Archive of ‘announcement’ category

School Safety and Student Wellbeing

CALL FOR CHAPTER PROPOSALS
Proposal Submission Deadline: February 12, 2019
Leveraging Technology for the Improvement of School Safety and Student Wellbeing
A book edited by Dr. Stephanie Huffman, Dr. Stacey Loyless, Dr. Shelly Allbritton, and Dr. Charlotte Green (University of Central Arkansas)

Introduction
Technology permeates all aspects of today’s school systems. An Internet search on technology in schools can generate millions of website results. The vast majority of these websites (well over 8,000,000 results for one simple search) focuses on advice, activities, and uses of technology in the classroom. Clearly teaching and learning with technology dominates the literature and conversations on how technology should or could be used in classroom settings. A search on school safety and technology can produce more than 3,000,000 results with many addressing technological tools such as video cameras, entry control devices, weapon detectors, and other such hardware. However, in recent times, cyberbullying appears to dominate the Internet conversations in references to school safety. With an increase in school violence in the past two decades, school safety is a fundamental concern in our nation’s schools. Policy makers, educators, parents, and students are seeking answers in how best to protect the physical, emotional, and social well-being of all children.

 

Objective of the Book
The proposed edited book covers the primary topic of P-12 school safety and the use of technology and technology used for fostering an environment in which all students can be academically successful and thrive as global citizens.  School safety is defined as the physical, social, and emotional well-being of children. The book will comprise empirical, conceptual and case based (practical application) research that craft an overall understanding of the issues in creating a “safe” learning environment and the role technology can and should play; where a student’s well-being is valued and protected from external and internal entities, equitable access is treasured as a means for facilitating the growth of the whole student, and policy, practices, and procedures are implemented to build a foundation to transform the culture and climate of the school into an inclusive nurturing environment.

 

Target Audience
The target audience is leadership and education scholars, leadership practitioners, and technology coordinators.  This book will be used as a collective body of work for the improvement of K-12 schools and as a tool for improving leadership and teacher preparation programs. School safety is a major concern for educators.  Technology has played a role in creating unsafe environments for children; however it also is an avenue for addressing the challenges of school safety

Recommended topics include, but are not limited to, the following:

Section I – Digital Leadership

  • Technology as a Climate and Cultural Transformation Tool
    • School Leadership in the Digital Age: Building a Shared Vision for all Aspects of Learning and Teaching
  • Ensuring Equity within a “One to One” Technology Framework
    • Infrastructure within Communities
    • Accessible WiFi for Low SES Students
    • Developing Culturally Responsive Pedagogy
  • Professional Development for School Leaders

Section II – Well Being

  • Social Media and School Safety: Inputs and Outputs
    • Tip lines: Crime, Bullying, Threats
    • Communication and Transparency
    • Platform for Social Justice
  • Teaching Strategies to Promote Healthy Student Interactions in Cyberspace (Digital Citizenship?)
    • Building Capacity and Efficacy, Platform to lower incidence of Cyber-Bullying, Boosting Instructional Engagement
  • Literacy and Preparedness for the Influence and Consequence of Digital Media Marketing Campaigns directed toward Children, Adolescents, and Teens.
  • Pioneering Innovative Technology Program in Curriculum: Fostering “Belonging” beyond Athletics & Arts.

Section III- Infrastructure Safety

  • Campus/Facility Safety and Security
    • Rural Schools vs. Urban Schools
    • Digital A/V Systems
    • Background Check – Visitor Registration (i.e. Raptor)
  • Network Security Systems and Protocols
    • User Filtering and Monitoring
    • Firewalls
  • Policy
    • Appropriate use policies
    • Digital Citizenship
    • Web development policy
    • Privacy
    • Intellectual Property & Copyright

Section IV – Academic Success

  • Professional Development for Classroom Teachers
    • Pedagogical Integration of Technology
    • Instructional Coaching for Student Engagement
    • Increase Rigor with Technology
    • Competence in the Blended/Hybrid/Flipped Classroom
  • Technology to enhance learning for all
    • Assistive Technology
    • Accessibility issues
    • Internet access for Low SES Students in the Blended/Hybrid/Flipped Classroom
  • Personal Learning Design
    • Differentiation for Student Efficacy
    • Strategies for Increasing Depth of Knowledge
    • Design Qualities for Enhanced Engagement

Submission Procedure
Researchers and practitioners are invited to submit on or before February 12, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the purpose, methodology, and a brief summary findings of his or her proposed chapter. Authors will be notified by March 12, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 12, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. See Edited Chapter Template. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Leveraging Technology for the Improvement of School Safety and Student Wellbeing. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the eEditorial Discovery®TM online submission manager. USE THE FOLLOWING LINK TO SUBMIT YOUR PROPOSAL.  https://www.igi-global.com/publish/call-for-papers/call-details/3709

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit http://www.igi-global.com. This publication is anticipated to be released in 2020.

Important Dates
February 12, 2019: Proposal Submission Deadline
March 12, 2019: Notification of Acceptance
June 12, 2019: Full Chapter Submission
August 10, 2019: Review Results Returned
August 10, 2019: Final Acceptance Notification
September 7, 2019: Final Chapter Submission

Inquiries can be forwarded to
Dr. Stephanie Huffman
University of Central Arkansas
steph@uca.edu or 501-450-5430

Clicks or Canned

Will ‘Publish or Perish’ Become ‘Clicks or Canned’? The Rise of Academic Social Networks

Jessica Leigh Brown     Aug 1, 2017

https://www.edsurge.com/news/2017-08-01-will-publish-or-perish-become-clicks-or-canned-the-rise-of-academic-social-networks

Scholars want peers to find—and cite—their research, and these days that increasingly happens on social media. The old adage ‘publish or perish’ could soon go digital as ‘clicks or canned.’

Several platforms have emerged over the past decade, offering researchers the chance to share their work and connect with other scholars. But some of those services have a bad rap from academics who say commercial sites lack the integrity of institutional repositories run by traditional universities. (Among the most widely-villified are ResearchGate and Academia.edu, which is evident by griping on social media and elsewhere.)

a 2015 paper comparing services and tools offered by various academic social networks, says researchers must weigh the benefits and drawbacks of each. “They can be great tools to advance your research, especially social research,” she says. “But just like with Facebook or any other social network, we need to be aware of potential issues we might have with copyright or privacy.”

Academia.edu is the largest of the academic social networks.

Berlin-based ResearchGate

Created as a reference-management tool to help users organize their research, Mendeley also includes a number of social-networking features.

Scholabrate. The service claims to provide a more Facebook-esque, visual experience for academics seeking to network with others in their field.

Similar to Mendeley, Zotero functions primarily as a research tool, allowing users to collect, save, cite and share materials from a wide range of sources. The site also maintains a significant community of academics who can connect through groups and forums, or through their search engine.

 

ELI webinar AI and teaching

ELI Webinar | How AI and Machine Learning Shape the Future of Teaching

https://events.educause.edu/eli/webinars/2019/how-ai-and-machine-learning-shape-the-future-of-teaching

When:
1/23/2019 Wed
12:00 PM – 1:00 PM
Where:
Centennial Hall – 100
Lecture Room
Who:
Anyone interested in
new methods for teaching

Outcomes

  • Explore what is meant by AI and how it relates to machine learning and data science
  • Identify relevant uses of AI and machine learning to advance education
  • Explore opportunities for using AI and machine learning to transform teaching
  • Understand how technology can shape open educational materials

Kyle Bowen, Director, Teaching and Learning with Technology https://members.educause.edu/kyle-bowen

Jennifer Sparrow, Senior Director of Teaching and Learning With Tech, https://members.educause.edu/jennifer-sparrow

Malcolm Brown, Director, Educause, Learning Initiative

more in this IMB blog on Jennifer Sparrow and digital fluency: https://blog.stcloudstate.edu/ims/2018/11/01/preparing-learners-for-21st-century-digital-citizenship/

++++++++++++++++++++++++++++

Feb 5, 2018 webinar notes

creating a jazz band of one: ThoughSourus

Eureka: machine learning tool, brainstorming engine. give it an initial idea and it returns similar ideas. Like Google: refine the idea, so the machine can understand it better. create a collection of ideas to translate into course design or others.

Netlix:

influencers and microinfluencers, pre- and doing the execution

place to start explore and generate content.

https://answerthepublic.com/

a machine can construct a book with the help of a person. bionic book. machine and person working hand in hand. provide keywords and phrases from lecture notes, presentation materials. from there recommendations and suggestions based on own experience; then identify included and excluded content. then instructor can construct.

Design may be the least interesting part of the book for the faculty.

multiple choice quiz may be the least interesting part, and faculty might want to do much deeper assessment.

use these machine learning techniques to build assessment. how to more effectively. inquizitive is the machine learning

 

students engagements and similar prompts

presence in the classroom: pre-service teachers class. how to immerse them and practice classroom management skills

https://books.wwnorton.com/books/inquizitive/overview/

First class: marriage btw VR and use of AI – an environment headset: an algorithm reacts how teachers are interacting with the virtual kids. series of variables, oppty to interact with present behavior. classroom management skills. simulations and environments otherwise impossible to create. apps for these type of interactions

facilitation, reflection and research

AI for more human experience, allow more time for the faculty to be more human, more free time to contemplate.

Jason: Won’t the use of AI still reduce the amount of faculty needed?

Christina Dumeng: @Jason–I think it will most likely increase the amount of students per instructor.

Andrew Cole (UW-Whitewater): I wonder if instead of reducing faculty, these types of platforms (e.g., analytic capabilities) might require instructors to also become experts in the various technology platforms.

Dirk Morrison: Also wonder what the implications of AI for informal, self-directed learning?

Kate Borowske: The context that you’re presenting this in, as “your own jazz band,” is brilliant. These tools presented as a “partner” in the “band” seems as though it might be less threatening to faculty. Sort of gamifies parts of course design…?

Dirk Morrison: Move from teacher-centric to student-centric? Recommender systems, AI-based tutoring?

Andrew Cole (UW-Whitewater): The course with the bot TA must have been 100-level right? It would be interesting to see if those results replicate in 300, 400 level courses

Recording available here

https://events.educause.edu/eli/webinars/2019/how-ai-and-machine-learning-shape-the-future-of-teaching

Quantum computing and blockchain

Quantum Computing: Is it the end of the blockchain?

https://medium.com/fintech-kellogg/quantum-computing-is-it-the-end-of-the-blockchain-10fa7e222b0a

Ajitesh Abhishek Jan 12, 2019

In simple words, a blockchain is a ledger that records transactions of a certain type. It uses mathematical functions such as integer factorization, which is easy to solve in one direction but hard in the other direction for security.

blockchain

Quantum entanglement is a phenomenon in which the quantum states of two or more objects have to be described with reference to each other, even though the individual objects may be spatially separated.

What’s the future of blockchain in the world of Quantum computing?

One of the potential solutions is Quantum Blockchain, which uses quantum cryptography. This has been proposed by Del Rajan and Matt Visser of Victoria University of Wellington in New Zealand. The idea is simple — if computers can compute fast, make the puzzle more complex.

+++++++++++
more on quantum computing in this IMS blog
https://blog.stcloudstate.edu/ims?s=quantum+computing

and blockchain
https://blog.stcloudstate.edu/ims?s=blockchain

Selecting Tech Solutions for Your Classroom

Selecting the Right Tech Solutions for Your Classroom

https://www.iste.org/learn/iste-u/technology-selection

Course Description:

Integrating technology into your teaching practice can be intimidating. Where do you start? What tools do you choose? What are the questions you need to ask?

In Selecting the Right Tech Solutions for Your Classroom, you’ll get the guidance you need to thrive with edtech, whether you’re just dipping your toe in or rethinking a districtwide approach. Throughout the course, you’ll engage in online content, develop materials specific to your context and receive feedback from experts. The course culminates with a capstone project that can be used to communicate with stakeholders about your selected technology, your rationale for choosing it and how you’ll implement it.

This is a 15-hour, instructor-led course.

Winter session: February 5 – March 29, 2019

Serious Play Conference

Bryan Alexander’s Future Trends Forum with Guest Sue Bohle, Serious Play Conference

An interactive discussion on gaming in education
January 17, 2 – 3 PM (EST)

Sue Bohle, Executive Director, Producer, Serious Play Conference, for a lively discussion on gaming in education.

Sue is a leader in the space and has seen tremendous growth and potential of serious games in corporate training and eLearning. The interview has been edited for clarity and length.

++++++++
notes from the webinar:
i had issues connecting and the streams of the guest speaker (Sue) and Bryan will stall when each of them were talking.

examples for formally learning through games

I’d love to hear Sue chat about: Students as game authors, what do you do to encourage reflection on game events?

Dan LaSota:
Is there any intersection between “Minds on Fire” from Mark Carnes, https://reacting.barnard.edu and your conference?
Dan LaSota
To me “simulation” means some scenario that can be rapidly run again and again, with the user/player tweaking variables and seeing what happens. If it’s “fun” there is more of an intersection with games. If not so fun, it might be considered by most more of a model. Computers can and do help with the iteration process because they can reset to T=0 much quicker than human players. Although “role play” is also a kind of simulation.
Facebook group the Tribe:
Minecraft in education.
John Gould with Drexel: he is going now after the school boards about games in education
Noreen Barajas Horizon Project Director, Educause
AI book integrated in junior high Seattle Michelle Zimmerman, article in Forbes,
Keven Diel Lockhead expert on AI, military
gaming as a way to bypassing the metacognitive (thinking about thinking). Without teaching about learning. Number of libraries Nebraska State: games are developed by libraries.
Tobee Soultie gaming industry. National Intelligence Agency for first response and refurbished for teachers and bullying.
SueBohle@gmail.com

++++++
more on Future Trends in this IMS blog
https://blog.stcloudstate.edu/ims?s=future+trends

Conference on Digital Libraries

CM/IEEE Joint Conference on Digital Libraries
June 2-6, 2019 – Urbana-Champaign, IL
Curated Knowledge. Connected People. Extraordinary Results.
UPDATED DEADLINE: January 25, 2019
JCDL welcomes interesting submissions ranging across theories, systems,
services, and applications. We invite those managing, operating, developing,
curating, evaluating, or utilizing digital libraries broadly defined, covering
academic or public institutions, including archives, museums, and social
networks. We seek involvement of those in iSchools, as well as working in
computer or information or social sciences and technologies. Multiple tracks
and sessions will ensure tailoring to researchers, practitioners, and diverse
communities including data science/analytics, data curation/stewardship,
information retrieval, human-computer interaction, hypertext (and Web/network
science), multimedia, publishing, preservation, digital humanities, machine
learning/AI, heritage/culture, health/medicine, policy, law, and privacy/
intellectual property.
Additional Topics of Interest:
In addition to the topics indicated above, the following are some of the many
topics that will be considered relevant, as long as connections are made to
digital libraries:
* Collaborative and participatory information environments
* Crowdsourcing and human computation
* Cyberinfrastructure architectures, applications, and deployments
* Distributed information systems
* Document genres
* Extracting semantics, entities, and patterns from large collections
* Information and knowledge systems
* Information visualization
* Infrastructure and service design
* Knowledge discovery
* Linked data and its applications
* Performance evaluation
* Personal digital information management
* Scientific data management
* Social media, architecture, and applications
* Social networks, virtual organizations and networked information
* User behavior and modeling
* User communities and user research
We invite submissions in many forms: short papers, long papers, panels,
posters, tutorials, and workshops. We also host a Doctoral Consortium.
Submission Deadlines:
Jan. 25, 2019 – Tutorial, workshop, full paper and short paper, and consortium
submissions
Jan. 29, 2019 – Panel, poster and demonstration submissions
Submissions are to be made in electronic format via the conference’s EasyChair
submission page. Please see the conference website for more details:
https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2F2019.jcdl.org%2F&data=01%7C01%7Cpmiltenoff%40stcloudstate.edu%7C51f8325dcd444ea9051b08d67affde34%7C5e40e2ed600b4eeaa9851d0c9dcca629%7C0&sdata=RaBtwLMPYb0gwcqsXHHXsNODc1UrU3w3BFtI7uMgtKY%3D&reserved=0
To maximize your use of LITA-L or to unsubscribe, see https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.ala.org%2Flita%2Finvolve%2Femail&data=01%7C01%7Cpmiltenoff%40stcloudstate.edu%7C51f8325dcd444ea9051b08d67affde34%7C5e40e2ed600b4eeaa9851d0c9dcca629%7C0&sdata=panFuqJKW49%2B1XimfiRvGBQjgajRVMyCCIpXqpiPXbQ%3D&reserved=0

The essence of neoliberalism

The essence of neoliberalism

by Pierre Bourdieu December 1998

https://mondediplo.com/1998/12/08bourdieu

This tutelary theory is a pure mathematical fiction. From the start it has been founded on a formidable abstraction.

That said, this “theory” that is desocialised and dehistoricised at its roots has, today more than ever, the means of making itself true and empirically verifiable. In effect, neoliberal discourse is not just one discourse among many. Rather, it is a “strong discourse” – the way psychiatric discourse is in an asylum, in Erving Goffman’s analysis (2). It is so strong and so hard to combat only because it has on its side all of the forces of a world of relations of forces, a world that it contributes to making what it is.

The globalisation of financial markets, when joined with the progress of information technology, ensures an unprecedented mobility of capital.

Thus we see how the neoliberal utopia tends to embody itself in the reality of a kind of infernal machine, whose necessity imposes itself even upon the rulers. Like the Marxism of an earlier time, with which, in this regard, it has much in common, this utopia evokes powerful belief – the free trade faith – not only among those who live off it, such as financiers, the owners and managers of large corporations, etc., but also among those, such as high-level government officials and politicians, who derive their justification for existing from it.

Reimagining Minnesota State

Reimagining Minnesota State 

Monday, January 14, 2019

10:00 a.m. – 12:00 p.m.

Session 2: The Digital Age: The Impact and Future Possibilities Offered by Data and Technology

Thank you for registering to participate in the second Reimagining Minnesota State forum. The Forums have been designed to spark not only individual reflection but what we hope can serve as catalysts for discussions in a variety of venues. The Forum will be recorded and available for viewing on the Reimagining website.

Below are the directions whether you are attending in person or by live stream.

+++++++++++++++
notes Plamen Miltenoff

John O’Brien, President and CEO of EDUCAUSE

http://www.minnstate.edu/board/reimagining/docs/PDF_Final-Final-Minnesota-State-OBrien-Remarks-011319.pdf

from ad hoc to systemic institutional innovations

ask Rachel for the two books announced

Bryan Mark GIll AR library tour

Bryan Rachel OER “visit”

Catherine Haslag: Is there any research to show students retention in an online class vs a face-to-face course?

the challenge is not collecting, but integrating, using data.

silos = cylinder of excellence.

technology innovation around advising. iPASS resources.

adaptive learning systems – how students advance through the learning process.

games and simulations Bryan Mark Gill. voice recognition,

next 3 to 5 years AR. by 2023 40% with AR and VR

AI around the controversial. Chatbot and Voice assistants.

Unizin: 13 founding members to develop platform, Canvas, instructional services, data for predictive analytic, consistent data standard among institutions,

University innovation Alliance. Analytics as the linchpin for students’ success. graduation rates increase. racial gap graduation. Georgia State.

digital ethics. Mark Gill and Susana Nuccetelli. digital ethics: Susana Nuccetelli brought her students from the Philosophy Dept to Mark Gill’s SCSu Vizlab so we can discuss ethics and AI, last semester. jobrien@educause.edu

Tiffany Beth Mfume

http://www.minnstate.edu/board/reimagining/docs/Mfume-Minnesota.State.1-14-2019.pdf

assistant vice president for student success and prevention Morgan State U

the importance of training in technology adoption

Dr. Peter Smith, Orkand Endowed Chair and Professor of Innovative Practices in Higher Education at University of Maryland University College 

social disruption, national security issue,
Allan Taft Candadian researcher, 700 hours / year learning something. 14 h/w.
learners deserve recognition
free range learning.
how do we get a value on people from a different background? knowledge discrimination. we value it on where they learned it. then how you learned it and what you can do with it. talent and capacity not recognized.

we, the campus, don’t control the forces for a very first time. MIT undergrad curricula is free, what will happen. dynamics at work here. declining student numbers, legislation unhappy. technology had made college more expensive, not less. doing the right thing, leads to more disruption. local will be better, if done well. workplace can become a place for learning.
learning is a social activity. distance learning: being on the farthest raw of 300 Princeton lecture. there is a tool and there is people; has to have people at the heart.
what will work not only for MN, but for each of the campuses, the personalization.

staying still is death.

Panel discussion

what is the role of faculty in the vendor and discussions about technology. a heat map shows that IT people were testing the vendor web site most, faculty and student much less.

 

Germany under cyberattack

After massive cyber attack, Germany’s security apparatus struggles to answer questions

Nicholas Waller JANUARY 9, 2019

Investigators traced the man through digital tracks he left on the internet, as well as by speaking to witnesses, including another unnamed 19-year-old man that the hacker had communicated with via an encrypted messaging service. The hacker, who used the pseudonyms “G0t” and “Orbit”, was arrested on January 6 after investigators searched his home.

“Bad passwords were one of the reasons he had it so easy,” Seehofer said. “I was shocked at how simple most passwords were: ‘ILoveYou’, ‘1,2,3’. A whole array of really simple things.”

The latest incident comes just over a month after German security officials detected a major cyber attack against the email accounts of German lawmakers, as well as the military, and several German embassies by a Russian hacker group with ties to Moscow’s military intelligence wing, the GRU.

That attack occurred less than a year after the BfV, Germany’s intelligence service, said the Russian government was behind a cyberattack on German computer networks that was discovered in December 2017 and was also linked to the same hacker group that carried out the November 2018 breach.

+++++++++
more on cybersecrurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

1 18 19 20 21 22 65