fair use >> . transformation: 1. add / subtract from original 2. use for different purpose; >> parody songs – using enough of music and words to recognize the song, but not enough to it to be copyright infrigement. memes.
students’ use of copyrighted works. students may: use the entire copyrighted work but not publish openly
copyright act #110 (1) applies to F2F teaching.
copyright act #110 (2) applies to Hybrid/Online teaching. exception one digital copy can made and uploaded on D2L. reasonable and limited portions of dramatic musical or audiovisual works
if people identifiable ask them to sign a media release form
plagiarism v copyright infringement.
Creative Commons (CC). search engine for content available through cc licenses. https://creativecommons.org/ CC BY – attribution needed; CC BY-SA may remix, tweak CC BY-ND can redistribute, but not alter CC BY-NC for non profit. CC BY-NC-SA
book chapters: one is a rule of thumb
PDF versions of the eassays textbook acceptable, if the students purchased it
music performance licenses: usually cover – educational activities on campus; ed activities at off-campus locations that are outreach
I would like to ask you again to consider testing Yo and sharing your ideas how we can apply it at LRS
It is worth checking the penetration of Yo among SCSU students and use it.
Thank you and lkng forward to hearing your opinion
benefits for the library and potentially for the campus:
reduce financial cost: batteries for the walkie talkies and the wear off of the walkie talkie can be replaced by a virtual app (again, apps for each of the three potential candidates are free)
environmentally friendly. Apps are virtual. Walkie talkies are physical
improve productivity. walkie talkie allow only talk. Apps allow: audio, video (images) and text
raise the level of critical thinking (increase productivity by proxy): the use of several media: text, visuals, audio will allow users to think in a wider diapason when troubleshooting and/or doing their tasks
the library can be the sandbox to smooth out details of the application and lessons learned can help replace walkie talkies across campus with 21st century tools and increase productivity campus wide.
took only a few days to create the clip on a desktop computer using a generative adversarial network (GAN), a type of machine-learning algorithm.
Faith in written information is under attack in some quarters by the spread of what is loosely known as “fake news”. But images and sound recordings retain for many an inherent trustworthiness. GANs are part of a technological wave that threatens this credibility.
Amnesty International is already grappling with some of these issues. Its Citizen Evidence Lab verifies videos and images of alleged human-rights abuses. It uses Google Earth to examine background landscapes and to test whether a video or image was captured when and where it claims. It uses Wolfram Alpha, a search engine, to cross-reference historical weather conditions against those claimed in the video. Amnesty’s work mostly catches old videos that are being labelled as a new atrocity, but it will have to watch out for generated video, too. Cryptography could also help to verify that content has come from a trusted organisation. Media could be signed with a unique key that only the signing organisation—or the originating device—possesses.
Whether you’re flipping your courses, creating videos to help your students understand specific concepts or recording lectures for exam review, these tips can help you optimize your production setup on a tight budget.
1) Speak Into the Microphone
2) Reconsider Whether You Want to be a Talking Head
Record your video and upload it to YouTube. YouTube will apply its machine transcription to the audio as a starting point. Then you can download the captions into your caption editor and improve on the captions from there. Afterward, you can delete the video from YouTube and add it to your institution’s platform.
Because the questionnaire data comprised both Likert scales and open questions, they were analyzed quantitatively and qualitatively. Textual data (open responses) were qualitatively analyzed by coding: each segment (e.g. a group of words) was assigned to a semantic reference category, as systematically and rigorously as possible. For example, “Using an iPad in class really motivates me to learn” was assigned to the category “positive impact on motivation.” The qualitative analysis was performed using an adapted version of the approaches developed by L’Écuyer (1990) and Huberman and Miles (1991, 1994). Thus, we adopted a content analysis approach using QDAMiner software, which is widely used in qualitative research (see Fielding, 2012; Karsenti, Komis, Depover, & Collin, 2011). For the quantitative analysis, we used SPSS 22.0 software to conduct descriptive and inferential statistics. We also conducted inferential statistics to further explore the iPad’s role in teaching and learning, along with its motivational effect. The results will be presented in a subsequent report (Fievez, & Karsenti, 2013)
The 20th century notion of conducting a qualitative research by an oral interview and then processing manually your results had triggered in the second half of the 20th century [sometimes] condescending attitudes by researchers from the exact sciences.
The reason was the advent of computing power in the second half of the 20th century, which allowed exact sciences to claim “scientific” and “data-based” results.
One of the statistical package, SPSS, is today widely known and considered a magnificent tools to bring solid statistically-based argumentation, which further perpetuates the superiority of quantitative over qualitative method.
At the same time, qualitative researchers continue to lag behind, mostly due to the inertia of their approach to qualitative analysis. Qualitative analysis continues to be processed in the olden ways. While there is nothing wrong with the “olden” ways, harnessing computational power can streamline the “olden ways” process and even present options, which the “human eye” sometimes misses.
Below are some suggestions, you may consider, when you embark on the path of qualitative research.
Palys and Atchison (2012) present a compelling case to bring your qualitative research to the level of the quantitative research by using modern tools for qualitative analysis.
1. The authors correctly promote NVivo as the “jaguar’ of the qualitative research method tools. Be aware, however, about the existence of other “Geo Metro” tools, which, for your research, might achieve the same result (see bottom of this blog entry).
text mining: https://en.wikipedia.org/wiki/Text_mining Text mining, also referred to as text data mining, roughly equivalent to text analytics, is the process of deriving high-quality information from text. High-quality information is typically derived through the devising of patterns and trends through means such as statistical pattern learning. Text mining usually involves the process of structuring the input text (usually parsing, along with the addition of some derived linguistic features and the removal of others, and subsequent insertion into a database), deriving patterns within the structured data, and finally evaluation and interpretation of the output. https://ischool.syr.edu/infospace/2013/04/23/what-is-text-mining/
Qualitative data is descriptive data that cannot be measured in numbers and often includes qualities of appearance like color, texture, and textual description. Quantitative data is numerical, structured data that can be measured. However, there is often slippage between qualitative and quantitative categories. For example, a photograph might traditionally be considered “qualitative data” but when you break it down to the level of pixels, which can be measured.
word of caution, text mining doesn’t generate new facts and is not an end, in and of itself. The process is most useful when the data it generates can be further analyzed by a domain expert, who can bring additional knowledge for a more complete picture. Still, text mining creates new relationships and hypotheses for experts to explore further.
Pros and Cons of Computer Assisted Qualitative Data Analysis Software
more on quantitative research:
Asamoah, D. A., Sharda, R., Hassan Zadeh, A., & Kalgotra, P. (2017). Preparing a Data Scientist: A Pedagogic Experience in Designing a Big Data Analytics Course. Decision Sciences Journal of Innovative Education, 15(2), 161–190. https://doi.org/10.1111/dsji.12125
literature on quantitative research:
St. Cloud State University MC Main Collection – 2nd floor
AZ195 .B66 2015
p. 161 Data scholarship in the Humanities
p. 166 When Are Data?
Philip Chen, C. L., & Zhang, C.-Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275(Supplement C), 314–347. https://doi.org/10.1016/j.ins.2014.01.015
Adobe Spark is a suite of free tools for creating images, videos, and simple web pages. Key features of Adobe Spark’s web app include an integrated Creative Commons image search tool, the option to download images as JPEGs, and the option to download your videos as MP4 files
Sharalike is a good option to consider when you want to create an audio slideshow. To create an audio slideshow on Sharalike simply import some images from your computer, your Android device or from your iPad, drag them into the sequence in which you want them to appear, and then add some music. Sharalike offers a small collection of stock music that you can use or you can upload your own music.
PowToon is a popular tool for creating animated videos online. PowToon provides a drag-and-drop editor for creating animated videos. The videos that you create feature digital paper cut-outs on a colorful background. Think of PowToon as an online tool for creating videos in the style made popular by Common Craft. PowToon provides drawings of people and objects that you can arrange on blank canvas. After adding your narration to the arrangement you can publish your video.
Magisto is a video creation tool that allows you to quickly drag videos and images from your desktop and or Google Drive account to your Magisto account. After you’ve uploaded the media that you want mixed, select a theme and music for your video.From the video clips and images that you upload, Magisto will select the best portions to remix and blend together. Magisto creates your video after you’ve completed the steps of uploading media, selecting a theme, and choosing music. The final video is emailed to you. In addition to the web-based service Magisto offers a Chrome app, an Android app, and an iPad app.
Chrome app called CaptureCast. CaptureCast, produced by Cattura Video, allows you to record the screen on your Chromebook as well as input from your webcam. To record a video with the webcam on your Chromebook open CaptureCast in your browser then allow it to access your webcam and microphone. You can specify how high of a resolution you would like to use to capture your video. You can also choose your audio quality. If you have an external microphone connected to your Chromebook, make sure that you have it enabled before you start recording. When you have finished recording in CaptureCast you can save your video on your Chromebook or upload it to YouTube, to Vimeo, or to Google Drive.
imbus Screenshot is a tool for creating screencast videos on Chromebooks. It is easy to install, includes customizable countdown timer, and offers multiple ways to save and share your videos. Screencasts recorded with Nimbus Screenshot can be saved to your local drive or to an online Nimbus account. I chose to save to my local drive then upload to my YouTube channel. You could also save to your local drive then share to Google Drive or another online storage service.
more on video editing in this IMS blog http://blog.stcloudstate.edu/ims?s=video+editing
If you go to the Facebook Live Map and browse the live feeds, you’ll often see people talking about nothing in particular, with unflattering close-up camera angles and scratchy audio. People often shift their phones from hand to hand when they tire of holding them, and brush the mic without realizing it.
#2: Invest in a Mobile Phone Setup Budget: $150-$300
iPhone Setup When choosing a mount for an iPhone, consider the iOgrapher ($60), shown below. Attach the 37mm wide angle lens ($40) if you want to get more people or surroundings in the video. Android and Windows Phone Setup The Saramonic SmartMixer ($149) fits any phone (including the iPhone) and incorporates both audio and video stabilization in one piece of gear. The mics are stereo, and you can angle them however you want to capture multiple people talking.
#3: Broadcast From Your Desktop
Budget: Free-$600 Going live from your computer allows you to bring in guests to interview, add pre-recorded video, graphics, titles (so people know who the hosts are), and more.
You can use the built-in camera on your computer or a USB camera, like the Logitech C920 ($99).
OBS OBS (Open Broadcaster Software) is open-source software, which means it’s available for free.
OBS is a great option, but it doesn’t have all of the bells and whistles of paid software to make it intuitive or easy to use. You’ll need to do a bit of setup and testing before you go live.
Wirecast Wirecast ($495) has been around for years and has come a long way in the last few months as Facebook Live has exploded in popularity. The interface is a little more intuitive than OBS, but still requires some setup and experimentation.
a need for new techniques to handle the problem in online environments. To achieve zero cheating is hard (or impossible) without repelling not only cheaters but also those students who do not cheat, where a zero ‐ tolerance emphasis also would risk inhibiting students’ intrinsic motivation. Several studies indicate that existing virtual learning environments do not provide the features needed to control that the intended student is the one taking the online exam. Biometric Belt and Braces for Authentication in Distance Education.
One approach to prevent student’s dishonesty is the university code of honour. This is a set of rules describing what actions are not permitted and the consequences for students taking such actions. Another way of preventing cheating is the use of proctors during written exams. Even while using such codes of honour and proctors, universities still have found many students to cheat. Biometric Belt and Braces for Authentication in Distance Education.
Neutralisation is the phenomenon when a person rationalises his or her dishonest behaviour with arguments like “I can do this because the work load within this course is just too overwhelming” or “I can do this because I have a half ‐ time job on the side which gives me less study time than the other students have”. By doing so the student puts the blame for cheating on external factors rather than on himself, and also protects himself from the blame of others (Haines et al. 1986). This neutralises the behavior in the sense that the person’s feelings of shame are reduced or even eliminated. Haines et al. (1986 Biometric Belt and Braces for Authentication in Distance Education.
Simply asking participants to read a code of honour when they had the opportunity to cheat reduced dishonesty. Also whether one signed the code of honour or just read it influenced cheating. The Shu et al. (2011) study suggests that opportunity and knowledge of ethical standards are two factors that impact students’ ethical decision about cheating. This is in line with the results in (McCabe, Trevino and Butterfield 2001), showing that if students regularly are reminded of the university’s code of honour, they are less likely to cheat Biometric Belt and Braces for Authentication in Distance Education.
For an online course setting, Gearhart (2001) suggest that teachers should develop a guideline for “good practices”.
In online examination there are reports of students hiring other persons to increase their scores (Flior & Kowalski, 2010) and there is a need for new enhanced authentication tools (Ullah, Xiao & Lilley, 2012). For companies and Internet environments the process of authentication is often completed through the use of logon identification with passwords and the assumption of the password to guarantee that the user is authentic (Ramzan, 2007), but logins and passwords can be borrowed (Bailie & Jortberg, 2009). The discussion on how to provide enhanced authentication in online examination has led to many suggested solutions; four of them are: Biometric Belt and Braces for Authentication in Distance Education.
Challenge Questions: with questions based on third ‐ party data
Face ‐ to ‐ Face Proctored Exam: with government or institution issued identification
Web Video Conference Proctor: audio and video conference proctoring via webcam and screen monitoring service with live, certified proctors
Biometrics and Web Video Recording: with unique biometrics combined with the recording of student in exam via webcam
An idea for online courses is that assessment should not only be a one way process where the students get grades and feedback. The examination process should also be a channel for students’ feedback to teachers and course instructors (Mardanian & Mozelius, 2011). New online methods could be combined with traditional assessment in an array of techniques aligned to the learning outcomes (Runyon and Von Holzen, 2005). Examples of summative and formative assessment in an online course could be a mix of: Biometric Belt and Braces for Authentication in Distance Education.
Multiple choice questions (MCQ) tests, automatically corrected in a virtual learning environment
Term papers or essays analysed by the course instructors
Individual or group assignments posted in digital drop ‐ boxes
Oral or written tests conducted in the presence of the instructor or through videoconferences (Dikli, 2003)
Authors’ suggestion is a biometric belt and braces model with a combination of scanned facial coordinates and voice recognition, where only a minimum of biometric data has to be stored. Even if the model is based on biometrics with a medium to low grade of uniqueness and permanence, it would be reliable enough for authentication in online courses if two (or more) types of biometrics are combined with the presented dialogue based examination using an interaction/obser ‐ vation process via web cameras. Biometric Belt and Braces for Authentication in Distance Education.
Whether you’re using a smartphone or a DSLR camera, one thing Roberto recommends before recording is to check the environment. Look for and remove any distractions from the background. For example, if there’s noise from cars driving by you can change your location. If there’s a part of your office that needs to be cleaned, you can tidy up.
He also says you should think about the context of your background. For instance, when Roberto does personal vlogs as motivation for creatives and entrepreneurs who might be thinking about giving up, he uses his bookshelf as the backdrop. It’s appropriate because there is literally a collection of people behind him who put something out there and could have quit just as easily.
Roberto also notes you should consider audio, the lighting in the room, and take a photo of the shot, to check framing and composition, before you film. The photo gives you a way to make sure the video will be shot at the angle you want. Roberto shares that if he’s filming with his camera, he’ll use the remote or a timer to take a photo of him in the shot. With a smartphone, he says you can use a selfie stick, or tripod, or the timer feature.
Adobe Premiere Clip, which is simple to use. All you need is a free Adobe account, which you can sign up for via email. It can upload video directly to YouTube and Facebook for you. It also has color grading filters, lets you loop background audio (they have a few tracks which are royalty free), mix down the audio, edit clips together, cut things out, and more.
Plus, if you have professional software, like Adobe Premiere Pro at home, you can do a rough cut of everything in Premiere Clip from your phone, and then save it to Creative Cloud, go back to your desktop, and then tweak and do all the advanced editing there.