Searching for "research"

online students expectations

Study: Online Students Want Interaction, Community

By Rhea Kelly  06/21/17

https://campustechnology.com/articles/2017/06/21/study-online-students-want-interaction-community.aspx

a new report from Learning House and Aslanian Market Research. For the sixth annual “Online College Students 2017: Comprehensive Data on Demands and Preferences” report, researchers polled 1,500 students who are “seriously considering, currently enrolled in or have recently graduated from a fully online program”

a number of recommendations for helping online programs attract students, including:

  • Cater to students’ career goals. “Since online students are so career focused, understanding which programs will best educate students for the job market is critical to online program success,” the researchers noted;
  • Make sure admissions offices provide fast responses to online students, as well as upfront figures on financial aid and transfer credits; and
  • Adapt online access to accommodate mobile technology.

++++++++++++++++++++++++++
more on online students in this IMS blog
https://blog.stcloudstate.edu/ims?s=online+students

future blended learning

Dr. Baiyun Chen, OLC Institute faculty for the Blended Learning Mastery Series: Research into Practice, joins us to discuss the future  of blended learning in higher education

Insights from the Field: The Future of Blended Learning

The design of blended learning curriculum will be more diversified and personalized with the integration of creative in-class active learning strategies and innovative educational technologies, such as adaptive learning, virtual reality, mobile technologies

Quality assurance is the biggest challenge with implementing blended learning in the higher education environment today. I would propose institutions to adopt evidence-based standards for course evaluations. For instance, the OLC Quality Scorecard for Blended Learning Programs

+++++++++++++++++++
more on blended learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=blended+learning

Academic Librarianship Today

Academic Librarianship Today

Tuesday, July 18, 2017 1:00 PM Central

Hosted by Yale University Library’s Todd Gilman, this webinar offers multiple expert perspectives on the transformation of libraries as information organizations, the influence of technology on how we provide academic information resources and services in a digital and global environment, and the various career opportunities available for academic librarians now and in the future. The speakers offer broad and diverse views, ranging from those of senior administrators and practitioners working in North American academic libraries large and small to thought leaders from recognized non-profit organizations devoted to research and strategic guidance for libraries in the digital age, to library school faculty. What emerges is a library landscape at once full of promise and exciting initiatives yet beset by seemingly insurmountable challenges-how to attract and retain the talent needed for current and future professional roles, how to keep up with ever-advancing computer technology, and how to pay for all this along with the vast quantity of research materials our ambitious and accomplished patrons demand.

anxiety and academia

Surprising ways to beat anxiety and become mentally strong – according to science

http://theconversation.com/surprising-ways-to-beat-anxiety-and-become-mentally-strong-according-to-science-77978

Anxiety can present as fear, restlessness, an inability to focus at work or school, finding it hard to fall or stay asleep at night, or getting easily irritated. In social situations, it can make it hard to talk to others; you might feel like you’re constantly being judged, or have symptoms such as stuttering, sweating, blushing or an upset stomach.

Research shows that if it’s left untreated, anxiety can lead to depression, early death and suicide. And while it can indeed lead to such serious health consequences, the medication that is prescribed to treat anxiety doesn’t often work in the long-term. Symptoms often return and you’re back where you started.

People often want to do something “perfectly” or to wait for the “perfect time” before starting. But this can lead to procrastination, long delays or even prevent us from doing it at all. And that causes stress – and anxiety.

Are you particularly critical of yourself and the blunders you make? people with anxiety often do this to themselves so frequently that they don’t even realize it anymore. They’re just not kind to themselves.

Another effective strategy is to “wait to worry”. If something went wrong and you feel compelled to worry (because you think you screwed up), don’t do this immediately. Instead, postpone your worry – set aside 10 minutes each day during which you can worry about anything.

Find purpose in life by helping others

Being connected to people has regularly been shown to be one of the most potent buffers against poor mental health.
=+++++++++++++++++++++
more on anxiety in education
https://blog.stcloudstate.edu/ims?s=anxiety

archive video tapes

Videotapes Are Becoming Unwatchable As Archivists Work To Save Them

Scott Greenstone

Kidd and the others are archivists and preservationists, and they’re part of a group called XFR Collective (pronounced Transfer Collective). Most work professionally, but they volunteer their free time to do this.

That’s because research suggests that tapes like this aren’t going to live beyond 15 to 20 years. Some call this the “magnetic media crisis,” and archivists, preservationists, and librarians like the ones in the XFR Collective are trying to reverse it.

Some are old videos of police brutality; others are just weddings or old public access TV that isn’t saved anywhere else. All tapes are from people who want their content to be publicly available, and after the tapes are transferred, they’re stored on the nonprofit Internet Archive. To date, they’ve transferred 155 tapes—67 hours in total.

Of course, this doesn’t guarantee that they will be saved forever. Digital has its own problems, and Lukk says that some film preservationists argue we should be looking back to before magnetic media for stable preservation — many Hollywood films, for instance, are often stored on film in salt mines, where they can last 100 years.

 

 

digital learning faculty support

Report: Faculty Support Lacking for Wide Adoption of Digital Learning

By Dian Schaffhauser 06/19/17

https://campustechnology.com/articles/2017/06/19/faculty-support-lacking-for-wide-adoption-of-digital-learning.aspx

new report produced by Tyton Partners in collaboration with the Babson Survey Research Group. two fall 2016 surveys of a national sample of 3,500 postsecondary respondents.

extent of digital learning implementation in support of strategic priorities

These gaps and others “suggest a disconnect, the report stated, “between the impacts that many administrators perceive and the reality of how digital learning is changing the market.” Open-ended responses suggested that expectations for the impact of digital learning were “set too high” or weren’t being “measured or communicated well.” Another common refrain: There’s inadequate institutional support.

While most administrators told researchers that “faculty are crucial to the success of digital learning initiatives — serving as both a bolster and a barrier to implementation success,” the resources for supporting faculty to implement digital learning are insufficient. Just a quarter of respondents said faculty professional development was implemented “effectively and at scale.” Thirty-five percent said implementation was in progress. And a third (33 percent) reported that faculty professional development was “incomplete, inconsistent, informal and/or optional.”

The report offered recommendations for improving and expanding digital learning adoption. Among the guidance:

  • Get realistic. While the data suggested that digital learning could improve scheduling flexibility and access, among other benefits, schools need to identify which goals are most important and “clearly articulate how and to what extent its digital learning programs are expected to help.”
  • Measure impact and broadcast it. Forget about small pilots; go for a scale that will demonstrate impact and then share the findings internally and with other institutions.
  • Use buying power to influence the market. Connect faculty with vendors for “education, product discovery and feedback.” Insist on accessibility within products, strong integration features and user friendliness.
  • Prepare faculty for success. Make sure there are sufficient resources and incentives to help faculty “buy into the strategy” and follow through on implementation.

++++++++++++++++++
more on digital learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+learning

library website content strategy

Developing a Website Content Strategy

Instructor: Shoshana Mayden, Dates: July 3-28, 2017
http://libraryjuiceacademy.com/049-content-strategy.php

Shoshana Mayden is a content strategist with the University of Arizona Libraries in Tucson, Arizona. She advises on issues related to website content and contributes to developing a content strategy across multiple channels for the library. She works with content managers and library stakeholders to re-write, re-think and re-organize content for the main library website, as well as develop workflows related to the lifecycle of content. She also a copy editor for Weave: the Journal of Library User Experience.

++++++++++++++++++++++++

Information Architecture: Designing Navigation for Library Websites

Instructor: Laura-Edythe Coleman

http://libraryjuiceacademy.com/046-designing-navigation.php

Information Architecture is an essential component of user-centered design of information spaces, especially websites. Website navigation is a key design device to help users search and browse library websites and information systems. The design of Website navigation can be simple or complex, flat or deep. In all cases, website navigation should take into account information architecture (IA) best practices, common user tasks in the library domain, user research, analytics and information seeking models.

Laura-Edythe Coleman is a Museum Informaticist: her focus is on the point of convergence for museums, information, people, and technology. Knowing that societies need museums for creating and sustaining cultural memory, she strives to help communities co-create heritage collections with museums. She holds a PhD in Information Science, a Masters of Library and Information Science and a Bachelors of Fine Arts. She can be reached via Twitter: @lauraedythe, website: http://www.lauraedythe.com, or by email lauraedythecoleman@gmail.com

+++++++++++++++++++++++++

Content Strategy for Library Websites from Rebecca Blakiston
http://www.academia.edu/12370418/Content_Strategy_for_Library_Websites 
https://steadfastlibrarian.wordpress.com/2012/06/27/211/
https://connect.library.utoronto.ca/download/attachments/25199917/2013_-__-_DevelopingaContentStrategyforanAcademicLibraryWebs%5Bretrieved-2015-11-17%5D.pdf
https://www.researchgate.net/publication/271758861_Developing_a_Content_Strategy_for_an_Academic_Library_Website
+++++++++++++++++++++
Other resources: 
http://guiseppegetto.com/ux-content-strategy-library/

+++++++++++++++++
more on Libary web site in this IMS blog
https://www.lib.umich.edu/blog-tags/web-content-strategy
https://blog.stcloudstate.edu/ims?s=library+web+page

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

5 ways to use the Internet of Things in higher ed

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
https://blog.stcloudstate.edu/ims?s=internet+of+things
https://blog.stcloudstate.edu/ims?s=iot 

Social Media Etiquette Ethics

Social Media Etiquette & Ethics: A Guide for Personal, Professional & Brand Use.

Published on , Marketing Professor & Researcher

https://www.linkedin.com/pulse/social-media-etiquette-ethics-guide-personal-brand-use-quesenberry

definition:

Etiquette is the proper way to behave and Ethics studies ideas about good and bad behavior. Both combine into Professionalism, which is the skill, good judgment, and polite behavior expected from a person trained to do a job such as social media marketing. Because social media blurs the lines between our personal and professional lives it is useful to look at actions in social media from three perspectives: Personal (as an individual), Professional (as an employee or perspective employee) and Brand (as an organization). To simplify the discussion I have created questions for each category in the Social Media Etiquette and Ethics Guide below. Click here to download.

Before you post or comment in a personal capacity consider:

  1. Is it all about me? No one likes someone who only talks about themselves. The same applies in social media. Balance boasting with complimenting.
  2. Am I stalking someone? It is good to be driven and persistent but be careful not to cross the line into creepy. Don’t be too aggressive in outreach.
  3. Am I spamming them? Not everything or even the majority of what you post should ask for something. Don’t make everything self-serving.
  4. Am I venting or ranting? Venting and ranting may feel good, but research says it doesn’t help and no matter how justified you feel, it never presents you in a positive light. Do not post negative comments or gossip.
  5. Did I ask before I tagged? You had a great time and want to share those memories, but your friends, family or employer may have different standards than a friends. Check before you tag people in posts.
  6. Did I read before commenting or sharing? Don’t make yourself look foolish by not fully reviewing something you are commenting on or sharing with others. Don’t jump to conclusions.
  7. Am I grateful and respectful? Don’t take people for granted. Respond and thank those who engage with you.
  8. Is this the right medium for the message? Not everything should be said in social media. Consider the feelings of the other person. Some messages should be given in person, by phone or email.
  9. Am I logged into the right account? There are too many corporate examples of embarrassing posts meant for personal jokes that went out on official brand accounts. Always double check which account you are on. Don’t post personal information on brand accounts.

Before you post or comment as a professional consider:

  1. Does it meet the Social Media Policy? Most organizations have official social media policies that you probably received when hired. Don’t assume you know what the policy says. Many employees have been fired for not following company social media regulations. Make sure you know and follow employer or client requirements.
  2. Does it hurt my company’s reputation? No matter how many disclaimers you put on your accounts such as “views are my own” certain content and behavior will negatively impact your employer. If your bio states where you work, your personal account represents your employer.
  3. Does it help my company’s marketing? Employee advocacy is an important strategy. Have a positive impact on your company’s image and when you can advocate for your brand in social.
  4. Would my boss/client be happy to see it? You may not have “friended” your boss or client but a co-worker may have and your post is only a share or screen grab away. Even private accounts are never fully private.
  5. Am I being open about who I work for? It is good to post positive content about your employer and it is nice to receive gifts, but if you are trying to pass it off as unbiased opinion that is wrong. Be transparent about your financial connections.
  6. Am I being fair and accurate? Everyone is entitled to their person opinion, but if your opinion tends to always be unfounded and seems to have an agenda it will reflect negatively upon you. Criticism is welcome when it is constructive and opinion is backed by evidence.
  7. Am I being respectful and not malicious? People can get very insensitive, judgmental and angry in social media posts. That does not convey a professional image. Don’t post what you wouldn’t say in person. Even an outburst in person fades in memory, but a malicious post is there forever.
  8. Does it respect intellectual property? Not everything on the Internet is free. Check for or get permission to post company or client brand assets and content.
  9. Is this confidential information? As an employee or contractor you are granted access to privileged and confidential information. Don’t assume it is fine to share. Do not disclose non-public company or client information.

Before posting or commenting as a brand on a social account consider:

  1. Does it speak to my target market? Social media is unique from traditional marketing and requires a different perspective to be effective. Be sure to focus on your target’s wants and needs not yours.
  2. Does it add value? Social media only works if people view and share it. Make your content educational, insightful or entertaining to grab interest and draw engagement.
  3. Does it fit the social channel? Don’t post content ideal for Twitter on Instagram or Reddit. Each channel has its own culture and community. Make sure each post fits the channel’s environment, mission and policies or standards.
  4. Is it authentic and transparent? Trying to trick people into clicking a link or making a purchase will get you nowhere. Don’t hide or exclude any relevant information.
  5. Is it real and unique? Bots can automate tasks and be a great time saver, but use them for the right actions. Don’t use auto responses and create anything that could be perceived as spam.
  6. Is it positive and respectful? It may be fine to talk trash about competitors or complain about customers in the office, but not in social media. Don’t badmouth the competition or customers.
  7. Does it meet codes of conduct? As professionals we are part of trade associations that set standards of conduct. Be sure you are meeting these ethical standards such as the Word of Mouth Marketing Association’s Code of Ethics.
  8. Does it meet all laws and regulations? Government has been catching up with social media and have issued regulations and laws you must follow. See guides on requirements like the FTC social media endorsement guidelines.
  9. Does it meet the Social Media Policy? Most likely your brand or a client’s brand has a social media policy. Ensure you follow your own company standards.

 

++++++++++++++
more on social media netiquette in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+netiquette

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

1 55 56 57 58 59 85