Skip to main content

Home/ Diigo In Education/ Group items tagged domain

Rss Feed Group items tagged

D. S. Koelling

Embracing the Cloud: Caveat Professor - The Digital Campus - The Chronicle of Higher Ed... - 37 views

  • My work as chief privacy and security officer at a large public university has, however, given me pause to ask if our posture toward risk prevents us from fully embracing technology at a moment of profound change.
  • Consequently, faculty members are accepting major personal and institutional risk by using such third-party services without any institutional endorsement or support. How we provide those services requires a nuanced view of risk and goes to the heart of our willingness to trust our own faculty and staff members.
  • The technologically savvy among us recognize that hard physical, virtual, and legal boundaries actually demark this world of aggressively competitive commercial entities. Our students, faculty, and staff often do not.
  • ...5 more annotations...
  • But can we embrace the cloud? Can the faculty member who wears our institution's name in her title and e-mail address, to whom we've entrusted the academic and research mission of the institution, be trusted to reach into the cloud and pluck what she believes is the optimal tool to achieve her pedagogical aims and use it? Unfortunately, no. Many faculty and staff members simply use whatever service they choose, but they often do not have the knowledge or experience needed to evaluate those choices. And those who do try to work through the institution soon find themselves mired in bureaucracy.
  • First we review the company's terms of service. Of course, we also ask the company for any information it can provide on its internal data security and privacy practices. Our purchasing unit rewrites the agreement to include all of the state-required procurement language; we also add our standard contract language on data security. All of this information is fed into some sort of risk assessment of varying degrees of formality, depending on the situation, and, frankly, the urgency. That leads to yet another round of modifications to the agreement, negotiations with the company, and, finally, if successful, circulation for signatures. After which we usually exhume the corpse of the long-deceased faculty member and give him approval to use the service in his class. We go through this process not from misguided love of bureaucracy, but because our institutions know of no other way to manage risk. That is, we have failed to transform ourselves so we can thrive and compete in the 21st century.
  • But our faculty and staff are increasingly voting with their feet—they're more interested in the elegance, portability, and integration of commercial offerings, despite the inability to control how those programs change over time. By insisting on remaining with homegrown solutions, we are failing to fall in lockstep with those we support.
  • Data security? Of course there are plenty of fly-by-night operations with terrible security practices. However, as the infrastructure market has matured (one of the generally unrecognized benefits of cloud services), more and more small companies can provide assurances of data security that would shame many of us even at large research-intensive institutions.
  • If higher education is to break free of the ossified practices of the past, we must find ways to transfer risk acceptance into the faculty domain—that is, to enable faculty to accept risk. Such a transformation is beyond the ability of the IT department alone—it will require our campus officials, faculty senates, registrars, and research and compliance officers working together to deeply understand both the risks and the benefits
Javier E

The Default Major - Skating Through B-School - NYTimes.com - 41 views

  • Dr. Mason, who teaches economics at the University of North Florida, believes his students are just as intelligent as they’ve always been. But many of them don’t read their textbooks, or do much of anything else that their parents would have called studying. “We used to complain that K-12 schools didn’t hold students to high standards,” he says with a sigh. “And here we are doing the same thing ourselves.”
  • all evidence suggests that student disengagement is at its worst in Dr. Mason’s domain: undergraduate business education.
  • “Business education has come to be defined in the minds of students as a place for developing elite social networks and getting access to corporate recruiters,”
  • ...13 more annotations...
  • It’s an attitude that Dr. Khurana first saw in M.B.A. programs but has migrated, he says, to the undergraduate level.
  • Second, in management and marketing, no strong consensus has emerged about what students ought to learn or how they ought to learn it.
  • Gains on the C.L.A. closely parallel the amount of time students reported spending on homework. Another explanation is the heavy prevalence of group assignments in business courses: the more time students spent studying in groups, the weaker their gains in the kinds of skills the C.L.A. measures.
  • The pedagogical theory is that managers need to function in groups, so a management education without such experiences would be like medical training without a residency. While some group projects are genuinely challenging, the consensus among students and professors is that they are one of the elements of business that make it easy to skate through college.
  • “We’ve got students who don’t read, and grow up not reading,” he says. “There are too many other things competing for their time. The frequency and quantity of drinking keeps getting higher. We have issues with depression. Getting students alert and motivated — even getting them to class, to be honest with you — it’s a challenge.”
  • “A lot of classes I’ve been exposed to, you just go to class and they do the PowerPoint from the book,” he says. “It just seems kind of pointless to go when (a) you’re probably not going to be paying much attention anyway and (b) it would probably be worth more of your time just to sit with your book and read it.”
  • “It seems like now, every take-home test you get, you can just go and Google. If the question is from a test bank, you can just type the text in, and somebody out there will have it and you can just use that.”
  • This is not senioritis, he says: this is the way all four years have been. In a typical day, “I just play sports, maybe go to the gym. Eat. Probably drink a little bit. Just kind of goof around all day.” He says his grade-point average is 3.3.
  • concrete business skills tend to expire in five years or so as technology and organizations change.
  • History and philosophy, on the other hand, provide the kind of contextual knowledge and reasoning skills that are indispensable for business students.
  • when they hand in papers, they’re marked up twice: once for content by a professor with specialized expertise, and once for writing quality by a business-communication professor.
  • a national survey of 259 business professors who had been teaching for at least 10 years. On average, respondents said they had reduced the math and analytic-thinking requirements in their courses. In exchange, they had increased the number of requirements related to computer skills and group presentations.
  • what about employers? What do they want? According to national surveys, they want to hire 22-year-olds who can write coherently, think creatively and analyze quantitative data, and they’re perfectly happy to hire English or biology majors. Most Ivy League universities and elite liberal arts colleges, in fact, don’t even offer undergraduate business majors.
tecno teach

Woodland, J. (2011) Psychology for the classroom: E-Learning. Oxon: Routledge - 4 views

    • tecno teach
       
      Chapter 4 - Pedagogy Motivation through the possible 'white heat of technology' - the newness. * Emotional engagement *Immediacy * Action Engagement * Cognitive Engagement - see the Hierarchy of Engagement on page 75. * Creative and Critical Thinking - Bono's Six Thinking Hats and Technology * Using VLEs * Social Interaction - Oliver and McLaughlin (1996) proposed five levels of teacher-learner interaction: social, procedural, expository, explanatory and cognitive. * Engagement * Assessment
    • tecno teach
       
      Chapter 2 - Theory: * Piaget's stages of cognitive development and technologies. * Skiiner's programmed learning theory - technology programmes that are task analysis, sequencing of learning and presentation of concepts through step by step positive reinforcement. * Wenger Communities of Practice * Gilly Salmon (2005) five-step model of levels of maturity in online environments: access and motivation/ online socialisation/ information exchange/ knowledge construction/ learner development. * GBL and Avatars discussed.
    • tecno teach
       
      Those against technology - Tanya Byron stating they technology is affecting children's minds.
    • tecno teach
       
      Changing attitudes whilst online - different identities - different ways some converse.
    • tecno teach
       
      * Motivation of learning - attention, confidence, satisfaction, appreciation and relevance
    • tecno teach
       
      Key aspects of book of relevance: * explains e-Learning - cybergogy (online pedagogy) * 3 modes of learning - expository, active and interactive * synchronous and asynchronous learning alongside cognitive and social natures of learning
  • grounding in both theory and pedagogical application
  • current research,
  • ...5 more annotations...
  • s illustrative case studies
  • cybergogy
  • behaviourism, cognitivism and constructivism in the context of e-learning.
  • social networking;
  • cybergogy and new learning domains
mrshathaway

Evaluating a Website or Publication's Authority - Web Literacy for Student Fact-Checkers - 25 views

  • most of us would like to ascribe authority to sites and authors who support our conclusions and deny authority to publications that disagree with our worldview
  • Wikipedia’s guidelines for determining the reliability of publications. These guidelines were developed to help people with diametrically opposed positions argue in rational ways about the reliability of sources using common criteria.
  • defined by process, aim, and expertise.
  • ...11 more annotations...
  • fact-checkers of all political stripes are happy to be able to track a fact down to one of these publications since they have reputations for a high degree of accuracy, and issue corrections when they get facts wrong.
  • a reliable source for facts should have a process in place for encouraging accuracy, verifying facts, and correcting mistakes
  • Process
  • researchers and certain classes of professionals have expertise, and their usefulness is defined by that expertise
  • Expertise
  • while we often think researchers are more knowledgeable than professionals, this is not always the case
  • Reporters, on the other hand, often have no domain expertise
  • Aim
  • Aim is defined by what the publication, author, or media source is attempting to accomplish
  • One way to think about aim is to ask what incentives an article or author has to get things right
  • In general, you want to choose a publication that has strong incentives to get things right, as shown by both authorial intent and business model, reputational incentives, and history
Randy Yerrick

Virtual Classroom - eLearning Learning - 9 views

  •  
    Virtual Classroom tips
Glenn Hervieux

2. Google Apps for EDU: Domain Best Practices - 64 views

  •  
    As the title indicates, there are best practices for setting up and maintaining your Google Apps EDU account.
« First ‹ Previous 81 - 87 of 87
Showing 20 items per page