talked about “Identity Privacy and Safety in e-Health” (though e-health is not a term he likes). This was a brilliant and committed expose of the pitfalls of large government IT projects, and hence the risks inherent in the NHS IT project. Interestingly for us, he sees the way forward as being with standards-based interoperability, and an open market in IT systems development. This is how Sweden manages to have a system that works.

For me, privacy needs a model different from the one implicit at this workshop. I’d say, better and more constructive to stop focusing on what one doesn’t want others to see, and start focusing on just what one does want different groups to see – or conversely, who is allowed to see any particular piece of information. It seems to me that here is another lesson that has already been learned, a while ago, by the e-portfolio community. Perhaps when one’s focus is on systems controlled by others, it is easy to focus on the dangers, not the opportunities given by systems if under the control of the individual. Clear lesson: let’s make sure that we continue to clearly advocate the user-centric design and development of user-controlled systems.

There’s one other principle I’d like to float, and it is about the visibility of traces of accessing information. My intuition is that if one could reasonably guarantee that all accesses of personal information were both properly logged and available to the “data subject”, then we would be much less unhappy about our information being on the databases in the first place. Is such technology feasible? What would it take?

Identity as a programming language

If Sam can do it (and at the same time claim that Scott and Adam have as well) then I guess we all can…

You are C++. You are very popular and open to suggestions. Many have tried to be like you, but haven't been successful
Which Programming Language are You?

It is very interesting to note how compulsive these kind of tests are: it seems like we all want to know how we are rated by others. Very natural. Perhaps we can get a hold of this and link it in to the domain of assessment and the issue of identity?

Also, there should be an easy way of presenting the results of such tests (OK, perhaps more serious ones) in an e-portfolio, and make that available to others to search on. Perhaps I’m saying no more than something about FOAF and another way in which it could be used: this certainly links to Scott’s approach to e-portfolios.

About identity

Found a very nice PDF file called “A Sociological Approach to Self and Identity“. I’m heartened that, despite my knowing next to nothing about this literature, many of the points here seem to echo things Anna and I said in our paper on “Ethical Portfolios: Supporting Identities and Values“, which I’ve also mentioned in previous blog posts.

As far as I can see, there is a common idea that people’s (several) identities are bound up with the roles they play and the groups they interact with. It’s a short step to introduce values (which the cited paper does, though not centrally) associated both with the groups and with the roles people play when interacting with those groups of people. Because we all interact in various different groups, playing various different roles, everyone has several different identities.

Going beyond the paper first mentioned, the challenge for personal ethical development is to develop a set of core values which permeate one’s behaviour across one’s whole life, without leading to rigidity and the inability to play the various roles one chooses to play effectively. It’s relatively easy to see examples of people who don’t seem to have developed a decent, good set of core values; but much more challenging to examine oneself critically in this regard.

Maybe one could see this as a kind of Holy Grail, or Philosopher’s Stone, of personal development. I hope that, if we (CRA, JISC CETIS) do manage to go ahead with a conference on identity later this year, we can include this developmental side of identity issues.

More on identity and e-portfolio concepts

Another of Scott’s posts (the one titled “Identity and Principal” ) takes the credit for sending me to look at This blog post by Dave Snowden. Dave Snowden is here interesting and intellectually amusing, certainly, but also a bit disappointing. Of the given five “characteristics of an identity”, three are negative or privative:

  • An identity is not the same thing as a role.
  • An identity does not have rigid boundaries, nor is it susceptible of precise definition.
  • Identity is not absolute, it can change in context or over time

one is rather recondite

  • Identity in human systems is a strange attractor

and the last

  • Identity is established by robust resilience

asserts more about how identity operates than about its nature.

What I get positively from Snowden is fuel for the idea that the principal unit of social analysis should not be the individual, but the identity. Snowden writes “that focusing on identity not the individual as the primary unit of analysis resolves a lot of otherwise intractable problems.” Very nice, and I am heartily inclined to agree. Sometime I’d like to add more to the discussion on the nature of identity.

So back to Scott. He says

“The issue for ePortfolios is what are they intended to evidence – an identity or a principal? For me, identity is a far better choice and more easily accomplished. However, we have to give up the concept of one-portfolio-per-principal, as principals are no longer within the scope of concern. This also means no one system for managing portfolios.”

I agree and disagree. I support the idea that e-portfolio systems revolve primarily about identities, rather than “principals”. We said things to that effect in our paper for the EIfEL 2006 ePortfolio conference in Oxford. But the idea of one-portfolio-per-principal is not one which bears any scrutiny: I’d classify it as a straw man. Everyone is familiar with the idea of one CV per application, not per person. Most e-portfolio systems that allow presentations are built around the idea that different things will be revealed to different people.

The logic of the following point depends on the confusion between portfolio as presentation and portfolio as e-portfolio management system (EPMS). Of course one EPMS can manage several different presentations.

Digital identity mishmash

I’m exercised by this post in Scott’s Workblog

It refers to a large diagram (not Scott’s I hasten to add) which purports to give some idea of people’s digital identity, but does it? To me it is more of a mish-mash – anyone can sit down, think about what electronic traces they leave in the world, and roughly categorise that into something with a little visual appeal. But on deeper analysis, what is there? What is it actually saying?

It’s a phenomenon I think of as the triumph of presentation over content. I see it as what politicians are good at – giving the impression of being not only terribly concerned about whatever problem might be salient, but with some good policies to tackle it. Or so it seems at first glance, which is all voters often give.

And people who go in for this strategy seem averse to any real critique. They don’t offer much, and they brush off any they receive. What they criticise is only things that are easy to demonise. Straw men proliferate, as long as people don’t recognise them as straw men.

I’ve seen this too many times now. No, I’m not going to name names. I just invite readers to use their critical faculties. Think. Reason. Don’t be afraid of criticism: just make it constructive, and kind whenever possible.

Evolution v growth everywhere (not just learning technology)

Stephen Downes’s whiteboard (in op cit) shows what purports to be an evolution from groups to networks. This strikes me as far too much about global evolution (as in “we’re onto the next big thing”). It is really, in my opinion, about personal growth and development. People grow from needing the security of what are characterised as “groups” to being able to function in the relatively unprotected area of what are called “networks”. But one should not be dogmatic about this kind of thing. There will always be people (of all ages) who function better within the confines of the “group”. “Networks” aren’t better, they are just a different way of doing things.

Thus in educational technology, we shouldn’t be following this kind of thing as the way we ought to be developing new tools (whether it is called “e-learning 2.0″ or whatever) but we should be developing technology to support people where they are and ideally to help prepare them for moving on to ever greater personal (ethical) development, freedom, integrity – you name your favourite positive value.

Why people believe things: associated values

Reading Stephen Downes’s article, Learning Networks and Connective Knowledge, October 16, 2006

Insight: people’s views about things are often really reflections of their values, rather than statements of beliefs about fact. People believe things because of the connotations; because of the other people that believe them; because of the values that they perceive to be associated with them.

But (and here is the big “but” ) discussion and argument rapidly become fruitless and futile on this model. You can’t argue against values through “mere” facts.

Solution: surface the values. Help people to make their values explicit, so that they don’t have to use beliefs about things as proxies. That way, if we have congruent values, we can work together even though we may differ in our beliefs.

Blended approach on CETIS site…

Well, lo and behold! While folks are discussing folksonomies on the METADATA list, the official conference wiki page has this

cetis-2006-conference

If you want to tag an item for a particular session, use one of these:

cetis-2006-conference-media
cetis-2006-conference-games
cetis-2006-conference-portfolios
cetis-2006-conference-accreditation
cetis-2006-conference-ple
cetis-2006-conference-architecture
cetis-2006-conference-institutions
cetis-2006-conference-unthinkable

Very nice example, if I may say so, of, not quite a controlled vocabulary, but the best kind of sort-of “guidance” vocabulary. This is the kind of thing we need if folksonomic tags are going to work better than the critics of Clay Shirky fear.