Digital Fluency: Preparing Learners for 21st Century Digital Citizenship Eighty-five percent of the jobs available in 2030 do not yet exist. How does higher education prepare our learners for careers that don’t yet exist? One opportunity is to provide our students with opportunities to grow their skills in creative problem solving, critical thinking, resiliency, novel thinking, social intelligence, and excellent communication skills. Instructional designers and faculty can leverage the framework of digital fluency to create opportunities for learners to practice and hone the skills that will prepare them to be 21st-century digital citizens. In this session, join a discussion about several fluencies that comprise the overarching framework for digital fluency and help to define some of your own.
Dr. Jennifer Sparrow, Senior Director for Teaching and Learning with Technology and Affiliate Assistant Professor of Learning, Design, and Technology at Penn State. The webinar will take place on Friday, November 9th at 11am EST/4pm UTC (login details below)
how DF is different from DLiteracy? enable students define how new knowledge can be created through technology. Not only read and write, but create poems, stories, if analogous w learning a language. slide 4 in https://www.slideshare.net/aidemoreto/vr-library
communication fluency. be able to choose the correct media. curiosity/failure fluency; creation fluency (makerspace: create without soldering, programming, 3Dprinting. PLA filament-corn-based plastic; Makers-in-residence)
immersive fluency: video 360, VR and AR. enable student to create new knowledge through environments beyond reality. Immersive Experiences Lab (IMEX). Design: physical vs virtual spaces.
Data fluency: b.book. how to create my own textbook
rubrics and sample projects to assess digital fluency.
What is Instructional Design 2.0 or 3.0? deep knowledge and understanding of faculty development. second, once faculty understands the new technology, how does this translate into rework of curriculum? third, the research piece; how to improve to be ready for the next cycle. a partnership between ID and faculty.
Instead, he argues that schools should combine consequences for bullies with mediation, counseling or a learning experience.
School shootings and violence have prompted schools to take an even more punitive stance against student misbehavior, experts I talked to said.
the higher a school’s climate rating — that is, the more that students, parents and teachers think their school is a safe place where people are respected — the lower the bullying rates. Similarly, the higher the social-emotional skills, such as the ability to wait and not react impulsively, the lower the bullying rates. But what hasn’t been clearly proven is that improvements in school climate or social-emotional skills will necessarily lead to a reduction in bullying.
Three Things Teachers Need to Spot—and Stop—Plagiarism
SPONSORED CONTENTFROM PLAGIARISMCHECK
my note: I firmly disagree with the corporate push to mechanize plagiarism. Plagiarism is about teaching both faculty and students, and this industry, under the same cover is trying to make a profit by mechanizing, not teaching about plagiarism.
Plagiarism-detection software can address the most pressing needs of classroom educators faced with assessing students’ written work. Here’s how:
1. Teachers Need More Time
The Challenge: The larger the class is, and the more students that are in it, the longer it takes to review each written assignment—checking grammar, style, originality of ideas, etc. This is especially important when screening for plagiarism.
My note: this is NOT true. If the teacher is still lingering in the old habits of lecturing, this could be true. However, when a teacher gets into the habit of reviewing papers, s/he can detect as soon as in the first several paragraphs the discrepancies due to copy and paste of other work versus the student’s work.
In addition, if the teacher applies group work in her/his class, s/he can organize students to proofread each other’s work, thus teaching them actively about plagiarism, punctuation etc.
2. Evidence Must Be Reliable
The Challenge: When identifying plagiarism, teachers need to be confident in their assessment. Accusing students of academic dishonesty is a weighty claim; it can lead to their suspension or even expulsion from school.
My note: another myth perpetuated by industry searching for profit. Instead of looking at the process of plagiarism as punitive action, an educator will look at it as education and prevention. Prevention of plagiarism will never be successful, if the focus as in this article is on “suspension,” “expulsion,” etc. The goal of the teacher is NOT to catch the student, but to work with the student and understand the complexity of plagiarism.
3. Tools Must Be Easy to Use
My note: right, the goal is to make the teacher think as less as possible.
My note: PlagiarismCheck is the same as TurnitIn and all other tools, which seek profit, not education. Considering that plagiarism is a moving target (http://blog.stcloudstate.edu/ims/2016/01/10/plagiarism-or-collaboration/) and it is a concept first and secondly an action, the attempt to extract profits from the mechanization of this process is no less corrupt then the attempt to focus on profit (of education) rather then on education (itself)
Blind Protocol, an alternate reality game created by two high school English teachers to help students understand online privacy and data security. This form of gaming blends fact and fiction to immerse players in an interactive world that responds to their decisions and actions. In a recent article on KQED, Paul Darvasi and John Fallon described how they chose the gaming format to help their students gain a deeper look at how vulnerable their personal data is.
Last year, the Durham University students’ union organized a debate on whether China was a threat to the West. Tom Harwood, then president of the union, said the school’s Chinese Students and Scholars Association complained about the topic and pressed him to drop one of the speakers, Anastasia Lin, a former Miss World Canada. Lin is also a human rights activist and a practitioner of Falun Gong, a spiritual meditation group banned by the Chinese government.
In March, the United Kingdom is scheduled to leave the European Union, a giant market of more than 500 million consumers. British officials are desperate to ink new free trade deals with major economies, including China. Harwood was stunned that a Chinese diplomat would suggest that the United Kingdom might pay a financial price for something as small as a college debate.
lash-forward to 2012 when then-British Prime Minister David Cameron met with the Dalai Lama in public in London. China’s economy was now more than three times the size of the United Kingdom’s. Beijing responded by canceling meetings and freezing out British officials. In 2015, Cameron refused to meet the Dalai Lama, who told The Spectator, a conservative political magazine, “Money, money, money. That’s what this is about. Where is morality?”
The Chinese government no longer just tries to punish the West for straying from the Communist Party line. In the past year, Chinese President Xi Jinping has gone further, arguing that China’s authoritarian system can serve as a model for others, an alternative to liberal democracy.
Clumsy attempts to censor people — as in the case of the Durham University debate — have backfired, but China has had success pressuring businesses, as the apologies by Marriott and Mercedes-Benz show.
more on China in this IMS blog http://blog.stcloudstate.edu/ims?s=china
Former German Foreign Minister Sigmar Gabriel‘The World Is Changing Dramatically’
Former German Foreign Minister Sigmar Gabriel speaks to DER SPIEGEL about his call for the country to take on a new global role and why Germans are underestimating the dangers posed by the current geopolitical situation.
Interview Conducted by Mathieu von Rohr and Britta Sandberg September 24, 2018 04:32 PM
Now Trump is criticizing us for not spending enough money on our military. Part of the truth, however, is that the U.S. wanted exactly that for a very long time. They were worried that too much military power in Germany could provoke the next world war. I once told Tillerson, I don’t know what you are complaining about, you raised us for 70 years to be peaceniks. Now that’s what we are and you’re surprised. He laughed.
Some people want Germany to be something like a large Switzerland, but we are simply too big. We can’t just stand on the sidelines. Because of the Assad regime’s bombs, almost a million refugees were standing in front of our door. It’s not just about military operations, but about crisis prevention, diplomacy, economic development. Germany shouldn’t transform from a geopolitical abstainer to an influential geo-strategist. I wish that we would return to once again having strategic debates — no matter the result. It is important to prepare the public for the fact that the world has changed.
As Norwegian Refugee Council research found, 70 percent of Syrian refugees lack basic identification and documents showing ownership of property.
The global passport
Host nations certainly has a share in the damage, as they face problems concerning the accessibility of vital information about the newcomers — dealing with the undocumented refugee, the immigration service can’t gain the information about his/her health status, family ties or criminal record, or verify any other vital data that helps them make a decision. Needless to say, this may lead to the designation of refugee status being exploited by economic migrants, fugitives or even the war criminals that caused the mass displacement to begin with.
Another important issue is data security. Refugees’ personal identities are carefully re-established with the support of clever biometric systems set up by the U.N. Agency for Refugees (UNHCR). UNHCR registers millions of refugees and maintains those records in a database. But the evidence suggests that centralized systems like this could be prone to attacks. As a report on UNCHR’s site notes, Aadhaar — India’s massive biometric database and the largest national database of people in the world — has suffered serious breaches, and last year, allegations were made that access was for sale on the internet for as little as $8
Finland, a country with a population of 5.5 million, cannot boast huge numbers of refugees. For 2018, it set a quota of 750 people, mainly flying from Syria and the Democratic Republic of Congo. That’s way less than neighboring Sweden, which promised to take in 3,400. Nevertheless, the country sets a global example of the use of effective technology in immigration policy: It’s using blockchain to help the newcomers get on their feet faster.
The system, developed by the Helsinki-based startup MONI, maintains a full analogue of a bank account for every one of its participants.
Speaking at the World Economic Forum in Davos in January 2018, the billionaire investor and philanthropist George Soros revealed that his structures already use a blockchain in immigration policies
In 2017, Accenture and Microsoft Corp. teamed up to build a digital ID network using blockchain technology, as part of a U.N.-supported project to provide legal identification to 1.1 billion people worldwide with no official documents.
a Memorandum of Understanding (MOU) with blockchain platform IOTA to explore how the technology could increase efficiency.