Survey: Growing Interest in Cyber Security Careers Among Millennials
By Leila Meyer 10/12/16
new report from Raytheon and the National Cyber Security Alliance
The report, “Securing Our Future: Closing the Cybersecurity Talent Gap,” surveyed 3,779 adults aged 18 to 26, from 12 countries around the world, including the United States, Australia, the United Kingdom, and countries in Europe, Asia and the Middle East.
a high-paying career as a cyber security professional requires skills millennials value, such as problem solving, analytical thinking and communication — and employment opportunities are available across a wide variety of sectors, including start-ups, government and hospitals.
Key findings from the report:
- 64 percent of young adults in the U.S. heard about cyberattacks in the news last year, up from 36 percent the previous year, and compared to 48 percent of young adults worldwide;
- 70 percent of millennials in the U.S. said cyber security programs or activities are available to them, up from 46 percent the previous year, and compared to 68 percent worldwide;
- 21 percent of young men expressed interest in cyber competitions, compared to 15 percent of women;
- 48 percent or respondents said more information about the specifics of cyber security jobs would help increase interest;
- 59 percent of young men and 51 percent of young women received formal cyber safety lessons in school, up from 43 percent and 40 percent respectively last year; and
- 40 percent of respondents said parents are the most influential people helping them with career advice, and 19 percent said no one was influential in helping them with career advice.
more on cybersecurity in this blog
a new paper published on gaming habits and education:
gaming and learning
Mozelius, P., Westin, T., Wiklund, M., & Norbert, L. (2016). Gaming habits, study habits and compulsive gaming among digital gaming natives. Retrieved from https://www.researchgate.net/publication/308947959_Gaming_habits_study_habits_and_compulsive_gaming_among_digital_gaming_natives
more on gaming in this IMS blog:
this article was written in 2004
Weiler, A. (2005). Information-Seeking Behavior in Generation Y Students: Motivation, Critical Thinking, and Learning Theory. Journal Of Academic Librarianship, 31(1), 46-53.
The research indicates that only a very small percentage of the general population prefer to learn by reading.
members of “Generation Y,” the generation born between 1980 and 1994.
The first model for study of information-seeking behavior in the general population was developed by James Krikelas in 1983. This model suggested that the steps of information seeking were as follows: (1) perceiving a need, (2) the search itself, (3) finding the information, and (4) using the information, which results in either satisfaction or dissatisfaction.
A second model developed by Carol C. Kuhlthau of Rutgers University stresses a process approach with an emphasis placed on cognitive skills; as they increase, so does information-seeking effectiveness. This model is one of the few that was developed based on actual research and not simply on practical experience.
Eisenberg and Berkowitz proposed a model based on the “Big Six Skills”—task definition, information seeking, implementation, use, synthesis, and evaluation. Their model is flexible and nonlinear in the same way that hypertext is, allowing for different areas and avenues to be explored out of sequence. In addition, seekers can go back to refine and reidentify the information need, implementing new strategies.
Critical thinking is a process that is widely acknowledged in the literature to be crucial to the learning process, to cognitive development, and to effective information seeking.
A more effective lesson on Internet information then, rather than specifically dwelling on “good” and “bad” Web sites, would be to present actual examples and to raise questions rather than giving answers, opening the student up to the next level intellectual development, “multiplicity.” Multiplicity is the ability to acknowledge that the world contains knowledge that the student cannot yet classify as right or wrong, knowledge which requires further study and thought (the so-called “gray area”).
Behavior Theory, first developed by B. F. Skinner in the 1950s, uses the concepts of “positive” and “negative” reinforcement to control behavior. This theory explains learning behavior very simply: Reward students who perform well, and punish students who do not.
The “Control Theory” of behavior was developed by William Glasser. The theory states that, rather than being a response to outside stimulus, behavior is determined by what a person wants or needs at any given time, and any given behavior is an attempt to address basic human needs such as love, freedom, power, etc.
The Myers–Briggs Personality Analysis test, developed by Isabel Myers and Katherine Briggs, was developed using Jung’s theory of personality types in an effort to determine what type any given individual is. The personality type then determines the learning style of a given individual.
Gardner’s theory relates more directly to intelligence rather than to personality. Gardner states that intelligence is comprised of a group of different abilities, which originate in the stages of development each person passes through as they grow to adulthood. He identifies seven such intelligences—verbal–linguistic, logical–mathematical, visual–spatial, body–kinesthetic, musical–rhythmic, interpersonal, and intrapersonal—but he suggests that there are probably more.
Information seeking is a highly subjective process, one which students approach with prior knowledge, strongly held opinions, and differing levels of cognitive development. From the research it is apparent that, aside from personal preconceptions, issues of time and levels of difficulty in obtaining information are usually of more concern to students than issues of accuracy. It is still unclear, however, whether this is because they are not concerned about the accuracy unless their instructor is, or because they are assuming most information is by nature accurate.
More on Generation Z and Generation Y in this IMS blog:
this article was published in 2006
Mcdonald, R., & Thomas, C. (2006). Disconnects Between Library Culture and Millennial Generation Values. Retrieved from http://er.educause.edu/articles/2006/1/disconnects-between-library-culture-and-millennial-generation-values
disconnects into three categories—technology, policy, and unexploited opportunities—and discuss ways academic libraries can create next-generation landscapes to address these gaps.
Most library information systems and discovery tools are not easy to customize and remain substantially limited by an enduring library obsession with individual privacy and copyright.
Some of the key technology disconnects between libraries and current online communities include:
- Libraries lack tools to support the creation of new-model digital scholarship and to enable the use of Web services frameworks to support information reformatting (for example, RSS) and point-of-need Web-based assistance (multimedia tutorials or instant messaging assistance).
- Dogmatic library protection of privacy inhibits library support for file-sharing, work-sharing, and online trust-based transactions that are increasingly common in online environments, thus limiting seamless integration of Web-based services.
- Ubiquitous handheld access is more prominent thanks to digital lifestyle devices such as smart phones and iPods, yet libraries still focus on digital content for typical desktop PCs.
Drawing a clear line between technology and policy can be difficult. For example, how many of the characteristics of current libraries (identified by the list below) are driven purely by technology or by policy? These traits include:
- Mainly electronic text-based collections with multimedia content noticeably absent
- Constructed for individual use but requires users to learn from experts how to access and use information and services
- Library presence usually “outside” the main online place for student activity (MySpace, iTunes, Facebook, the campus portal, or learning management system)
Similarly, a policy solution might be required to address the following types of disconnects between libraries and online users:
- Deliberately pushing library search tools into other environments such as learning management systems or social network infrastructure and, conversely, integrating popular external search tools into library frameworks (such as Google Scholar and MS Academic Live Search or LibX.org)
- Libraries linking and pointing to larger sets of open-access data that add context to their local collections
- Restructuring access to reflect use instead of library organizational structure
What is your library doing to:
- Support the user’s affinity for self-paced, independent, trial-and-error methods of learning?
- Create opportunities to make library information look and behave like information that exists in online entertainment venues?
- Explore alternative options for delivering information literacy skills to users in online environments and alternate spaces?
- Apply the typical user’s desire for instant gratification to the ways that libraries could be using technology for streamlined services?
- Redefine administrative, security, and policy restrictions to permit online users an online library experience that rivals that of a library site visit?
- Preserve born-digital information?
The promise of seamlessness that stems from ubiquitous computing access and instantly available networked information is, unfortunately, stifled significantly within the libraries of today.
more on millennials in this IMS blog
Bill seeks to shield students social media info
The proposed social media privacy law, scheduled to be considered by the state Senate Wednesday, bars any institution from asking or requiring an applicant or enrolled student to disclose a user name or password for a personal social media account.
Under the bill, a student could also not be prevented from participating in extracurricular activities if they refuse to disclose social media accounts or provide a list of contacts associated with those accounts.
more on privacy in this IMS blog:
How Schools Can Help Notice and Serve the ‘Quiet Kids’
How Schools Can Help Notice and Serve the ‘Quiet Kids’
Susan Cain’s bestseller Quiet: The Power of Introverts In A World That Can’t Stop Talking.
Clemson University’s Centralized Proctoring Story
e-Campus news offers a proctoring model: http://www.ecampusnews.com/whitepapers/5-step-guide-to-how-clemson-university-online-is-centralizing-online-proctoring/ conveniently presented in a 5-step outline, webinar and “case study” paper.
According to them, you just “Follow their story and learn how the team at Clemson Online implemented RPNow, and how they’re planning to centralize remote proctoring to increase student convenience, faculty efficiency and reduce the costs of exam administration.”
It is, of course, sponsored by the company, who will be paid for the proctoring
Here are my issues with the proposal:
- step 5 of the five-step outline: “Take control of the payment model. Institutional payment (as opposed to student pay) creates a better experience for the student and cost savings for all.”
so, if the institution pays, then student don’t pay? I find this and illusion, since the institution pays by using students’ tuition. which constantly grows. so, the statement is rather deceptive.
- As with the huge controversy around Turnitin (e.g., this 2009 article, and this 2012 article), “mechanizing” the very humane process evaluation is outright wrong. The attempt to compensate the lack of sufficient number of faculty by “outsourcing” to machines is en vogue with the nationwide strive of higher ed administration to create an “assembly line” type of education, which makes profit, but it is dubious if it teaches [well].
- Pedagogically (as per numerous discussions in the Chronicle of Higher Education and similar sources), if the teaching materials and exams are structured in an engaging way, students cheat much less. The “case study” paper claims reduction of cheating, but it is reduction based on fear to be caught, not based on genuine interest in learning.
New Model Lets Students Rent Textbooks on Pay-as-You-Go Basis
By Michael Hart 04/12/16
Once students register with iFlipd, they can rent digital textbooks for as little as a week. Once they finish using a book, they can move it back into the digital catalogue, making it available to other students. There is a loyalty program that gives points toward free rentals.
iFlipd is also integrated with Datalogics and its interactive Active Textbook e-book system so that students have sharing capabilities. They can share notes on the texts through the platform and access notes made by previous users of the same textbooks. The note-sharing platform allows for highlighting, annotations, audio, video and search.