Skip to main content

Home/ elearning 2.0/ Group items tagged Theory

Rss Feed Group items tagged

Mari Yamauchi

CALICO Journal - 4 views

  •  
    CALICO Journal http://ow.ly/2EVCc - Interested in "Investigating Learner Variability: The Impact of Task Type on Language Learners' Errors.. CALICO Journal Jan 2011 - "dedicated to #SLA theories and technology-mediated language learning" http://ow.ly/3NHs0 #edtech #EFL #MFL @TechTongues Thanks for the RT: http://ow.ly/3NHs0
Allison Kipta

Characteristics of Technology-Based Virtual Learning Communities - 15 views

  •  
    "This article defines 'community' for educators and proceed to examine fundamental issues around new theories and practice for constructing learning communities. Our concept of community asks the reader not to consider the shape of institutions or "schools" that exist today, but to ponder some possible shapes for (virtual) learning communities that could exist tomorrow. Second, we discuss some foundational considerations from theoreticians preparing us to build these communities with technological support. Practical issues around building new communities are illustrated with examples of virtual community types - including examples of technologically supported learning strategies that fall far short of our definition of virtual learning communities. Finally, some tactics for building robust learning communities are offered."
Leo de Carvalho

http://it.coe.uga.edu/itforum/paper92/paper92.html - 0 views

  •  
    The purpose of this paper is to outline some of the thinking behind new e-learning technology, including e-portfolios and personal learning environments. Part of this thinking is centered around the theory of connectivism, which asserts that knowledge - and therefore the learning of knowledge - is distributive, that is, not located in anygiven place (and therefore not 'transferred' or 'transacted' per se) but rather consists of the network of connections formed from experience and interactions with a knowing community. And another part of this thinking is centered around the new, and the newly empowered, learner, the member of the net generation, who is thinking and interacting in new ways. These trends combine to form what is sometimes called 'e-learning 2.0' -an approach to learning that is based on conversation and interaction, on sharing, creation and participation, on learning not as a separate activity, but rather, as embedded in meaningful activities such as games or workflows.
Nigel Coutts

Realising the benefits of reflective practice - The Learner's Way - 0 views

  •  
    It is generally accepted that learning is enhanced by the inclusion of deliberate, reflective practice. Indeed the act of reflecting on the impact that our actions have towards the achievement of any goal (learning oriented or other) is shown to have a positive impact. Reflective practice is defined as the praxis (interdependent and integrated theory, practice, research, thought and action) of individuals or groups to move from 'better thinking to better action' as a result of reflection for, in and on learning (Harvey et al. 2010 p140). With this in mind, it is worth considering what reflective practice might look like and to consider it in a range of contemporary contexts. 
Nigel Coutts

Exploring the Changing Social Contexts of Learning - The Learner's Way - 0 views

  •  
    Understanding how mobile, global and virtual social networks influence our interpretation of socio-cultural theories of learning might allow us to better understand the interplay of settings and contexts within which learning occurs and in doing so better understand how learning may be facilitated.
Antwak Short videos

What is Identity and Access Management? - 0 views

  •  
    IDENTITY AND ACCESS MANAGEMENT Identity and access management (IAM) is a collective term that covers merchandise, processes, and policies for managing user identities and regulating user access in the company. Access and User are two very important IAM theories. Access refers to the permission or authorization given to access a file (read, create or modify a doc). Users can be employers, auditors, suppliers, contractors or customers. How Identity and Access Management works IAM systems are intended to perform three key undertakings: identity, authenticate, and authorise. This means, just the right people ought to access PCs, equipment, software applications, any IT assets, or perform certain tasks. IAM components forming up an IAM system include: 1. A data set containing users identities and access privileges. 2. IAM instruments for creating, observing, modifying, and deleting access advantages. 3. A system for inspecting login and access history. 4. The list of access privileges needs to be updated including new entry users and for users whose roles are ever-changing. 5. IAM works generally fall under IT divisions or sectors that handle Cybersecurity and data management. Examples of Identity and Access management Here are instances of IAM at work. When a user tries to log in to the system, the system checks his identity with the data saved in the database. Once the user is identified after authentication as the right user, he's permitted to post his work. A person who works as a contributor to content management has full access to make changes in the database. A production operator can see an online work process however may not be permitted to modify it. Through IAM, specific clients in the association are permitted to access and deal with sensitive data. And if there's no IAM, anybody (like unauthorised ) could get to confidential organization records, prompting a potential data breach. In this viewpoint, IAM assists organizations with meeting rigid
Martin Burrett

Soundslice - 0 views

  •  
    An interest music project where users upload videos of guitars being played and you can view the notes and chords being played on a timeline in real time. http://ictmagic.wikispaces.com/Music%2C+Sound+%26+Podcasts
Martin Burrett

StrumSchool - 0 views

  •  
    A collection of 37 video guitar lessons and other resources to get you playing in no time. http://ictmagic.wikispaces.com/Music%2C+Sound+%26+Podcasts
Maria Perifanou

bloom's+Digital+taxonomy+v3.01.pdf (application/pdf Object) - 1 views

  •  
    LearningWithComputers
Dianne Rees

Theory and Practice of Online Learning (eds Anderson, Elloumi) - 6 views

  •  
    A free ebook on online learning
George Roberts

Haraway_CyborgManifesto.html - 0 views

  •  
    And another classic read
Glenn Hoyle

A Unified Field Theory of Design - 1 views

  •  
    An understanding of Information Design starts with the essential view that the vast amount of things that bombard our senses everyday are not pieces of information but merely data. Richard Saul Wurman expresses this in his book, Information Anxiety. Data is fairly worthless to most of us; it is the product of research or creation (such as writing), but it is not an adequate product for communicating. To have informational value, it must be organized, transformed, and presented in a way that gives it meaning.
Rick L

Theory and Practice of Online Learning - 0 views

  •  
    1st edition of the book
Martin Burrett

Music Tech Teacher, Music Quizzes, Games and Worksheets - 1 views

  •  
    A superb collection of musical resources. Find quizzes, tutorials, scales and lots of flash resources. http://ictmagic.wikispaces.com/Music%2C+Sound+%26+Podcasts
‹ Previous 21 - 40 of 40
Showing 20 items per page