Searching for "internet history"
these are suggestions from Google Groups with doctoral cohorts 6, 7, 8, 9 from the Ed leadership program
How to find a book from InterLibrary Loan: find book ILL
Citing someone else’s citation?:
it gives you a good idea why will distance you from a possibility of plagiarizing.
Originality: Does the paper contain new and significant information adequate to justify publication?
Relationship to Literature: Does the paper demonstrate an adequate understanding of the relevant literature in the field and cite an appropriate range of literature sources? Is any significant work ignored?
Methodology: Is the paper’s argument built on an appropriate base of theory, concepts, or other ideas? Has the research or equivalent intellectual work on which the paper is based been well designed? Are the methods employed appropriate?
Results: Are results presented clearly and analyzed appropriately? Do the conclusions adequately tie together the other elements of the paper?
Implications for research, practice and/or society: Does the paper identify clearly any implications for research, practice and/or society? Does the paper bridge the gap between theory and practice? How can the research be used in practice (economic and commercial impact), in teaching, to influence public policy, in research (contributing to the body of knowledge)? What is the impact upon society (influencing public attitudes, affecting quality of life)? Are these implications consistent with the findings and conclusions of the paper?
Quality of Communication: Does the paper clearly express its case, measured against the technical language of the field and the expected knowledge of the journal’s readership? Has attention been paid to the clarity of expression and readability, such as sentence structure, jargon use, acronyms, etc.
Stanton, K. V., & Liew, C. L. (2011). Open Access Theses in Institutional Repositories: An Exploratory Study of the Perceptions of Doctoral Students. Information Research: An International Electronic Journal, 16(4),
We examine doctoral students’ awareness of and attitudes to open access forms of publication. Levels of awareness of open access and the concept of institutional repositories, publishing behaviour and perceptions of benefits and risks of open access publishing were explored. Method: Qualitative and quantitative data were collected through interviews with eight doctoral students enrolled in a range of disciplines in a New Zealand university and a self-completion Web survey of 251 students. Analysis: Interview data were analysed thematically, then evaluated against a theoretical framework. The interview data were then used to inform the design of the survey tool. Survey responses were analysed as a single set, then by disciple using SurveyMonkey’s online toolkit and Excel. Results: While awareness of open access and repository archiving is still low, the majority of interview and survey respondents were found to be supportive of the concept of open access. The perceived benefits of enhanced exposure and potential for sharing outweigh the perceived risks. The majority of respondents were supportive of an existing mandatory thesis submission policy. Conclusions: Low levels of awareness of the university repository remains an issue, and could be addressed by further investigating the effectiveness of different communication channels for promotion.
the researchers use the qualitative approach: by interviewing participants and analyzing their responses thematically, they build the survey.
Then then administer the survey (the quantitative approach)
How do you intend to use a mixed method? Please share
statement of the problem
metaphor — a novel or poetic linguistic expression where one or more words for a concept are used outside normal conventional meaning to express a similar concept. Aristotle l
The DNA of the research l A snapshot of the research l The foundation of the research l The Heart of the research l A “taste” of the research l A blueprint for the study
digital object identifier, or DOI
digital object identifier (DOI) is a unique alphanumeric string assigned by a registration agency (the International DOI Foundation) to identify content and provide a persistent link to its location on the Internet. The publisher assigns a DOI when your article is published and made available electronically.
Why do we need it?
2010 Changes to APA for Electronic Materials Digital object identifier (DOI). DOI available. If a DOI is available you no longer include a URL. Example: Author, A. A. (date). Title of article. Title of Journal, volume(number), page numbers. doi: xx.xxxxxxx
Mendeley (vs Zotero and/or RefWorks)
Online Writing Tools: FourOnlineToolsforwriting
social media and altmetrics
2. What is Constant Comparative Method?
There are bunch of other situations, when you may be strapped and instead of filling disgruntled and stressed, you can deliver the mental [junk] food for your brain.
Earbuds help me: 1. forget the unpleasant task, 2. Utilize time 3. Learn cool stuff
NPR Fresh Air
While this is not a Ph.D., but Ed.D. and we do not delve into the philosophy of science and dissertation etc. the more you know about this process, the better control you have over your dissertation.
more on fake news in this iMS blog
Election Strife, Protest And Noise: In 2017, Russia Cranked Up The Volume
The Russian Facebook scandal damages liberals as much as the right
Russia calls for answers after Chechen leader’s Instagram is blocked
Internet watchdog demands explanation after Ramzan Kadyrov claimed Facebook also suspended him without explanation
Kadyrov has accused the US government of pressuring the social networks to disable his accounts, which he said were blocked on Saturday without explanation. The US imposed travel and financial sanctions on Kadyrov last week over numerous allegations of human rights abuses.
The former rebel fighter, who is now loyal to the Russian president, Vladimir Putin, is a fan of social media, particularly Instagram, which he has used in recent years to make barely veiled death threats against Kremlin critics.
Leonid Levin, the head of the Russian parliament’s information technologies and communications committee, suggested the move by Facebook and Instagram was an attack on freedom of speech.
Dzhambulat Umarov, the Chechen press and information minister, described the blocking of Kadyrov’s accounts as a “vile” cyber-attack by the US.
Neither Instagram nor Facebook had commented at the time of publication.
In 2015, Kadyrov urged Chechen men not to let their wives use the WhatsApp messaging service after an online outcry over the forced marriage of a 17-year-old Chechen to a 47-year-old police chief. “Do not write such things. Men, take your women out of WhatsApp,” he said.
more on fake news in this IMS blog
When writing your dissertation…
Please have an FAQ-kind of list of the Google Group postings regarding resources and information on research and writing of Chapter 2
digital resource sets available through MnPALS Plus
[how to] write chapter 2
You were reminded to look at dissertations of your peers from previous cohorts and use their dissertations as a “template”: http://repository.stcloudstate.edu/do/discipline_browser/articles?discipline_key=1230
You also were reminded to use the documents in Google Drive: e.g. https://drive.google.com/open?id=0B7IvS0UYhpxFVTNyRUFtNl93blE
Please have also materials, which might help you organize our thoughts and expedite your Chapter 2 writing….
Do you agree with (did you use) the following observations:
The purpose of the review of the literature is to prove that no one has studied the gap in the knowledge outlined in Chapter 1. The subjects in the Review of Literature should have been introduced in the Background of the Problem in Chapter 1. Chapter 2 is not a textbook of subject matter loosely related to the subject of the study. Every research study that is mentioned should in some way bear upon the gap in the knowledge, and each study that is mentioned should end with the comment that the study did not collect data about the specific gap in the knowledge of the study as outlined in Chapter 1.
The review should be laid out in major sections introduced by organizational generalizations. An organizational generalization can be a subheading so long as the last sentence of the previous section introduces the reader to what the next section will contain. The purpose of this chapter is to cite major conclusions, findings, and methodological issues related to the gap in the knowledge from Chapter 1. It is written for knowledgeable peers from easily retrievable sources of the most recent issue possible.
Empirical literature published within the previous 5 years or less is reviewed to prove no mention of the specific gap in the knowledge that is the subject of the dissertation is in the body of knowledge. Common sense should prevail. Often, to provide a history of the research, it is necessary to cite studies older than 5 years. The object is to acquaint the reader with existing studies relative to the gap in the knowledge and describe who has done the work, when and where the research was completed, and what approaches were used for the methodology, instrumentation, statistical analyses, or all of these subjects.
If very little literature exists, the wise student will write, in effect, a several-paragraph book report by citing the purpose of the study, the methodology, the findings, and the conclusions. If there is an abundance of studies, cite only the most recent studies. Firmly establish the need for the study. Defend the methods and procedures by pointing out other relevant studies that implemented similar methodologies. It should be frequently pointed out to the reader why a particular study did not match the exact purpose of the dissertation.
The Review of Literature ends with a Conclusion that clearly states that, based on the review of the literature, the gap in the knowledge that is the subject of the study has not been studied. Remember that a “summary” is different from a “conclusion.” A Summary, the final main section, introduces the next chapter.
Here is the template from a different school (then SCSU)
When conducting qualitative data, how many people should be interviewed? Is there a minimum or a max
Here is my take on it:
Simple question, not so simple answer.
Generally, the number of respondents depends on the type of qualitative inquiry: case study methodology, phenomenological study, ethnographic study, or ethnomethodology. However, a rule of thumb is for scholars to achieve saturation point–that is the point in which no fresh information is uncovered in response to an issue that is of interest to the researcher.
If your qualitative method is designed to meet rigor and trustworthiness, thick, rich data is important. To achieve these principles you would need at least 12 interviews, ensuring your participants are the holders of knowledge in the area you intend to investigate. In grounded theory you could start with 12 and interview more if your data is not rich enough.
In IPA the norm tends to be 6 interviews.
You may check the sample size in peer reviewed qualitative publications in your field to find out about popular practice. In all depends on the research problem, choice of specific qualitative approach and theoretical framework, so the answer to your question will vary from few to few dozens.
How many interviews are needed in a qualitative research?
There are different views in literature and no one agreed to the exact number. Here I reviewed some mostly cited references. Based Creswell (2014), it is estimated that 16 participants will provide rich and detailed data. There are a couple of researchers agreed on 10–15 in-depth interviews are sufficient (Guest, Bunce & Johnson 2006; Baker & Edwards 2012).
your methodological choices need to reflect your ontological position and understanding of knowledge production, and that’s also where you can argue a strong case for smaller qualitative studies, as you say. This is not only a problem for certain subjects, I think it’s a problem in certain departments or journals across the board of social science research, as it’s a question of academic culture.
here more serious literature and research (in case you need to cite in Chapter 3)
Sample Size and Saturation in PhD Studies Using Qualitative Interviews
Gaskell, George (2000). Individual and Group Interviewing. In Martin W. Bauer & George Gaskell (Eds.), Qualitative Researching With Text, Image and Sound. A Practical Handbook (pp. 38-56). London: SAGE Publications.
Lieberson, Stanley 1991: “Small N’s and Big Conclusions.” Social Forces 70:307-20. (http://www.jstor.org/pss/2580241)
Savolainen, Jukka 1994: “The Rationality of Drawing Big Conclusions Based on Small Samples.” Social Forces 72:1217-24. (http://www.jstor.org/pss/2580299).
Small, M.(2009) ‘How many cases do I need ? On science and the logic of case selection in field-based research’ Ethnography 10(1) 5-38
Williams,M. (2000) ‘Interpretivism and generalisation ‘ Sociology 34(2) 209-224
how to start your writing process
If you are a Pinterest user, you are welcome to just sbuscribe to the board:
otherwise, I am mirroring the information also in the IMS blog:
APA citing of “unusual” resources
statistical modeling: your guide to Chapter 3
working on your dissertation, namely Chapter 3, you probably are consulting with the materials in this shared folder:
In it, there is a subfolder, called “stats related materials”
where you have several documents from the Graduate school and myself to start building your understanding and vocabulary regarding your quantitative, qualitative or mixed method research.
It has been agreed that before you go to the Statistical Center (Randy Kolb), it is wise to be prepared and understand the terminology as well as the basics of the research methods.
Please have an additional list of materials available through the SCSU library and the Internet. They can help you further with building a robust foundation to lead your research:
In this blog entry, I shared with you:
- Books on intro to stat modeling available at the library. I understand the major pain borrowing books from the SCSU library can constitute, but you can use the titles and the authors and see if you can borrow them from your local public library
- I also sought and shared with you “visual” explanations of the basics terms and concepts. Once you start looking at those, you should be able to further research (e.g. YouTube) and find suitable sources for your learning style.
I (and the future cohorts) will deeply appreciate if you remember to share those “suitable sources for your learning style” either by sharing in this Google Group thread and/or sharing in the comments section of the blog entry: http://blog.stcloudstate.edu/ims/2017/07/10/intro-to-stat-modeling. Your Facebook group page is also a good place to discuss among ourselves best practices to learn and use research methods for your chapter 3.
search for sources
Google just posted on their Facebook profile a nifty short video on Google Search
Watching the video, you may remember the same #BooleanSearch techniques from our BI (bibliography instruction) session of last semester.
Considering the fact of preponderance of information in 2017: your Chapter 2 is NOT ONLY about finding information regrading your topic.
Your Chapter 2 is about proving your extensive research of the existing literature.
The techniques presented in the short video will arm you with methods to dig deeper and look further.
If you would like to do a decent job exploring all corners of the vast area called Internet, please consider other search engines similar to Google Scholar:
Microsoft Semantic Scholar (Semantic Scholar); Microsoft Academic Search; Academicindex.net; Proquest Dialog; Quetzal; arXiv;
https://www.google.com/; https://scholar.google.com/ (3 min); http://academic.research.microsoft.com/; http://www.dialog.com/; http://www.quetzal-search.info; http://www.arXiv.org; http://www.journalogy.com/
More about such search engines in the following blog entries:
Let me know, if more info needed and/or you need help embarking on the “deep” search
tips for writing and proofreading
please have several infographics to help you with your writing habits (organization) and proofreading, posted in the IMS blog:
letter – request copyright permission
Here are several samples on mastering such letter:
Code2LIB February 2018
2018 Preconference Voting
10. The Virtualized Library: A Librarian’s Introduction to Docker and Virtual Machines
This session will introduce two major types of virtualization, virtual machines using tools like VirtualBox and Vagrant, and containers using Docker. The relative strengths and drawbacks of the two approaches will be discussed along with plenty of hands-on time. Though geared towards integrating these tools into a development workflow, the workshop should be useful for anyone interested in creating stable and reproducible computing environments, and examples will focus on library-specific tools like Archivematica and EZPaarse. With virtualization taking a lot of the pain out of installing and distributing software, alleviating many cross-platform issues, and becoming increasingly common in library and industry practices, now is a great time to get your feet wet.
(One three-hour session)
11. Digital Empathy: Creating Safe Spaces Online
User research is often focused on measures of the usability of online spaces. We look at search traffic, run card sorting and usability testing activities, and track how users navigate our spaces. Those results inform design decisions through the lens of information architecture. This is important, but doesn’t encompass everything a user needs in a space.
This workshop will focus on the other component of user experience design and user research: how to create spaces where users feel safe. Users bring their anxieties and stressors with them to our online spaces, but informed design choices can help to ameliorate that stress. This will ultimately lead to a more positive interaction between your institution and your users.
The presenters will discuss the theory behind empathetic design, delve deeply into using ethnographic research methods – including an opportunity for attendees to practice those ethnographic skills with student participants – and finish with the practical application of these results to ongoing and future projects.
(One three-hour session)
14. ARIA Basics: Making Your Web Content Sing Accessibility
(One three-hour session)
18. Learning and Teaching Tech
Tech workshops pose two unique problems: finding skilled instructors for that content, and instructing that content well. Library hosted workshops are often a primary educational resource for solo learners, and many librarians utilize these workshops as a primary outreach platform. Tackling these two issues together often makes the most sense for our limited resources. Whether a programming language or software tool, learning tech to teach tech can be one of the best motivations for learning that tech skill or tool, but equally important is to learn how to teach and present tech well.
This hands-on workshop will guide participants through developing their own learning plan, reviewing essential pedagogy for teaching tech, and crafting a workshop of their choice. Each participant will leave with an actionable learning schedule, a prioritized list of resources to investigate, and an outline of a workshop they would like to teach.
(Two three-hour sessions)
23. Introduction to Omeka S
Omeka S represents a complete rewrite of Omeka Classic (aka the Omeka 2.x series), adhering to our fundamental principles of encouraging use of metadata standards, easy web publishing, and sharing cultural history. New objectives in Omeka S include multisite functionality and increased interaction with other systems. This workshop will compare and contrast Omeka S with Omeka Classic to highlight our emphasis on 1) modern metadata standards, 2) interoperability with other systems including Linked Open Data, 3) use of modern web standards, and 4) web publishing to meet the goals medium- to large-sized institutions.
In this workshop we will walk through Omeka S Item creation, with emphasis on LoD principles. We will also look at the features of Omeka S that ease metadata input and facilitate project-defined usage and workflows. In accordance with our commitment to interoperability, we will describe how the API for Omeka S can be deployed for data exchange and sharing between many systems. We will also describe how Omeka S promotes multiple site creation from one installation, in the interest of easy publishing with many objects in many contexts, and simplifying the work of IT departments.
(One three-hour session)
24. Getting started with static website generators
Have you been curious about static website generators? Have you been wondering who Jekyll and Hugo are? Then this workshop is for you
My note: https://opensource.com/article/17/5/hugo-vs-jekyll
But this article isn’t about setting up a domain name and hosting for your website. It’s for the step after that, the actual making of that site. The typical choice for a lot of people would be to use something like WordPress. It’s a one-click install on most hosting providers, and there’s a gigantic market of plugins and themes available to choose from, depending on the type of site you’re trying to build. But not only is WordPress a bit overkill for most websites, it also gives you a dynamically generated site with a lot of moving parts. If you don’t keep all of those pieces up to date, they can pose a significant security risk and your site could get hijacked.
In this hands-on workshop, we’ll start by exploring static website generators, their components, some of the different options available, and their benefits and disadvantages. Then, we’ll work on making our own sites, and for those that would like to, get them online with GitHub pages. Familiarity with HTML, git, and command line basics will be helpful but are not required.
(One three-hour session)
26. Using Digital Media for Research and Instruction
To use digital media effectively in both research and instruction, you need to go beyond just the playback of media files. You need to be able to stream the media, divide that stream into different segments, provide descriptive analysis of each segment, order, re-order and compare different segments from the same or different streams and create web sites that can show the result of your analysis. In this workshop, we will use Omeka and several plugins for working with digital media, to show the potential of video streaming, segmentation and descriptive analysis for research and instruction.
(One three-hour session)
28. Spark in the Dark 101 https://zeppelin.apache.org/
This is an introductory session on Apache Spark, a framework for large-scale data processing (https://spark.apache.org/). We will introduce high level concepts around Spark, including how Spark execution works and it’s relationship to the other technologies for working with Big Data. Following this introduction to the theory and background, we will walk workshop participants through hands-on usage of spark-shell, Zeppelin notebooks, and Spark SQL for processing library data. The workshop will wrap up with use cases and demos for leveraging Spark within cultural heritage institutions and information organizations, connecting the building blocks learned to current projects in the real world.
(One three-hour session)
29. Introduction to Spotlight https://github.com/projectblacklight/spotlight
Spotlight is an open source application that extends the digital library ecosystem by providing a means for institutions to reuse digital content in easy-to-produce, attractive, and scholarly-oriented websites. Librarians, curators, and other content experts can build Spotlight exhibits to showcase digital collections using a self-service workflow for selection, arrangement, curation, and presentation.
This workshop will introduce the main features of Spotlight and present examples of Spotlight-built exhibits from the community of adopters. We’ll also describe the technical requirements for adopting Spotlight and highlight the potential to customize and extend Spotlight’s capabilities for their own needs while contributing to its growth as an open source project.
(One three-hour session)
31. Getting Started Visualizing your IoT Data in Tableau https://www.tableau.com/
The Internet of Things is a rising trend in library research. IoT sensors can be used for space assessment, service design, and environmental monitoring. IoT tools create lots of data that can be overwhelming and hard to interpret. Tableau Public (https://public.tableau.com/en-us/s/) is a data visualization tool that allows you to explore this information quickly and intuitively to find new insights.
This full-day workshop will teach you the basics of building your own own IoT sensor using a Raspberry Pi (https://www.raspberrypi.org/) in order to gather, manipulate, and visualize your data.
All are welcome, but some familiarity with Python is recommended.
(Two three-hour sessions)
32. Enabling Social Media Research and Archiving
Social media data represents a tremendous opportunity for memory institutions of all kinds, be they large academic research libraries, or small community archives. Researchers from a broad swath of disciplines have a great deal of interest in working with social media content, but they often lack access to datasets or the technical skills needed to create them. Further, it is clear that social media is already a crucial part of the historical record in areas ranging from events your local community to national elections. But attempts to build archives of social media data are largely nascent. This workshop will be both an introduction to collecting data from the APIs of social media platforms, as well as a discussion of the roles of libraries and archives in that collecting.
Assuming no prior experience, the workshop will begin with an explanation of how APIs operate. We will then focus specifically on the Twitter API, as Twitter is of significant interest to researchers and hosts an important segment of discourse. Through a combination of hands-on and demos, we will gain experience with a number of tools that support collecting social media data (e.g., Twarc, Social Feed Manager, DocNow, Twurl, and TAGS), as well as tools that enable sharing social media datasets (e.g., Hydrator, TweetSets, and the Tweet ID Catalog).
The workshop will then turn to a discussion of how to build a successful program enabling social media collecting at your institution. This might cover a variety of topics including outreach to campus researchers, collection development strategies, the relationship between social media archiving and web archiving, and how to get involved with the social media archiving community. This discussion will be framed by a focus on ethical considerations of social media data, including privacy and responsible data sharing.
Time permitting, we will provide a sampling of some approaches to social media data analysis, including Twarc Utils and Jupyter Notebooks.
(One three-hour session)
more on social media in this IMS blog
Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom
By Richard Chang 04/17/17
according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy”
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
more on students and privacy
Why I’m Asking You Not to / Use Laptops
++++++++++ against: ++++++++++++++++
Children who use smartphones, tablets, and video games for more than seven hours a day are more likely to experience premature thinning of the cortex, the outermost layer of the brain that processes thought and action, a 2018 study found. https://t.co/OJe6ZTBVkx
— EdWeek Teacher (@EdWeekTeacher) August 1, 2019
research showing how laptops can be more of a distraction than a learning enabler. Purdue University even started blocking streaming websites such as Netflix, HBO, Hulu and Pandora.
But others say banning laptops can be counterproductive, arguing these devices can create opportunity for students to discover more information during class or collaborate. And that certain tools and technologies are necessary for learners who struggle in a traditional lecture format.
The professor is upset. The professor has taken action, by banning laptops.
Bruff, whose next book, Intentional Tech: Principles to Guide the Use of Educational Technology in College Teaching, is set to be published this fall, is among the experts who think that’s a mistake. Why? Well, for one thing, he said, students are “going to have to graduate and get jobs and use laptops without being on Facebook all day.” The classroom should help prepare them for that.
Study: Use of digital devices in class affects students’ long-term retention of information
- A new study conducted by researchers at Rutgers University reveals that students who are distracted by texts, games, or videos while taking lecture notes on digital devices are far more likely to have their long-term memory affected and to perform more poorly on exams, even if short-term memory is not impacted, EdSurge reports.
- Exam performance was not only poorer for students using the devices, but also for other students in classes that permitted the devices because of the distraction factor, the study found.
- After conducting the study, Arnold Glass, the lead researcher, changed his own policy and no longer allows his students to take notes on digital devices.
By Jack Grove Twitter: @jgro_the April 4, 2017
Using laptops in class harms academic performance, study warns. Researchers say students who use computers score half a grade lower than those who write notes
findings, published in the journal Economics of Education Review in a paper, based on an analysis of the grades of about 5,600 students at a private US liberal arts college, found that using a laptop appeared to harm the grades of male and low-performing students most significantly.
While the authors were unable to definitively say why laptop use caused a “significant negative effect in grades”, the authors believe that classroom “cyber-slacking” plays a major role in lower achievement, with wi-fi-enabled computers providing numerous distractions for students.
April 07, 2006
A Law Professor Bans Laptops From the Classroom
by Anne Curzan http://www.chronicle.com/blogs/linguafranca/2014/08/25/why-im-asking-you-not-to-use-laptops/
Laptop multitasking hinders classroom learning for both users and nearby peers
March 13, 2017
The Distracted Classroom
Welcome, Freshmen. Look at Me When I Talk to You.
October 28, 2015
Memorization, Cheating, and Technology. What can we do to stem the increased use of phones and laptops to cheat on exams in class?
+++++++++++++++ for +++++++++++++
The learning experience is different in schools that assign laptops, a survey finds
Blended Learning – the idea of incorporating technology into the every day experience of education – can save time, raise engagement, and increase student retention.
Lets face it, our students are addicted to their phones. Like…drugs addicted. It is not just a bad habit, it is hard wired in their brains(literally) to have the constant stimulation of their phones.
If you are interested in the research, there is a lot out there to read about how it happens and how bad it is.
a Scientific American article published about a recent study of nomophobia – on adults (yes, many of us are addicted too).
Best Practices for Laptops in the Classroom
September 11, 2016
No, Banning Laptops Is Not the Answer. And it’s just as pointless to condemn any ban on electronic devices in the classroom
Don’t Ban Laptops in the Classroom
Use of Laptops in the Classroom: Research and Best Practices. Tomorrow’s Teaching and Learning
On Not Banning Laptops in the Classroom
+++++++++++++ neutral / observation +++++++++++++++
F January 26, 2001
Colleges Differ on Costs and Benefits of ‘Ubiquitous’ Computing
“Bring Your Own Device” Policies?
June 13, 2014, 2:40 pm By Robert Talbert
Three issues with the case for banning laptops
3 Tips for Managing Phone Use in Class
more on mobile learning in this IMS blog
Creating Cartoons to Spark Engagement, Learning
Avoid using infographics for purposes, which toodoo can serve.
Infographics are for about visualization of stats, not just visualization.
By Vicki E. Phillips
As instructors, we are constantly looking for new ways to capture our students’ attention and increase their participation in our classes, especially in the online modalities. We spend countless hours crafting weekly announcements for classes and then inevitably receive multiple emails from our students asking the very same questions that we so carefully and completely answered in those very same announcements! The question remains, how do we get them to read our posts?
It was precisely that problem I was trying to solve when I came across several articles touting the benefits of comics in higher education classrooms. I knew I couldn’t create an entire comic book, but I wondered if I could create a content-related cartoon that would not only capture students’ attention and maybe make them laugh, but also interest them enough that they would read the entire announcement or post. In doing so, I would be freed from responding to dozens of emails asking the same questions outlined in the announcements and students could focus on the homework.
A quick Internet search led me to a plethora of free “click and drag” cartoon making software applications to try. I started posting my own cartoons on characters, themes, etc. on the weekly literature we were studying in my upper division American and Contemporary World Literature classes, as well as to offer reminders or a few words of encouragement. Here’s an example of one I posted during week 7 of the semester when students can become discouraged with their assignment load: http://www.toondoo.com/cartoon/10115361
After a positive response, I decided to provide my online students the opportunity to try their hand at cartoon creation. I created a rubric and a set of instructions for an easy to use, free program that I had used, and I opened up the “cartoon challenge” to the students. The results were nothing short of amazing—what intrigued me the most was the time and effort they took with their cartoons. Not only did they create cartoons on the story we were reading, but they also wrote additional posts explaining their ideas for the creation, discussing why they chose a particular scene, and identifying those elements pertinent to the points they were making. These posts tended to receive many more substantial comments from their peers than the traditional discussion board posts, indicating they were being read more.
When students in my face-to-face course heard about the cartoons, they asked to try this approach as well. Their cartoons, shared in class via the overhead projector, led to some of the most engaging and interesting discussions I have ever had in the residential literature classes as students explained how they came up with the elements they chose, and why they picked a certain scene from the reading. The positive student feedback has been instrumental in my continuing to offer this option in both my online and face-to-face classes.
How does one get started in making these cartoons? The good news is you do not have to be an artist to make a cartoon! There are free programs with templates, clip art, and all the elements you would need to click and drag into place all those wonderful ideas you have simmering in your brain. My favorite to use is ToonDoo, available at http://toondoo.com. I like it because there are literally hundreds of elements, a search bar, and it lets me customize what I want to say in the dialog bubbles. It is very user friendly, even for those of us with limited artistic ability.
The whole experience has been overwhelmingly positive for me, and judging from the feedback received, for the students as well. It has also reminded me of one of my teaching goals, which is to incorporate more activities which would fall under assimilating and creating aspects of Bloom’s Taxonomy (Bloom’s Revised Taxonomy, 2001). If that is your goal as well, then try inserting a cartoon in those weekly announcements and ask for feedback from your students—I think you’ll be pleasantly surprised!
Armstrong, Patricia (n.d.) Bloom’s Taxonomy, Vanderbilt University, Center for Teaching. Retrieved from https://cft.vanderbilt.edu/guides-sub-pages/blooms-taxonomy/#2001
Pappas, Christopher (2014) The 5 Best Free Cartoon Making Programs for Teachers. Retrieved from: https://elearningindustry.com/the-5-best-free-cartoon-making-tools-for-teachers
Vicki E. Phillips is an assistant professor of English and Literature at Rasmussen College, Ocala, Fla.
cartoons for historians and history teaching / learning:
more on effective presentations in this IMS blog
more on create infographics in this IMS blog:
Previous 1 2 3 4 Next