Skip to main content

Home/ Diigo In Education/ Group items tagged maturity

Rss Feed Group items tagged

Martin Burrett

GameSalad - 115 views

  •  
    A great downloadable programme for making computer games for a variety of platforms and devices. Drag and drop items to make your creations. It's provides a more mature environment than tools like Scratch and there are many more options and advance settings for talented students. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
Clayton Mitchell

Information Security Program Assessment Tool | EDUCAUSE.edu - 12 views

  •  
    This self-assessment tool was created to evaluate the maturity of higher education information security programs
Roland Gesthuizen

How to Focus More in Class: 11 Steps (with Pictures) - wikiHow - 112 views

  •  
    "Slacking off during class isn't only a bad habit, but it's also very detrimental to your grade! Focusing in class really proves to teachers that you are a capable student but it also shows that you have got a solid level of maturity and self control, which will be very important in your future life. Read on to find out more about "How to Focus More in Class" "
Roland Gesthuizen

Everything you know about curriculum may be wrong. Really. « Granted, but… - 61 views

  • suppose today’s content knowledge is an offshoot of successful ongoing learning in a changing world – in which ‘learning’ means ‘learning to perform in the world.’
  • Problem-based learning and the case method not only challenge the conventional paradigm but suggest that K-12 education is increasingly out of touch with genuine trends for the better in education.
  • the point of learning is not just to know things but to be a different person – more mature, more wise, more self-disciplined, more effective, and more productive in the broadest sense. Knowledge is an indicator of educational success, not the aim
  •  
    "if we think of action, not knowledge, as the essence of an education; let's see what results from thinking of future ability, not knowledge of the past, as the core; let's see what follows, therefore, from thinking of content knowledge as neither the aim of curriculum nor the key building blocks of it but as the offshoot of learning to do things now and for the future"
Deborah Baillesderr

ScratchJr - Home - 59 views

  •  
    An iPad and junior version of the well know programming platform Scratch. The app has been designed for 5+ year olds and boosts simplified versions features of the more mature version. Children still snap programming blocks together to build amazingly creative things. http://ictmagic.wikispaces.com/ICT+%26+Web+Tools
  •  
    Scratch for ages 5 to 7
  •  
    "Coding is the new literacy! With ScratchJr, young children (ages 5-7) can program their own interactive stories and games. In the process, they learn to solve problems, design projects, and express themselves creatively on the computer."
Chai Reddy

Dr. Larry Dossey: Is Technology Making Children More Empathic? - 25 views

  • The shift into the distributed ICT [Information and Communications Technology] revolution, however, and the proliferation of social networks and collaborative forms of engagement on the Internet are creating deep fissures in the orthodox approach to education. The result is that a growing number of educators are beginning to revise curricula by introducing distributed and collaborative learning models into the classroom.
  • that media use among kids is so pervasive that it is time to stop arguing over whether it is good or bad and accept it as part of children's environment
  • Many observers such as Rifkin believe there are positives in the desire of kids to be electronically connected all the time. Concealed in this behavior, they say, is a need for acceptance and to be liked and loved, which is a healthy desire that has always been a part of the maturational process.
  • ...1 more annotation...
  • more focused attention in classrooms
trisha_poole

A Brief Guide to Learning Faster (and Better) « Scott H Young - 82 views

  • Anything that can be learned falls broadly into two categories: things you need to understand intellectually, and skills you need to be able to perform. Most things you want to learn involve a mix of the two.
  • ee the distinction between skills and concepts, you can devise two separate learning strategies for each.
  • Rule #1: Practice for Skills, Connections for Concepts
  • ...16 more annotations...
  • Rule #2: Concepts before Facts (95% of the time)
  • Patterns make concepts useful, patternless concepts tend to have a very limited use, so they aren’t studied that much.
  • But it needs more time to mature in the back of your head while you do other things. Worse, it utterly fails when put under intense stress or time constraints.
  • Rule #4: Concept Checklists are Useful
  • Then create a second-order list under each of the larger bullet points with sub-concepts.
  • Write out (I suggest on a word document, since it allows multiple levels of bullets) all of the major concepts covered in your course.
  • Heuristics for Learning Better
  • A concept checklist is a good way to handle those scary, “I don’t understand anything!” moments that many learners face. It allows you to dissolve the frightening implications of total ignorance into a step-by-step guide that can allow you to slowly conquer any subject.
  • Tactic #1: The 5-Year Old Method
  • Tactic #2: Metaphors
  • I recommend brainstorming for metaphors. Start with open-ended questions like: This idea reminds me of…? This idea is used in real-life situations, such as…? What phenomenon mimics this idea? If I wanted to tell a story about this idea, it would go like…?
  • Tactic #3: Visceralization
  • combine smell, feeling and motion into an image, not just a picture.
  • Tactic #4: Deep Linking
  • if you know you don’t actually have to deeply learn the material, going deeper into a subject can actually make the original idea easier to understand.
  • How to Learn Faster and Better
  •  
    1. How to Learn Faster - The basics of learning better 2. How to Learn Anything - Rules of thumb to master hard subjects 3. Tactics for Learning Better - Specific methods to learn faster
Dallas McPheeters

World's Simplest Online Safety Policy by Lisa Nielsen - 88 views

  • Students can access websites that do not contain or that filter mature content. They can use their real names, pictures, and work (as long it doesn’t have a grade/score from a school) with the notification and/or permission of the student and their parent or guardian
  •  Anyone can begin making a difference and contributing real work at any age.
  • what puts kids at risk are things like: having a lot of conflict with your parents being depressed and socially isolated being hyper communicating with a lot of people who you don't know being willing to talk about sex with people that you don't know having a pattern of multiple risky activities going to sex sites and chat rooms, meeting lots of people there, and behaving like an Internet daredevil.
  • ...11 more annotations...
  • Rules for tools don’t make sense. Rules for behaviors do.
  • It applies only to minors in places that apply for erate funds
  • The Children's Online Privacy Protection Act of 1998 (COPPA) applies to the online collection of personal information by persons or entities under U.S. jurisdiction from children under 13 years of age.
  • She uses Facebook with her First grade students
  • While children under 13 can legally give out personal information with their parents' permission
  • he Family Educational Rights and Privacy Act is a Federal law that protects the privacy of student education records
  • Schools may disclose, without consent, information such as a student's name, address, telephone number, date and place of birth, honors and awards, and dates of attendance.
  • applies to all schools that receive fund
  • addresses children’s education records
  • as long as it is not a grade or score
  • permission is not necessary
  •  
    what puts kids at risk are things like: having a lot of conflict with your parents being depressed and socially isolated being hyper communicating with a lot of people who you don't know being willing to talk about sex with people that you don't know having a pattern of multiple risky activities going to sex sites and chat rooms, meeting lots of people there, and behaving like an Internet daredevil.
Julie Whitehead

YouTube - What is a MOOC? - 99 views

  •  
    massive open online course
  •  
    Interesting concept but when I did a search for MOOC almost all the links I found were dead and gone. Looks like an early-edge idea that will have to mature over the next year or so.
D. S. Koelling

Embracing the Cloud: Caveat Professor - The Digital Campus - The Chronicle of Higher Ed... - 37 views

  • My work as chief privacy and security officer at a large public university has, however, given me pause to ask if our posture toward risk prevents us from fully embracing technology at a moment of profound change.
  • Consequently, faculty members are accepting major personal and institutional risk by using such third-party services without any institutional endorsement or support. How we provide those services requires a nuanced view of risk and goes to the heart of our willingness to trust our own faculty and staff members.
  • The technologically savvy among us recognize that hard physical, virtual, and legal boundaries actually demark this world of aggressively competitive commercial entities. Our students, faculty, and staff often do not.
  • ...5 more annotations...
  • But can we embrace the cloud? Can the faculty member who wears our institution's name in her title and e-mail address, to whom we've entrusted the academic and research mission of the institution, be trusted to reach into the cloud and pluck what she believes is the optimal tool to achieve her pedagogical aims and use it? Unfortunately, no. Many faculty and staff members simply use whatever service they choose, but they often do not have the knowledge or experience needed to evaluate those choices. And those who do try to work through the institution soon find themselves mired in bureaucracy.
  • First we review the company's terms of service. Of course, we also ask the company for any information it can provide on its internal data security and privacy practices. Our purchasing unit rewrites the agreement to include all of the state-required procurement language; we also add our standard contract language on data security. All of this information is fed into some sort of risk assessment of varying degrees of formality, depending on the situation, and, frankly, the urgency. That leads to yet another round of modifications to the agreement, negotiations with the company, and, finally, if successful, circulation for signatures. After which we usually exhume the corpse of the long-deceased faculty member and give him approval to use the service in his class. We go through this process not from misguided love of bureaucracy, but because our institutions know of no other way to manage risk. That is, we have failed to transform ourselves so we can thrive and compete in the 21st century.
  • But our faculty and staff are increasingly voting with their feet—they're more interested in the elegance, portability, and integration of commercial offerings, despite the inability to control how those programs change over time. By insisting on remaining with homegrown solutions, we are failing to fall in lockstep with those we support.
  • Data security? Of course there are plenty of fly-by-night operations with terrible security practices. However, as the infrastructure market has matured (one of the generally unrecognized benefits of cloud services), more and more small companies can provide assurances of data security that would shame many of us even at large research-intensive institutions.
  • If higher education is to break free of the ossified practices of the past, we must find ways to transfer risk acceptance into the faculty domain—that is, to enable faculty to accept risk. Such a transformation is beyond the ability of the IT department alone—it will require our campus officials, faculty senates, registrars, and research and compliance officers working together to deeply understand both the risks and the benefits
tecno teach

Woodland, J. (2011) Psychology for the classroom: E-Learning. Oxon: Routledge - 4 views

    • tecno teach
       
      Chapter 4 - Pedagogy Motivation through the possible 'white heat of technology' - the newness. * Emotional engagement *Immediacy * Action Engagement * Cognitive Engagement - see the Hierarchy of Engagement on page 75. * Creative and Critical Thinking - Bono's Six Thinking Hats and Technology * Using VLEs * Social Interaction - Oliver and McLaughlin (1996) proposed five levels of teacher-learner interaction: social, procedural, expository, explanatory and cognitive. * Engagement * Assessment
    • tecno teach
       
      Chapter 2 - Theory: * Piaget's stages of cognitive development and technologies. * Skiiner's programmed learning theory - technology programmes that are task analysis, sequencing of learning and presentation of concepts through step by step positive reinforcement. * Wenger Communities of Practice * Gilly Salmon (2005) five-step model of levels of maturity in online environments: access and motivation/ online socialisation/ information exchange/ knowledge construction/ learner development. * GBL and Avatars discussed.
    • tecno teach
       
      Those against technology - Tanya Byron stating they technology is affecting children's minds.
    • tecno teach
       
      Changing attitudes whilst online - different identities - different ways some converse.
    • tecno teach
       
      * Motivation of learning - attention, confidence, satisfaction, appreciation and relevance
    • tecno teach
       
      Key aspects of book of relevance: * explains e-Learning - cybergogy (online pedagogy) * 3 modes of learning - expository, active and interactive * synchronous and asynchronous learning alongside cognitive and social natures of learning
  • grounding in both theory and pedagogical application
  • current research,
  • ...5 more annotations...
  • s illustrative case studies
  • cybergogy
  • behaviourism, cognitivism and constructivism in the context of e-learning.
  • social networking;
  • cybergogy and new learning domains
1 - 12 of 12
Showing 20 items per page