Searching for "reference"

faculty, research and library

Ithaka S+R US Faculty Survey 2015

April 4, 2016 Christine WolffAlisa B. RodRoger C. Schonfeld http://sr.ithaka.org/?p=277685

The scholar-centric nature of the questionnaire ensures that potential changes in research and teaching inform our thinking, not only about academic libraries and scholarly publishing, but about changes in the educational enterprise more broadly.

My note:

By showcasing the diminishing role of physical presence and the increasing research using online methods, this study clearly proves that the 4/5 years debate if the reference librarians must sit on that desk (and answer the most popular question “where is the bathroom”) is futile.

What the study does not show, since it is conducted in its traditional (conservative) form, is that the library is NOT only the traditional library, where faculty and student search for information (being that in its physical appearance or in online access), but the library entails services, very close to the ones offered by IMS.

I see a discrepancy between literature (where libraries compel much more proactive approach regarding services) and the structure of this survey, which focuses on the traditional (conservative) role of the library as a gatekeeper to online resources [only]. Besides entrenching in 90’s practices of information literacy and/or “dressing up” old-fashioned information literacy with the new cloths of “digital literacy”as I witness at my workplace, the faculty must have been surveyed on the skills in metaliteacies, which the library can [must] provide, as per literature.

oculus

THE OCULUS RIFT REVIEW: The future is finally here, and it’s beautiful

http://www.businessinsider.com/oculus-rift-virtual-reality-headset-and-games-review-2016-3

lengthy and detailed articles how to entertain with the new Oculus

+++++++++++++

Virtual Reality Whiz Palmer Luckey: Future Will Be ‘More Boring Than We Think’

http://www.npr.org/sections/alltechconsidered/2016/03/28/472168507/virtual-reality-whiz-palmer-luckey-future-will-be-more-boring-than-we-think


+++++++++++++

Rabey, Lisa. [Lita-L] Internet Of Things. 2016. E-mail.

A month or so ago, I asked on ALA Think Tank if anyone was using IoT in their libraries, and if so: what, how, when, where; details man, details! Other than someone asking me what the IoT is (https://en.wikipedia.org/wiki/Internet_of_Things), I got crickets.

Yesterday Jason Griffey wrote, “How libraries can save the internet of things from the web’s centralized fate” (https://boingboing.net/2016/03/28/how-libraries-can-save-the-int.html) and this got me wondering again: Is anyone doing something in library land  with IoT?

++++++++++++++

More on wearables in this IMS blog:

https://blog.stcloudstate.edu/ims/?s=oculus&submit=Search

More on virtual reality in this IMS blog:

https://blog.stcloudstate.edu/ims/?s=virtual+reality&submit=Search

student-centered learning literature review

resources on student-centered learning and the use of rubrics, multimedia, social media to personalize and engage learners

WHAT:
what is student-centered learning:
Student-centered learning, also known as learner-centered education, broadly encompasses methods of teaching that shift the focus of instruction from the teacher to the student. In original usage, student-centered learning aims to develop learner autonomy and independence [1] by putting responsibility for the learning path in the hands of students.[2][3][4] Student-centered instruction focuses on skills and practices that enable lifelong learning and independent problem-solving.[5] Student-centered learning theory and practice are based on the constructivist learning theory that emphasizes the learner’s critical role in constructing meaning from new information and prior experience. https://en.wikipedia.org/wiki/Student-centred_learning

+++++++++++++

Student-centered learning moves students from passive receivers of information to active participants in their own discovery process. What students learn, how they learn it and how their learning is assessed are all driven by each individual student’s needs and abilities.

At the system level, this requires implementing curriculum planning practices, pedagogy and assessment methods that support a student-centric approach. In the classroom, teachers craft instruction and apply technology in a way that best serves each student’s learning journey. Technology use is always guided by two primary criteria:

  1. What’s appropriate for the task at hand?
  2. How can activities be designed to develop higher-order thinking skills?

http://www.iste.org/standards/essential-conditions/student-centered-learning

Why is it important?

When students take responsibility for their own learning, they become explorers capable of leveraging their curiosity to solve real-world problems. To that end, the ISTE Standards guide teachers toward designing learning experiences that permit student independence and foster lifelong learning.

Technology allows for an unprecedented level of personalized learning, with valuable opportunities to monitor progress and engagement, follow student thinking, and digitally assess competencies. When schools effectively leverage both technology and pedagogy, both students and teachers become empowered to make decisions about their own learning and teaching.

True student-centered learning requires more than just an increase in technology implementation. It represents a shift in the educational culture toward a system that supports technology for standards-based learning and real-world problem solving. As a system transitions to a student-centered approach, educators can more effectively apply technology to improve learning outcomes and help students develop the skills for college and career readiness.

http://www.iste.org/standards/essential-conditions/student-centered-learning

HOW:

student-centered learning is including different methods, such as:

  • active learning.
  • cooperative learning.
  • inductive teaching and learning.
  • minimizing or eliminating student resistance to student-centered teaching methods.
  • Links to relevant web sites.

The University of Minnesota Cooperative Learning Center.

http://www4.ncsu.edu/unity/lockers/users/f/felder/public/Student-Centered.html

  • personalized learning
  • anytime anywhere learning

http://edglossary.org/student-centered-learning/

student-centered learning through assessment : create the right rubrics

#2 from http://www.edweek.org/tm/articles/2013/12/24/ctq_powell_strengths.html

Steffens, K. (2014). E-rubrics to facilitate self-regulated learning. Revista De Docencia Universitaria, 12(1), 11-12.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d96263668%26site%3dehost-live%26scope%3dsite

Rejab, M. M., Awang, I. b., Hassan, S. b., & Ahmad, M. b. (2010). Customizable Rubrics Model for Formative Evaluation of Problem-Based Learning Course. Annual International Conference On Infocomm Technologies In Competitive Strategies, 126-131. doi:10.5176/978-981-08-7240-3_I-51

CORLU, M. S. (2013). Insights into STEM Education Praxis: An Assessment Scheme for Course Syllabi.Educational Sciences: Theory & Practice, 13(4), 2477-2485. doi:10.12738/estp.2013.4.1903

Ma, A. W. (2009). A Longitudinal Study of the Use of Computer Supported Collaborative Learning in Promoting Lifelong Learning Skills. Issues In Informing Science & Information Technology, 665-86.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d44457533%26site%3dehost-live%26scope%3dsite

Klein, G. C., & Carney, J. M. (2014). Comprehensive Approach to the Development of Communication and Critical Thinking: Bookend Courses for Third- and Fourth-Year Chemistry Majors. Journal Of Chemical Education,91(10), 1649-1654. doi:10.1021/ed400595j

Moore, T. J., Guzey, S. S., Roehrig, G. H., Stohlmann, M., Park, M. S., Kim, Y. R., & … Teo, H. J. (2015). Changes in Faculty Members’ Instructional Beliefs while Implementing Model-Eliciting Activities. Journal Of Engineering Education, 104(3), 279-302. doi:10.1002/jee.20081

student-centered learning through engagement and buy-in: engage with multimedia

More on student centered learning in this blog:

https://blog.stcloudstate.edu/ims/?s=student+centered+learning&submit=Search

student-centered learning through engagement and buy-in: engage with social media

#3 from http://www.facultyfocus.com/articles/effective-teaching-strategies/five-characteristics-of-learner-centered-teaching/

+++++++\

Attard, A., Di lorio Emma, Geven, K., & Santa, R. (2010, October). Student-Centred Learning Toolkit for students, staff and higher education institutions. Education International. Retrieved from http://pascl.eu/wp-content/uploads/SCL_toolkit_ESU_EI.pdf

universal design

Universal Design for Libraries and Librarians

Instructors: Jessica Olin, Director of the Library, Robert H. Parker Library, Wesley College; and Holly Mabry, Digital Services Librarian, Gardner-Webb University

Offered: April 11 – May 27, 2016
A Moodle based web course with asynchronous weekly content lessons, tutorials, assignments, and groups discussion.

Register Online, page arranged by session date (login required)

Universal Design is the idea of designing products, places, and experiences to make them accessible to as broad a spectrum of people as possible, without requiring special modifications or adaptations. This course will present an overview of universal design as a historical movement, as a philosophy, and as an applicable set of tools. Students will learn about the diversity of experiences and capabilities that people have, including disabilities (e.g. physical, learning, cognitive, resulting from age and/or accident), cultural backgrounds, and other abilities. The class will also give students the opportunity to redesign specific products or environments to make them more universally accessible and usable.

Takeaways
By the end of this class, students will be able to…

  • Articulate the ethical, philosophical, and practical aspects of Universal Design as a method and movement – both in general and as it relates to their specific work and life circumstances
  • Demonstrate the specific pedagogical, ethical, and customer service benefits of using Universal Design principles to develop and recreate library spaces and services in order to make them more broadly accessible
  • Integrate the ideals and practicalities of Universal Design into library spaces and services via a continuous critique and evaluation cycle

 

Here’s the Course Page

Jessica Olin is the Director of the Library, Robert H. Parker Library, Wesley College. Ms. Olin received her MLIS from Simmons College in 2003 and an MAEd, with a concentration in Adult Education, from Touro University International. Her first position in higher education was at Landmark College, a college that is specifically geared to meeting the unique needs of people with learning differences. While at Landmark, Ms. Olin learned about the ethical, theoretical, and practical aspects of universal design. She has since taught an undergraduate course for both the education and the entrepreneurship departments at Hiram College on the subject.

Holly Mabry received her MLIS from UNC-Greensboro in 2009. She is currently the Digital Services Librarian at Gardner-Webb University where she manages the university’s institutional repository, and teaches the library’s for-credit online research skills course. She also works for an international virtual reference service called Chatstaff. Since finishing her MLIS, she has done several presentations at local and national library conferences on implementing universal design in libraries with a focus on accessibility for patrons with disabilities.

Dates:

February 29 – March 31, 2016

Costs:

  • LITA Member: $135
  • ALA Member: $195
  • Non-member: $260

 

Technical Requirements:

Moodle login info will be sent to registrants the week prior to the start date. The Moodle-developed course site will include weekly new content lessons and is composed of self-paced modules with facilitated interaction led by the instructor. Students regularly use the forum and chat room functions to facilitate their class participation. The course web site will be open for 1 week prior to the start date for students to have access to Moodle instructions and set their browser correctly. The course site will remain open for 90 days after the end date for students to refer back to course material.

Registration Information:

Register Online, page arranged by session date (login required)
OR
Mail or fax form to ALA Registration
OR
call 1-800-545-2433 and press 5
OR
email registration@ala.org

MOOC and peer pressure

reference bias in peer assessment. MOOCs

Rogers, T., & Feller, A. (2016). Discouraged by Peer Excellence: Exposure to Exemplary Peer Performance Causes Quitting. Psychological Science, 27(3), 365–374. http://doi.org/10.1177/0956797615623770
exposure to exemplary peer performances can undermine motivation and success by causing people to perceive that they cannot attain their peers’ high levels of performance. It also causes de-identification with the relevant domain.

http://www.wired.com/insights/2014/08/moocs-are-dead-long-live-the-mooc/

pedagogy can be easily overlooked for convenience or cost.

as educators I think it is in our best interest to realize that just because one modality provides better instructional or assessment models than another, doesn’t mean people won’t sacrifice out of need. As my favorite boss used to say, products and services are all about Time, Money, and Quality… pick two. Progress updates work.

+++++++++++++++

Piech, C., Huang, J., Chen, Z., Do, C., Ng, A., & Koller, D. (n.d.). tuningPeerGrading.pdf. Retrieved March 25, 2016, from http://web.stanford.edu/~cpiech/bio/papers/tuningPeerGrading.pdf

honors and shame

221 HONORS.
The Honor System:
A Comparison Between the U.S. South and the Mediterranean World

Plamen Miltenoff, MLIS, Ph.D.

Meeting Times & Places

5:00 pm – 7:30 pm Wednesdays Miller Center 206

  • Asynchronous interaction:
    • Most of the discussions will occur asynchronously in the D2L “Discussion” area.
    • Use of Web 2.0 tools such as blogs and wikis is strongly encouraged.
    • Use of Web 2.0 tools such as social networking sites (e.g., Facebook) only after consultation with the instructor

Contact Information

Back to Top

The best way to contact me is through email, but you can use any of the options below.

Email: pmiltenoff@stcloudstate.edu
Phone: 320-308-3072
Web Site: http://web.stcloudstate.edu/pmiltenoff/faculty
Office Location: Miller Center, 204-J

Course Description:

The Honor system is a phenomenon well known in many cultures across the globe and strongly presented in cultures since Ancient Greece and Rome. The concepts of honor and shame have long been associated with cultures in the Mediterranean region mostly because the first scholars to study the social impact of these concepts did so in Southern Europe. Honor has two fundamental components: birth and morality. People could gain or lose their honor by the morality of their conduct. Despite the scholarly emphasis on the Mediterranean, the concept of honor influenced social systems all over the world, and historians are beginning to detect its traces in places as different as China and Africa. The Southern Honor system can firmly be traced back in the European roots and determined to a great degree the American history of the 19th century.

This course will study the geography, history, sociology and religions, cultural and political systems of two worlds and learn to compare the findings. Based on those comparisons, lessons in gender, culture and politics will be drawn.

  1. What is Honor and Shame system and why is it so important to know about it and recognize it
  2. What is the connection between the Honor system in the Mediterranean and in the American South
  3. How does the knowledge of the Honor system aim our daily actions and our global perspective

Course Goals

Students in this course will

  • Practice research methods and ability to find and evaluate information as well as select reliable information technologies.
  • Explore applications and technologies for communication and creative collaboration.
  • Gain practical, hands-on experience with a wide variety of research and online communication tools.
  • Students will demonstrate ability to research and find academically reliable information from peer-reviewed sources in the online databases, which SCSU is subscribed. Students will demonstrate ability to find and evaluate information from the Internet.
  • Students will demonstrate competencies in creation of textual and multimedia narratives in individual and collaborative environment.
  • Students will demonstrate competencies in application of technology toward creation and dissemination of textual and multimedia materials.

Attendance/Discussion Requirements

  • Attendance is required. If you cannot attend class, it is required to alert the instructor in advance. If the reason for the absence is an emergency, it is expected to approach the instructor and provide an explanation thereafter about the character of the emergency.
  • Discussion are expected. If you are shy and are hesitant to participate in class, you must compensate with the use of other communication tools (e.g., D2L Discussion List).

Assignment Descriptions

  • Discussions. You are expected to contribute to each class session with your ideas and your responses to the ideas of your peers. Your comments are expected in class and in between class sessions (using, e.g., D2L discussion list). Your comments must go beyond “yes, I agree,” and “no, I disagree” and provide analysis and synthesis of your thoughts.
  • Readings – you will be expected to contribute to each class sessions with bibliographical findings on your own.
  • Written responses – you will be expected to deliver four written responses to peer-reviewed articles related to topics discussed in the class sessions.
  • Final project – you will be expected to write and present a final project. The written part of the project will be in the realm of 4-5000 words; will adhere to academic research and style; will include a bibliography with at least 2/3 of the sources being peer-reviewed and outside of the 5000 words. The presentation can be of any multimedia form, whereas it will be peer-evaluated, but my (instructor’s) preference will be given to advance multimedia presentations (beyond PPT and using e.g. Prezy, iMovie/Moviemaker movie and/or audio narration)

Course Policies

Back to Top

Late Assignment Policy

All assignments should be submitted by midnight of the date on which they are due. Ten percent of an assignment’s point value will be removed for each day an assignment is late. This policy will be adjusted on a case-by-case basis if emergencies prevent you from submitting an assignment on time. In these situations, contact me as soon as is reasonable to determine how this policy can be adjusted in a way that meets your needs and is still fair to other students.

Grading

Back to Top

The grade book in D2L will be used to show detailed information about grades in this course. The table below shows the value of each assignment and the total number of points available.

  Overall Grade
94% – 100% = A
90 % – 93.99% = A-
86% – 89.99% = B+
83% – 85.99% = B
80% – 82.99% = B-
70% – 79.99% = C
60% – 69.99% = D
59.99% or lower = F

 

Assignments Schedule

WEEK 1. August 28
Reading[s]:
Peruse through all articles in the D2L content area. Choose one article to your liking and be ready to reflect on it.Assignment[s]:
1. complete entry survey. 2. Prepare to present in coherent and concise manner your understanding of Honors and Shame and discuss the goals for this course. 3. Enter a short essay in the D2L discussion on how do you see applying the knowledge from this course in your future studies, research and work
Introduction.  Orientation, class parameters and familiarizing with the syllabus. Questions and issues. Course goals What is an/the Honor System? Entry Interview (D2L survey is completed and analyzed). Why explore this topic and these vastly different geographic entities (US South and the Mediterranean). Define interest in this class and interest for a project; how this class can help your studies? Your career? All over as a human being?
WEEK 2.Sept 4

Reading[s]:
BUSATTA, S. (2006). Honour and Shame in the Mediterranean. Antrocom, 2(2). 75-78. Retrieved March 19, 2013, from http://www.academia.edu/524890/Honour_and_Shame_in_the_Mediterranean
Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson.   http://tinyurl.com/qdvc499. (p. 24-26).
Osiek, C. (2008). Women, honor, and context in Mediterranean antiquity, 64(1), 323–337. doi:10.4102/hts.v64i1.2
Esmer, T. U. (n.d.). Honor in Ottoman and Contemporary Mediterranean Societies: Controversies, Continuities, and New Directions. conference announcement. Retrieved from http://www.h-net.org/announce/show.cgi?ID=196551

Assignment[s]: 1. Find an article on Honor and Shame. 2. Outline in two paragraphs the content of one of the three articles and in a third paragraph compare to your findings; use academic style to log your responses. If you have hesitation about your style, please check with the Write Place, your peers and me.

Why research? Work on the reading material for class

Find articles for the course.

What is academic research? What is a peer-review article? When and how research the Internet. How do I access and keep track of resources.
RefWorks versus Zotero and Mendeley
What is an academic paper. How do I write an academic paper. The Write place.
Making plans: final project
WEEK 3. Sept 11

Reading[s]:
Osiek, C. (2008). Women, honor, and context in Mediterranean antiquity, 64(1), 323–337. doi:10.4102/hts.v64i1.2
Smith, A. (2004). Murder in Jerba: Honour, Shame and Hospitality among Maltese in Ottoman Tunisia. History and Anthropology Routledge, 15(2), 107–132.
Harris, J. W. (2002). Honor, Grace, and War (But Not Slavery?) in Southern Culture. Reviews in American History, 30(1), 1–7. doi:10.2307/30031707

Assignment[s]:
Your first written response is due in the D2L   dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a historical perspective Do we have a robust theory/notion about the Honor/Shame system through the centuries? Do you think tracking that model through centuries helps in the 21st century? If yes, how and if no, why?
WEEK 4. Sept 18

Reading[s]: Fernand Braudel (http://en.wikipedia.org/wiki/Fernand_Braudel) and the Annales School
Santos, N. F. (2008). Family, Patronage, and Social Contests: Narrative Reversals in the Gospel of Mark. S&J, (2). (footnote p. 200).
Hall, J. L. (1907). Half-hours in southern history. B. F. Johnson publishing co.
Harrell, L. A. (2009, December 4). It’s an honorable choice: Rebellions Against Southern Honor in William Styron’s The Confessions of Nat Turner. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2614

Assignment[s]:
Your second written response is due in the D2L dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a geographic perspective Is there a “southern” connection (Mediterranean is the European South)? Can be Annale School be right (geography and relief determines history)? To what degree geography and geographical conditions determine such models (Honor/Shame)?
WEEK 5. Sept 25

Reading[s]: Crook, Z. (2009). Honor, Shame, and Social Status Revisited. Journal of Biblical Literature, 128(3), 591–611.
Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson. http://tinyurl.com/qdvc499 (p. 22)
Lever, A. (1986). Honour as a Red Herring. Critique of Anthropology, 6(3), 83–106. doi:10.1177/0308275X8600600305

Assignment[s]:
Your third written response is due in the D2L   dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a cultural perspective. Gender roles, Masculinity Does the Honor/Shame model help understand gender roles, social status, masculinity etc.?
WEEK 6. Oct 2

Reading[s]:
Crook, Z. (2009). Honor, Shame, and Social Status Revisited. Journal of Biblical Literature, 128(3), 591–611. (p. 593)
Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson. http://tinyurl.com/qdvc499. (p. 26-27; p. 30-33).
Cohen, D. (n.d.). Insult, Aggression, and the Southern Culture of Honor: An “Experimental Ethnography.” Journal of Personality and Social Psychology, 70(5), 945–960.
Harris, J. W. (2002). Honor, Grace, and War (But Not Slavery?) in Southern Culture. Reviews in American History, 30(1), 1–7. doi:10.2307/30031707

Assignment[s]:
Your forth written response is due in the D2L   dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a political and social perspective Can Honor/Shame be connected with the current political situation in Egypt, Syria, Turkey? Did Honor/Shame system influence decision in American history?
WEEK 7. Wednesday Oct 9

Assignment[s]: final project details

Start working on the final project Present and discuss your final project: 1. Finalized title 2. Outline 3. Plan 4. Clear work distribution among group members 5. Clear way for peer assessment.
 WEEK 8. Wednesday Oct 16
Assignment[s]: details on final project
Final brainstorming and start working on the project Meeting as a whole: 1. Present group’s plan to class. 2. Share group’s ideas with class. 3. Share technology 4. Share sources 5. Share means for peer assessment
WEEK 9. Wednesday Oct 23

Assignment[s]: draft of bibliography

Class as a whole: peer review and brainstorming Meeting as a whole: 1. Are sources reliable? 2. Are sources of academic origin (peer-reviewed)? 3. Is the bibliography adhering correctly to the formats (APA, Chicago, ALA)
WEEK 10. Wednesday Oct 30

Assignment[s]: details on presentation

Work on the final project Meeting as a whole: 1. Presentation format 2. Share technology 3. Share ideas
WEEK 11. Wednesday Nov 6
Assignment[s]: paper draft due in D2L dropbox
Work on final project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 12. Wednesday Nov 13
Assignment[s]: paper draft and presentation
Work on project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 13. Wednesday Nov 20
Assignment[s]: paper draft due in D2L dropbox
Work on project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 13. Wednesday Nov 27
Work on project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 13. Wednesday Dec 4
Assignment[s]: paper final draft due in D2L dropbox
presentations Class presentations of the final projects
WEEK 13. Wednesday Dec 11
presentations Class presentations of the final projects

 

BIBLIOGRAPHY:

Bertram Wyatt-Brown. (n.d.). Retrieved from http://personal.tcu.edu/swoodworth/Wyatt-Brown.htm

Brayford, S. A. (1999). TO SHAME OR NOT TO SHAME: SEXUALITY IN THE MEDITERRANEAN DIASPORA. Semeia, (87), 163.

BUSATTA, S. (2006). Honour and Shame in the Mediterranean. Antrocom, 2(2). 75-78. Retrieved March 19, 2013, from http://www.academia.edu/524890/Honour_and_Shame_in_the_Mediterranean

Cohen, D. (n.d.). Insult, Aggression, and the Southern Culture of Honor: An “Experimental Ethnography.” Journal of Personality and Social Psychology, 70(5), 945–960.

Crook, Z. (2009). Honor, Shame, and Social Status Revisited. Journal of Biblical Literature, 128(3), 591–611.

Culture of honor (Southern United States). (n.d.). Retrieved from http://en.wikipedia.org/wiki/Culture_of_honor_(Southern_United_States)

Dussere, E. (2001). The Debts of History: Southern Honor, Affirmative Action, and Faulkner’s Intruder in the Dust. Faulkner Journal, 17(1), 37–57.

Esmer, T. U. (n.d.). Honor in Ottoman and Contemporary Mediterranean Societies: Controversies, Continuities, and New Directions. conference announcement. Retrieved from http://www.h-net.org/announce/show.cgi?ID=196551

Family, Patronage, and Social Contests.pdf. (n.d.).

Hall, J. L. (1907). Half-hours in southern history. B. F. Johnson publishing co.

Harrell, L. A. (2009, December 4). It’s an honorable choice: Rebellions Against Southern Honor in William Styron’s The Confessions of Nat Turner. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2614

Harris, J. W. (2002). Honor, Grace, and War (But Not Slavery?) in Southern Culture. Reviews in American History, 30(1), 1–7. doi:10.2307/30031707

Hellerman. (n.d.). Reconstructing Honor in Roman Philippi. Cambridge University Press.

Herzfeld, M. (1980). Honour and Shame: Problems in the Comparative Analysis of Moral Systems. Man, 15(2), 339–351. doi:10.2307/2801675

Honor, Shame, and Social Status.pdf. (n.d.).

honor-04-Antrocom_Honour and Shame in the Mediterranean_S.pdf. (n.d.).

Honors and Shame and the Unity of the Mediterranean. (n.d.). Retrieved from http://www.jstor.org/stable/3317790

Honour and shame (Anthropology). (n.d.). Retrieved from http://what-when-how.com/social-and-cultural-anthropology/honour-and-shame-anthropology/

Lever, A. (1986). Honour as a Red Herring. Critique of Anthropology, 6(3), 83–106. doi:10.1177/0308275X8600600305

Manly Honor Part V: Honor in the American South. (n.d.). The Art of Manliness. Retrieved August 15, 2013, from http://www.artofmanliness.com/2012/11/26/manly-honor-part-v-honor-in-the-american-south/

Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson. http://tinyurl.com/qdvc499

Murder in Jerba_ Honour, Shame and.pdf. (n.d.).

Osiek, C. (2008). Women, honor, and context in Mediterranean antiquity, 64(1), 323–337. doi:10.4102/hts.v64i1.2

Peoples and Cultures of the Mediterranean. (n.d.). Retrieved March 19, 2013, from http://www.academia.edu/2437701/Peoples_and_Cultures_of_the_Mediterranean

Rabichev, R. (n.d.). The Mediterranean concepts of honour and shame as seen in the depiction of the biblical women. Retrieved from http://prophetess.lstc.edu/~rklein/Doc6/renata.htm

Santos, N. F. (2008). Family, Patronage, and Social Contests: Narrative Reversals in the Gospel of Mark. S&J, (2).

Slavery and Southern Honor. (n.d.). StudyMode. Education. Retrieved from http://www.studymode.com/essays/Slavery-Southern-Honor-72644.html

Smith, A. (2004). Murder in Jerba: Honour, Shame and  Hospitality among Maltese in Ottoman  Tunisia. History and Anthropology Routledge, 15(2), 107–132.

Stewart,, Y. (n.d.). Mursi: A Study in Honor-Shame dynamics. CATEGORY ARCHIVES: HONOR-SHAME CULTURE. Retrieved from http://www.theaugeanstables.com/category/honor-shame-culture/

TO SHAME OR NOT TO SHAME_ SEXUALITY IN THE MEDITERRANEAN DIASPORA..pdf. (n.d.).

Weir, D. (n.d.). Honour and Shame. Islam Watch. Retrieved from http://www.islam-watch.org/Others/Honour-and-Shame-in-Islam.htm

Women, honor, and context in Mediterranean antiquity.pdf. (n.d.).

Wyatt-Brown, B. & Milbauer, Richard J. (2004). Honor, Shame, and Iraq in American Foreign Policy. In Note prepared for the Workshop on Humiliation and Violent Conflict, Columbia University,  New York, November 18-19, 2004. Presented at the Workshop on Humiliation and Violent Conflict, Columbia University,  New York,. Retrieved from http://www.humiliationstudies.org/documents/WyattBrownNY04meeting.pdf

 

 

 

digital literacy for SOE students

Digital literacy for SOE students

Class ED 610 Introduction to Curriculum and Instruction Summer 2018

Instructor:     Hsuehi(Martin) Lo

short link to this session: http://bit.ly/edad829

for online participation, please use the following Zoom or Adobe Connect session (your instructor will direct you which one:

  1. For Zoom, please use the following URL to login:
    https://zoom.us/j/4684903124

My name is Plamen Miltenoff and I will be leading your digital literacy instruction today: Here is more about me: http://web.stcloudstate.edu/pmiltenoff/faculty/ and more about the issues we will be discussing today: https://blog.stcloudstate.edu/ims/
As well as my email address for further contacts: pmiltenoff@stcloudstate.edu

Here is a preliminary plan. We will not follow it strictly; it is just an idea about the topics we would like to cover. Shall there be points of interest, please feel free to contribute prior and during the session.

Keeping in mind the ED 610 Learning Goals and Objectives, namely:

  1. Understand and demonstrate how to write literature review in the field of the C&I research
  2. Understand the related research methods in both quantitative and qualitative perspectives from the explored research articles
  3. Understand how to use searching engine to find meaningful articles
  4. Interpret and do critical thinking in C&I research articles

lets review our search and research skills:

  1. How do we search?
    1. Google and Google Scholar (more focused, peer reviewed, academic content)
    2. Digg http://digg.com/, Reddit https://www.reddit.com/ , Quora https://www.quora.com/
    3. SCSU Library search, Google, Professional organization, (NASSP), Stacks of magazines, csu library info, but need to know what all of the options mean on that page
  2. Custom Search Engine:
    https://blog.stcloudstate.edu/ims/2017/11/17/google-custom-search-engine/
  3. Basic electronic (library) search information and strategies. Library research services

https://www.semanticscholar.org/

+++++++++++++
PICO framework to structure a question:
Population, Patient, Problem
Intervention
Comparison
Outcome

prepare systematic review

  1. Subject Guides
    Please locate theEducation (Elementary)
    Education (Secondary)
    Educational Administration and Leadership (Doctoral)
    Educational Administration and Leadership (Masters)
    at the LRS web page:
    http://lrts.stcloudstate.edu/library/default.asp
    library research guide
    Look for “Research Assistance” and scroll to
    Educational Administration and Leadership or any of the four links related to education
    http://research.stcloudstate.edu/rqs.phtml?subject_id=122
  2. Electronic Journals & the DOI System

    What is a DOI? A Digital Object Identifier (DOI) is assigned to electronic journal articles (and selected other online content) to specifically and permanently identify and access that article. Most of the standard academic citation formats now require the inclusion of DOIs within a citation when available.

    How to find a DOI:   Most current academic journal articles include a DOI (usually listed on the first page of the article).  Most library databases list a DOI with the record for recent academic journal articles.  Most non-academic articles (including magazine and newspaper articles) as well as many older academic journal articles do not have a DOI.  Crossref.org provides a DOI Lookup service that will search for a DOI based on citation information (author’s last name, journal name, article title, etc.).

    How to access an article via a DOI: Use the CSU Stanislaus Library DOI Look-up for options provided by the library, including access to the full-text via the publisher’s site or a library database service when available. Other, general DOI look-up systems (CrossRef & DOI.org) usually link to the article’s “homepage” on the publisher’s site (which usually include a free abstract but full-text access is restricted to subscribers).

  3. What is ORCID: http://orcid.org/register

shall more info be needed and or “proper” session with a reference librarian be requested. http://stcloud.lib.mnscu.edu/subjects/guide.php?subject=EDAD-D

-Strategies for conducting advanced searches (setting up filters and search criteria)

Filters

filters

 

 

 

 

 

 

 

 

 

 

 

 

 

+++++++++++++++++
Search criteria

search_criteria

 

 

 

 

++++++++++++++++

  1. Books and Video
  2. Articles and databases
  3. Journal Title and Citation Finder
  4. Reference and Facts
  5. Institutional Repository
SCSU library web page snapshot with link to repository

SCSU library web page snapshot with link to repository

  1. Simple versus Advanced Search
  2. Interlibrary Loan ILL http://lrts.stcloudstate.edu/library/services/illrequest.asp
  3. Ways to find research specific to doctoral student needs (ie: Ways to find dissertations, peer reviewed research sources, research-related information, etc.)
  4. Understand the responsibilities of authorship including copyright, intellectual property, and discipline-based expectations
  5. Basic Research Resources-Jan 2015 version edit pmConcept mapping:
    https://blog.stcloudstate.edu/ims/?s=concept+map
  6. Explore and select citation management software to organize bibliographic information
  7. Refworks: https://www.refworks.com/refworks2/default.aspx?r=authentication::init&groupcode=RWStCloudSU
  8. Alternatives to Refworks (currently retired):
    1. Zotero, Mendeley, Endnote
    2. Fast and easy bibliographic tools:
      https://blog.stcloudstate.edu/ims/2013/12/06/bibliographic-tools-fast-and-easy/
  1. -Setting up social networking to gather articles and other research information
    slide 9 of the PPT Basic Research Resources

Social media and its importance for the topic research and the dissertation research:

Small business owners use social media primarily as a marketing and search engine optimization tool. However, more and more small businesses are using social media to get answers for business related questions. Specific industry related articles, and statistics are found useful for small business owners in 80% of the cases.
https://www.linkedin.com/today/post/article/20140331225132-25026422-small-business-owners-turning-to-social-media

Altmetricshttps://blog.stcloudstate.edu/ims/2017/10/23/altmetrics-library-lily-troia/

  1. Collaborative Tools
  2. Apps Anywhere (need installation of Citrix Receiver):

 

  1. File/Web space: https://webfs.stcloudstate.edu/main/default.aspx
  2. Dropbox:  https://www.dropbox.com/
  3. Web 2.0 tools: e.g. Diigo.com; Evernote.com
  4. Facebook, Twitter
  5. Blog.stcloudstate.edu

Other sources for information:
https://blog.stcloudstate.edu/ims/2017/01/27/research-how-to/

Academic.com and ResearchGate

  1. -Saving articles, saving quotes and other article information

Blogs – use tags

hands-on exercise:

learn how to use Zotero and/or Refworks in Microsoft Word

dissertation zotero
and/or
Refworks and/or Mendeley in Google Docs RefWorks ProQuest

 

 

Google Doc ProQuest RefWorks

 

Login into ProQuest Refworks AddOn for Google Doc:

login refworks google doc-y80ulf

Zotero, Mendeley, Refworks
Evernote, Diigo

If Twitter, Facebook or LinkedIn, use hashtags

  1. Share any other research-related resources available through the library or other sources

—————-
Plamen Miltenoff, Ph.D., MLIS
Professor
320-308-3072
pmiltenoff@stcloudstate.edu
http://web.stcloudstate.edu/pmiltenoff/faculty/
pedagogues under a minute: http://www.pinterest.com/pin/178173728981990450/

Save

bettshow

British Educational Training and Technology Show

http://www.bettshow.com

an annual trade show in the United Kingdom that showcases the use of information technology in education. The show has also expanded from being a purely technology show, and whilst it has played host to companies ranging from multinationals Microsoft, Google and Apple Inc. to small single-product firms, it has also created themed zones for exhibitors, such as those specialising in SEN provision. New for 2015 is its “Bett Futures” feature, which aims to select and promote 30 educational technology start-ups, selected by a panel of expert educators.[3](https://en.wikipedia.org/wiki/BETT)

Examples:
http://www.bettshow.com/Content/Microsoft-Learn-Live-Theatre
Minecraft in Education
1:1 with Surface at Hogwarts School of Witchcraft & Wizardry (http://www.bettshow.com/content/Microsoft-Learn-Live-Theatre#ixzz3x8gaFOrQ)

15:10 – 15:40
Technology in Higher Education Summit
As we continue to move into a more digital world, the digital badge has been heralded as a means to demonstrate evidence of work online, an alternate method of accreditation, and a solution to support, guide and motive learners. With examples from a university ahead of the curve in the use of digital badges, learn what roles badges could have in your teaching

http://www.bettshow.com/Seminar/Spotlight-on-e-porfoilios-and-digital-badges#ixzz3x9DOjm94

password management

LITA listsrev has an excellent discussion on password management.
I personally am using LastPass for two years: great free option, paid one can be used on mobiles.

=========================

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Michael J. Paulmeno
Sent: Wednesday, January 06, 2016 1:36 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I second Keepass.  Not only is it free, open source, and multi-OS, but it lives on your computer, not in the cloud (although the database can be put on a shared drive or in DropBox for access across devices).  Personally that makes me feel much safer.  There are clients available for Windows, Mac, Linux, IPhone, Android and even Blackberry.

 

Cheers,

Mike

 

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Ronald Houk
Sent: Wednesday, January 06, 2016 12:38 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management

 

I use lastpass as well.  However, LastPass was just bought by LogMeIn, so lots of people are holding their breath hoping that things stay good.  Another open source, multi-os, alternative is keepass (keepass.info)

 

On Wed, Jan 6, 2016 at 11:43 AM, Yvonne Reed <yvonner@ranchomiragelibrary.org> wrote:

Hi Everyone,

I would like offer or recommend a password management tool to my library staff that’s reliable and easy to use. Do any of you have one you can recommend?

 

 

Thank you,

 

Yvonne Reed

Technology Librarian

Rancho Mirage Public Library

71-100 Hwy 111

Rancho Mirage, CA 92270

(760)341-7323 x770
————————————–

From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of O’English, Lorena
Sent: Wednesday, January 06, 2016 12:51 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I really like Dashlane (dashlane.com) – it has a lot of options, including the ability to give someone else access to your passwords in certain situations (plus, they support Firefox financially via low-impact ads). I think of this sometimes when I think about what would happen if a piano fell on me tomorrow – what a mess it would be for my spouse to cope with my digital life! That said, although I use Dashlane, I still have not quite managed to get myself to use all its functionality.

 

Lorena

***

Washington State University Libraries

oenglish@wsu.edu

wsulorena: Twitter, Skype, GTalk, Yahoo IM

———–

—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of Cary Gordon
Sent: Wednesday, January 06, 2016 12:37 PM
To: lita-l@lists.ala.org
Subject: Re: [lita-l] Question on password management

 

1Password ++

————–

 

—–Original Message—–
From: lita-l-request@lists.ala.org [mailto:lita-l-request@lists.ala.org] On Behalf Of COLLINS, MATTHEW
Sent: Wednesday, January 06, 2016 12:35 PM
To: lita-l@lists.ala.org
Subject: RE: [lita-l] Question on password management

 

I have used Roboform for at least 10 years and never had a problem.  It manages passwords for logins and bookmarks on my PCs, my iPhone and iPad.  It synchs online so work, home, tablet and phone all have the same info.  It also stores personal info (name & multiple addresses) and confidential notes and other info.

 

–Matthew

———————-

Has anyone mentioned Password Safe? http://passwordsafe.sourceforge.net/

 

It’s worked well for organizing and managing usernames/passwords.

 

 

Angela Stangl

 

Digital Services Coordinator

Rodney A. Briggs Library

University of Minnesota, Morris

(320) 589-6164

——————————-

FEATURES

http://keepass.info/features.html

 

PLUGINS

http://keepass.info/plugins.html

Note: CAPS is used here and there to call attention without extra Gmail formatting, not to shout at anyone. Still…I know I look like I yell here. I have flogged myself, I will now bathe in the River Salt.

 

MWoT

Ok, check it out.

Plugins, macros, group/profile/source/target/timing locks, separate DBs and separate metadata for these if you like, INTERNALLY-ROTATING SUPERKEYS via REGULAR KEY TRANSORMATIONS and TWO-CHANNEL AUTO-TYPE OBFUSCATION (for obfuscating your auto-typed passwords or keys, if you select Auto)….!!!…

…and well-reasoned, well-EXPLAINED approaches to certain critical areas of password management in general and to KeePass in particular.

 

For instance: In the FAQ, read the logic breakdown (thought-by-thought explanation) of why Keepass does NOT lock itself when a SUB-dialogue box is open in Keepass whle the user then LOCKS the workstation. =)

Why doesn’t KeePass lock when Windows locks and a KeePass sub-dialog is open?

http://keepass.info/help/base/faq_tech.html#noautolock

My support of Keepass as a primary, then a close alternative, comes from four of my six years in IT being in direct computer and network security roles. Sure, not the most trench years out there, but they are all engineering and tiered-analyst roles for several major US corporations.

I’m proud of that…and in terms of relevance, I worked – and still work – with and around many engineers, analysts, and scientists (data, algorithmic). I look up to these people a great deal, and many of these coworkers come fully assembled having forgotten more than I’ll ever know and still learning faster than I could ever talk about… and even THEY use Keepass and they use it powerfully.

Detection of each site’s contact (HTTP GET, form forcus, etc) or “touch” can be different with each browser it integrates into, and that’s just for starters. One can also script up a different timing to use before the credentials are passed….;)….one can also relegate references to a central database, or one can refer only to the local system or even just a specific profile that can access said .kdbx file (KeePass database), or one can limit the data source to just one .kdbx single-instance database file, or one can use the .kdbx as a secondary for some other central repository failure, if that happens.

One can make several .kdbx files for different uses…no requirement to have just one! Each a diffferent base of unique data keys, each wtih a different direction administered on when it is referenced, how it is run, and where it lives on a system.

Aaaaaand it can integrate with other DBMs, it’s not an island!

Keepass is not the end-all be-all, but it IS FOSS (Free and Open-Source Software, great for investigating its machinery). Also it is:

Programmable (via the Plugins model, you can write some yourself if you like!)

Modularizable (again, via the Plugins model)

Profile lockable, (<— really neat!)

– SMM (Secure Memory Manageable, for Windows Clipboard and the like)

– and more!

Anyway, Keepass is rad for its cost, but, like the others on this thread, I will second LastPass as well. LastPass  is a an alternative to Keepass. =)

Daniel Strickland
linkedin.com/in/dwstrickland

 

 

Matthew Collins

Director of the Ernest Miller White Library Associate Professor of Research and Bibliography Louisville Presbyterian Theological Seminary

1044 Alta Vista Road

Louisville, KY 40205

mcollins@lpts.edu| 502.992.5420

 

1 13 14 15 16 17 20