Searching for "writing"

eportfolio and AAEEBL

The Association for Authentic, Experiential and Evidence-Based Learning (AAEEBL.org) is nearly 7 years old. It is the North American professional association for the global eportfolio community of practice and research field. “ePortfolio” is an idea about how technology can be implemented to best advantage in our world today. The eportfolio idea is that the learner is the anchor and center for the record of learning — the eportfolio is owned by the learner and the eportfolio stays with the learner between courses, between institutions and into life. It is a powerful idea and the growth of eportfolio technology in higher education around the world suggests educators understand that power.
At the Conference at the University of Georgia November 9-10, you will attend sessions that demonstrate how 10 different institutions have deployed eportfolio technology in ways appropriate to initiatives on their campuses. Kathleen Yancey of Florida State University, a founder of the U. S. eportfolio movement, is keynote.

AAEEBL is writing The Field Guide to ePortfolio to be published by AAC&U in 2016. This is a timely publication. Each conference and each webinar that AAEEBL holds contributes to the ideas in the Field Guide, being created by a team of 60 AAEEBL members. You can find out more about this project at this conference.

social media and critical thinking

Does social media make room for critical thinking?

social media critical thinking

social media critical thinking

Sinprakob, S., & Songkram, N. (2015). A Proposed Model of Problem-based Learning on Social Media in Cooperation with Searching Technique to Enhance Critical Thinking of Undergraduate Students. Procedia – Social And Behavioral Sciences, 174(International Conference on New Horizons in Education, INTE 2014, 25-27 June 2014, Paris, France), 2027-2030. doi:10.1016/j.sbspro.2015.01.871
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselp%26AN%3dS1877042815009234%26site%3deds-live%26scope%3dsite

Bailey, A. (2014). Teaching Alice Walker’s The Color Purple: Using Technology and Social Media To Foster Critical Thinking and Reflection. Virginia English Journal, 64(1), 17.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedo%26AN%3d98060385%26site%3deds-live%26scope%3dsite

Eales-Reynolds, L., Gillham, D., Grech, C., Clarke, C., & Cornell, J. (2012). A study of the development of critical thinking skills using an innovative web 2.0 tool. Nurse Education Today, 32(7), 752-756. doi:10.1016/j.nedt.2012.05.017

Baldino, S. (2014). The Classroom Blog: Enhancing Critical Thinking, Substantive Discussion, and Appropriate Online Interaction. Voices From The Middle, 22(2), 29.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedo%26AN%3d99913218%26site%3deds-live%26scope%3dsite

Ravenscroft, A., Warburton, S., Hatzipanagos, S., & Conole, G. (2012). Designing and evaluating social media for learning: shaping social networking into social learning?. Journal Of Computer Assisted Learning, 28(3), 177-182. doi:10.1111/j.1365-2729.2012.00484.x
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d75254126%26site%3deds-live%26scope%3dsite

finding ways to capture meaningful informal learning experiences by explicitly linking these to formal structures, and providing frameworks within which informal learning can then be validated and accredited (Cedefop Report 2007).

Education is clearly a social process but it is probably much closer to an ongoing discussion or debate than an extended celebration with an ever-expanding network of friends (p. 179, Ravenscroft et al.)

the community of inquiry (COI) model developed by Garrison and Anderson (2003) and social network analysis (SNA). European Commission-funded integrated

project called MATURE (Continuous Social Learning in Knowledge Networks), which is investigating how technology-mediated informal learning leads to improved knowledge practices in the digital workplace
Fitzgibbons, M. (2014). Teaching political science students to find and evaluate information in the social media flow. In I. Management Association, STEM education: Concepts, methodologies, tools, and applications. Hershey, PA: IGI Global. Retrieved from http://search.credoreference.com/content/entry/igistem/teaching_political_science_students_to_find_and_evaluate_information_in_the_social_media_flow/0
Cheung, C. (2010). Web 2.0: Challenges and Opportunities for Media Education and Beyond. E-Learning And Digital Media, 7(4), 328-337. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ916502%26site%3deds-live%26scope%3dsite
Pattison, D. (2012). Participating in the Online Social Culture. Knowledge Quest, 41(1), 70-72. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d79921213%26site%3deds-live%26scope%3dsite
Key to using social media is the ability to stand back and evaluate the credibility of a source of information, apart from the actual content. While developing this critical attitude toward traditional media is important, the attitude is even more crucial in the context of using social media because information didn’t go through the vetting process of formal publication. Can the student corroborate the information from multiple sources? How recent is this information? Are the author’s credentials appropriate? In other words, the ability to step back, to become aware of the metatext or metacontext is more important than ever.
Coad, D. T. (2013). Developing Critical Literacy and Critical Thinking through Facebook. Kairos: A Journal Of Rhetoric, Technology, And Pedagogy, 18(1).
http://kairos.technorhetoric.net/praxis/tiki-index.php?page=Developing_Critical_Literacy_and_Critical_Thinking_through_Facebook
Many instructors believe that writing on social networking sites undermines the rhetorical skills students learn in class because of the slang and abbreviations often used on these sites; such instructors may believe that social networks are the end of students’ critical awareness when they communicate. Johndan Johnson-Eilola and Stuart A. Selber (2009) contended that electronic writing forms actually require “sophisticated skills of understanding concrete rhetorical situations, analyzing audiences (and their goals and inclinations), and constructing concise, information-laden texts, as a part of a dynamic, unfolding, social process” (p. 18). It is this dynamic process that makes social networking a perfect match for the composition classroom and for teaching rhetorical skills: It helps students see how communication works in real, live rhetorical situations. Many students do not believe that communication in these media requires any kind of valuable literacy skills because they buy into the myth of how the news media portray social networks as valueless forms of communication that are decaying young people’s minds. This is why I introduced students to the passage from Invisible Man: to get them thinking about what kinds of skills they learn on Facebook. I found the text useful for helping them acknowledge the skills they are building in these writing spaces.
Stuart A. Selber (2004) in Multiliteracies for a Digital Age criticized so-called computer literacy classes for having “focused primarily on data representations, numbering systems, operating systems, file formats, and hardware and software components” rather than on the task of teaching students to be “informed questioners of technology” (p. 74). In a time when, as Sheelah M. Sweeny (2010) noted, “the ability to stay connected with others is constant,” it is increasingly important to engage composition students in critical thinking about the spaces they write in (p. 121). It is becoming clearer, as technology giants such as Google® and Apple® introduce new technologies, that critical literacy and critical thinking about technology are necessary for our students’ futures.
Valentini, C. (2015). Is using social media “good” for the public relations profession? A critical reflection. Public Relations Review, 41(2), 170-177. doi:10.1016/j.pubrev.2014.11.009
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d108299204%26site%3deds-live%26scope%3dsite
http://www.sciencedirect.com/science/article/pii/S0363811114001817
p. 172 there is no doubt that digital technologies and social media have contributed to a major alteration in people’s interpersonal communications and relational practices. Inter- personal communications have substantially altered, at least in Western and developed countries, as a result of the culture of increased connectivity that has emerged from social media’s engineering sociality ( van Dijck, 2013 ), which allows anyone to be online and to connect to others. Physical presence is no longer a precondition for interpersonal communication.
(Jiping) The Pew Research Center ( Smith & Duggan, 2013 , October 21) indicates that one in every ten American adults has used an online dating site or mobile dating app to seek a partner, and that in the last eight years the proportion of Americans who say that they met their current partner online has doubled. Another study conducted by the same organization ( Lenhart & Duggan, 2014 , February 11) shows that 25% of married or partnered adults who text, have texted their partner while they were both home together, that 21% of cell-phone owners or internet users in a committed relationship have felt closer to their spouse or partner because of exchanges they had online or via text message. Another 9% of adults have resolved online or by text message an argument with their partner that they were having difficulty resolving person to person ( Lenhart & Duggan, 2014 , February 11). These results indicate that digital technologies are not simply tools that facilitate communications: they have a substantial impact on the way humans interact and relate to one another. In other words, they affect the dynamics of interpersonal relations

MN eSummit 2015

#MNsummit2015

Main speaker

Aaron Doering

aaron doening

aaron doening

Engagement not completion

Design experience not product

Create change, not simply respond to it

He was a geography teacher : Dimitrina

Experience explore expand. Adventure based how to collaborate in ways we have not collaborated before pedagogical guidelines internet driven

Instructor – content – design

Today: first think is design, content, instructor. So how do we design learning environments is the most important one

Guide learners as designers. Constructivism. Design for meaning. Through the power of the story.

Geotetic  design a learning environment learn geography using GIS

Situated movies (student-centered learning)

Grant Earthducation go to the most remote parts of the world to align their education with their culture, instead of what the government is downing as culture

Use of phone: whoever answers instructor’s question first, gets to pose the next question to the rest of the audience.

Design based research

Self-narrative, referencing the experience real world issues in real time

  1. reference knowledge . knowledge overlap. Technological pedagogical content knowledge.

Geotetic not only how prepare teachers, but desing learning environmwer of the story.

we explore: https://www.we-explore.com/

9.5 design as a learner.

the U Media Lab.
The Changing Earth. App GoX (instagram on steroids.  tell their story through the app). How is this different from Google Earth
Raptor Lab (rehabilitate a raptor).

  1. design experiences
  2. build trust
  3. guide learners as designers
  4. recognize learners as experts
  5. encourage collaboration
  6. inspire self narrative
  7. reference the knowledge domains
  8. teach for change
  9. design as learner

adoering@umn.edi     chasingseals.com   @chasingseals

 

podcast pontification (audio version of blog self reflections)

 Greg Steinke The U
A Digital Story Assignment using WeVideo

wevideo

WeVideo is the Google response to iMovie cloud

The U is on Google email and thus google drive and all other google tools

The Center for Digital Storytelling. short videos, 3-5 min incorporate photographs with the author narration, reflection

Assignment (verbal directions). process (write a 2 page script, every page is about a minute of video), gather images that support the story; edit the script (rewrite); record audio to the script (use an app on the phone instead of WeVideo), WeVideo can edit the audio recording; edit the story, edit the photos to match the story; YourTube and/or Google+

working with faculty: is the digital story a good fit for your course? two questions: does the course have many writing assignments? does everyone have to do the same type of assignment? do you want to offer choices? do you want your students to share their work outside of the class? to you want to explore opportunities for students to develop 21 century skills?

google communities for sharing

wewideo has a tutorial at Center for Digital Storytelling

students can use the digital story for their eportfolio

the entire exercise is entirely based on mobile devices

time frame: scaffolding options

3d printing products were the tangible result of the project and the digital storytelling just the format to present

Google Drive master folder for the phone images and video; iOS apps: MoviePro, FiLMc Pro, VoiceRecord Pro (including mp3); Android: WeVideo

Storyboard template

Faculty Development Programs: Digital Storytelling Community of Practice

http://it.umn.edu/faculty-development-programs-digital-0

Poster sessions:

Brad Hokanson

http://dha.design.umn.edu/faculty/BHokanson.html

iPAD video kit:

ipad video kit

Laurie Conzemius
Critical Thinking

laurie

ISTE: http://conference.iste.org/2016/
Joe Lau critical thinking

apps: Popplet  blog.popplet.com  http://www.popplet.com/ (mindmapping)

into the book: http://reading.ecb.org/

Kahoot – the token system. Polleverywhere  https://blog.stcloudstate.edu/ims/2015/05/21/polls-and-surveys-tools-for-education/

Symbaloo https://www.symbaloo.com/home/mix/13eOcK1fiV zotero, easybib, delicious, diigo depending on the grade

youth voices; http://youthvoices.net/ replace social media like teachertube is trying to replace youtube

quandary games in education. https://www.quandarygame.org/ sim city

citizen science alliance http://www.citizensciencealliance.org/

Toontastic https://itunes.apple.com/us/app/toontastic/id404693282?mt=8 now free  storytelling

coding and programming: https://www.makewonder.com/robots/dashanddot  scratch

Osmo : https://www.playosmo.com/en/ $79.99 + give a set for free Stride principle as a parental involvement

chainlink;

kickword; https://play.google.com/store/apps/details?id=com.makario.wordkick

red herring (four categories) https://play.google.com/store/apps/details?id=com.BlueOxTech.RedHerring&hl=en

http://www.mathplayground.com/logicgames.html

http://www.mathplayground.com/thinkingblocks.html

evaluation:

telestory  https://itunes.apple.com/us/app/telestory/id915378506?mt=8

explain everything http://explaineverything.com/

 

Exploring and Connecting 3D Printing to Teaching and Learning Jason Spartz, Saint Mary’s University of Minnesota

http://pubs.lib.umn.edu/minnesota-elearning-summit/2015/program/23/

http://pubs.lib.umn.edu/cgi/viewcontent.cgi?article=1023&context=minnesota-elearning-summit

3db 3da 3d lisa

Jason Spartz, Saint Mary’s University of MinnesotaFollow
Lisa Truax, Saint Mary’s University of MinnesotaFollow
Karen Sorvaag, Saint Mary’s University of MinnesotaFollow
Brett Bodsgard, Saint Mary’s University of MinnesotaFollow

chemistry professor. 3D printing with different materials.
what else can be made (e.g. reaction vessel)

printing of atoms

crystalography dbase

Karen: pre-service teachers professor: how to use 3d printers and be comfortable with them. Steve Hoover. Thinkercad and Autodesk123D>
3D academy http://www.team3dacademy.com/index2.html
. Pinterest board for3d Printing with resources

Lisa: graphic design. not intuitive.  Rhinoceros (not free anymore). 123D strong learning curve. 3d printing will be incorporated in the curriculum.  sculpture students and others don’t like fudging on the computer, but Adobe people love it. Some items takes up to 4 hours to print out. when working on the computer is difficult for some students to visualize the dimensionality.

collaborative learning opportunities.

no makerspace or fab lab. additional interest from the theater and business dept. 3d printing is connected to future work skills. new media ecology or media literacy set of skills.

the main presenter: build excitement and interest and gradually step back. how much material goes through and should we charge back. clean and maintenance involved; not too bad. better then a copier. plastic inexpensive. sizes with plastic – $25 and $50. how many project of a spool: depending on the size of the projects but considerable amount. two printers one art dept and one in the faculty dev area.

non profit visually impaired students.  how 3d can make difference in special ed.

3d printing lab with access for everybody. ownership brings policy. where housed: neutral place.

only one printer is barely sufficient for faculty to figure out how to use it. purchasing two more if students and curricula to be involved.

 

3dc 3d lisa 3da 3db

 

The Balancing Act: Team-Creating an eBook as an Alternative Method for Content Delivery Tom Nechodomu, University of Minnesota

ebook

tnecho@umn.edu
Susan Andre sandre@umn.edu
Linda Buturian butur001@umn.edu
Faculty Created digital stories – google “cultivaitng change series”
student created digital stories –
http://www.cehd.umn.edu/academics/online/
http://www.cehd.umn.edu/PSTL/water/
http://www.cehd.umn.edu/The-Changing-story/
Susan Andre uses a slide titled “trust” to elucidate how the entire project was enabled. “trust” and “transparency” are sparse currency in the environment I work in. if she is right an ebook ain’t happening anytime soon at my place.
inclining habitat.
students involvement. use stipends. student artists. food for the video interviews. create a community, student centered.
people able to change the book.
copyright process; did you find it cumbersome. copyright permission center.
time span and amount of hours spent: 3-4 months per chapter.

Main speaker
David Wiley. Making Teaching and Learning Awesome with Open

MN Learning Commons
open educational resources
LUMEN
lumen
education – sharing feedback, encouragement with students passion about the discipline, yourself
open is not the same as free.  free + permissions + copyright permission: 5 r = retain (make and own copies), reuse (use in a wide range of ways), revise (adapt, modify, and improve), remix (combine two or more), redistribute (share with others)
open:
free and unfettered access
perpetual, irrevocable copyright permissions
(look but don’t touch is not open)
tech enables OER permits
traditionally copyright materials on the Internet – not so good ; jet on the road
openly copyright materials on the internet _ yes: jet in the air
permission-less innovation. relatively inexpensive and broad permissions.
intellectual infrastructure of education: learning outcomes/objectives; assessments; textbooks. they are relatively expensive and narrow permissions.
disappearing ink strategies: buyback, rental, ebooks, online subscription
 mad, glad, sad, rad: the grumpy cat. student success per dollar
opennetgroup.org/review
change in student learning: replace commercial with open books – small. realign, bigger change. rethink is the large change.
responsibilities:
attribution and meeting other license requirements
thin common cartridge: a way to bring the content to the CMS, but the content remains on the creative commons
github.com/lumenlearning https://github.com/lumenlearning
disposable assignment: students hate doing them, instructors hate grading them. waste of time and energy
renewable assignment: students see value in doing them; instructor sees value grading them
https://www.youtube.com/watch?v=AsFU3sAlPx4
so what?
open education infrastructure: open outcomes, objectives, activities, educational resources
the culture of glued legos must be eradicated. open pedagogy. open credentialing model
summary: don’t settle for “affordable.” improve student outcomes. improve affordability. improve design / academic freedom

links generated from the discussion at my presentation:

https://www.google.com/search?q=tin+can&ie=utf-8&oe=utf-8

http://www.uwosh.edu/library/quizsmith

http://glickconsulting.com/resouce_brainegames

https://www.google.com/search?q=techers+skills&ie=utf-8&oe=utf-8

http://www.northeastern.edu/camd/gamedesign/people/sebastian-deterding/

https://www.duolingo.com/  Duolingo. App to learn languages using games

http://www.gamification.co/gabe-zichermann/

https://zebrazapps.com/  ZebraZapps

Cheating Inadvertently

Cheating Inadvertently

http://chronicle.com/article/Cheating-Inadvertently/229883/

2001 article that illustrated nicely the challenge we face in helping students do their work with integrity.

the form of plagiarism continues into graduate school, where plagiarism remains, by far, the most common form of academic dishonesty.

the article repeats to a degree what is already known:

http://web.stcloudstate.edu/pmiltenoff/plagiarism/index.html

http://web.stcloudstate.edu/pmiltenoff/plagiarism/convocation2008.ppsx

namely, that plagiarism is in a much smaller degree intentional and to its largest percentage lack of systematic approach and clear directions by faculty toward students.

Rebecca Moore Howard, a professor of writing and rhetoric at Syracuse University, has called “patchwriting,” or borrowing large sentence structures and vocabularies from a source and only swapping out the occasional word or phrase with language of their own.

academic integrity represents an incredibly complex subject to master: It encompasses knowledge (What are the rules of academic integrity? How do they apply in this context?), skills (How do I summarize or paraphrase this passage without plagiarizing? How do I credit the work of others when I am collaborating with peers or using sources?), and values (Why does academic integrity matter? Why should I care about it?).

“Those who do not want to imitate anything, produce nothing.”
― Salvador Dalí

LMS and embedded librarianship

Tumbleson, B. E., & Burke, J. (. J. (2013). Embedding librarianship in learning management systems: A how-to-do-it manual for librarians. Neal-Schuman, an imprint of the American Library Association.

Embedding librarianship in learning management systems:

https://scsu.mplus.mnpals.net/vufind/Record/007650037

see also:

Kvenild, C., & Calkins, K. (2011). Embedded Librarians: Moving Beyond One-Shot Instruction – Books / Professional Development – Books for Academic Librarians – ALA Store. ACRL. Retrieved from http://www.alastore.ala.org/detail.aspx?ID=3413

p. 20 Embedding Academic and Research Libraries in the Curriculum: 2014-nmc-horizon-report-library-EN

xi. the authors are convinced that LMS embedded librarianship is becoming he primary and most productive method for connecting with college and university students, who are increasingly mobile.

xii. reference librarians engage the individual, listen, discover what is wanted and seek to point the stakeholder in profitable directions.
Instruction librarians, in contrast, step into the classroom and attempt to lead a group of students in new ways of searching wanted information.
Sometimes that instruction librarian even designs curriculum and teaches their own credit course to guide information seekers in the ways of finding, evaluating, and using information published in various formats.
Librarians also work in systems, emerging technologies, and digital initiatives in order to provide infrastructure or improve access to collections and services for tend users through the library website, discovery layers, etc. Although these arenas seemingly differ, librarians work as one.

xiii. working as an LMS embedded librarian is both a proactive approach to library instruction using available technologies and enabling a 24/7 presence.

1. Embeddedness involves more that just gaining perspective. It also allows the outsider to become part of the group through shared learning experiences and goals. 3. Embedded librarianship in the LMS is all about being as close as possible to where students are receiving their assignments and gaining instruction and advice from faculty members. p. 6 When embedded librarians provide ready access to scholarly electronic collections, research databases, and Web 2.0 tools and tutorials, the research experience becomes less frustrating and more focused for students. Undergraduate associate this familiar online environment with the academic world.

p. 7 describes embedding a reference librarian, which LRS reference librarians do, “partnership with the professor.” However, there is room for “Research Consultations” (p. 8). While “One-Shot Library Instruction Sessions” and “Information Literacy Credit Courses” are addressed (p. 809), the content of these sessions remains in the old-fashioned lecturing type of delivering the information.

p. 10-11. The manuscript points out clearly the weaknesses of using a Library Web site. The authors fail to see that the efforts of the academic librarians must go beyond Web page and seek how to easy the information access by integrating the power of social media with the static information residing on the library web page.

p. 12 what becomes disturbingly clear is that faculty focus on the mechanics of the research paper over the research process. Although students are using libraries, 70 % avoid librarians. Urging academic librarians to “take an active role and initiate the dialogue with faculty to close a divide that may be growing between them and faculty and between them and students.”
Four research context with which undergraduates struggle: big picture, language, situational context and information gathering.

p. 15 ACRL standards One and Three: librarians might engage students who rely on their smartphones, while keeping in mind that “[s]tudents who retrieve information on their smartphones may also have trouble understanding or evaluating how the information on their phone is ‘produced, organized, and disseminated’ (Standard One).
Standard One by its definition seems obsolete. If information is formatted for desktops, it will be confusing when on smart phones, And by that, it is not mean to adjust the screen size, but change the information delivery from old fashioned lecturing to more constructivist forms. e.ghttp://web.stcloudstate.edu/pmiltenoff/bi/

p. 15 As for Standard Two, which deals with effective search strategies, the LMS embedded librarian must go beyond Boolean operators and controlled vocabulary, since emerging technologies incorporate new means of searching. As unsuccessfully explained to me for about two years now at LRS: hashtag search, LinkedIn groups etc, QR codes, voice recognition etc.

p. 16. Standard Five. ethical and legal use of information.

p. 23 Person announced in 2011 OpenClass compete with BB, Moodle, Angel, D2L, WebCT, Sakai and other
p. 24 Common Features: content, email, discussion board, , synchronous chat and conferencing tools (Wimba and Elluminate for BB)

p. 31 information and resources which librarians could share via LMS
– post links to dbases and other resources within the course. LIB web site, LibGuides or other subject-related course guidelines
– information on research concepts can be placed in a similar fashion. brief explanation of key information literacy topics (e.g difference between scholarly and popular periodical articles, choosing or narrowing research topics, avoiding plagiarism, citing sources properly whining required citations style, understanding the merits of different types of sources (Articles book’s website etc)
– Pertinent advice the students on approaching the assignment and got to rheank needed information
– Tutorials on using databases or planning searches step-by-step screencast navigating in search and Candida bass video search of the library did you a tour of the library

p. 33 embedded librarian being copied on the blanked emails from instructor to students.
librarian monitors the discussion board

p. 35 examples: students place specific questions on the discussion board and are assured librarian to reply by a certain time
instead of F2F instruction, created a D2L module, which can be placed in any course. videos, docls, links to dbases, links to citation tools etc. Quiz, which faculty can use to asses the the students

p. 36 discussion forum just for the embedded librarian. for the students, but faculty are encouraged to monitor it and provide content- or assignment-specific input
video tutorials and searching tips
Contact information email phone active IM chat information on the library’s open hours

p. 37 questions to consider
what is the status of the embedded librarian: T2, grad assistant

p. 41 pilot program. small scale trial which is run to discover and correct potential problems before
One or two faculty members, with faculty from a single department
Pilot at Valdosta State U = a drop-in informatil session with the hope of serving the information literacy needs of distance and online students, whereas at George Washington U, librarian contacted a distance education faculty member to request embedding in his upcoming online Mater’s course
p. 43 when librarians sense that current public services are not being fully utilized, it may signal that a new approach is needed.
pilots permit tinkering. they are all about risk-taking to enhance delivery

p. 57 markeing LMS ebedded Librarianship

library collections, services and facilities because faculty may be uncertain how the service benefits their classroom teaching and learning outcomes.
my note per
“it is incumbent upon librarians to promote this new mode of information literacy instruction.” it is so passe. in the times when digital humanities is discussed and faculty across campus delves into digital humanities, which de facto absorbs digital literacy, it is shortsighted for academic librarians to still limit themselves into “information literacy,” considering that lip service is paid for for librarians being the leaders in the digital humanities movement. If academic librarians want to market themselves, they have to think broad and start with topics, which ARE of interest for the campus faculty (digital humanities included) and then “push” their agenda (information literacy). One of the reasons why academic libraries are sinking into oblivion is because they are sunk already in 1990-ish practices (information literacy) and miss the “hip” trends, which are of interest for faculty and students. The authors (also paying lip services to the 21st century necessities), remain imprisoned to archaic content. In the times, when multi (meta) literacies are discussed as the goal for library instruction, they push for more arduous marketing of limited content. Indeed, marketing is needed, but the best marketing is by delivering modern and user-sought content.
the stigma of “academic librarians keep doing what they know well, just do it better.” Lip-services to change, and life-long learning. But the truth is that the commitment to “information literacy” versus the necessity to provide multi (meta) literacites instruction (Reframing Information Literacy as a metaliteracy) is minimizing the entire idea of academic librarians reninventing themselves in the 21st century.
Here is more: NRNT-New Roles for New Times

p. 58 According to the Burke and Tumbleson national LMS embedded librarianship survey, 280 participants yielded the following data regarding embedded librarianship:

  • traditional F2F LMS courses – 69%
  • online courses – 70%
  • hybrid courses – 54%
  • undergraduate LMS courses 61%
  • graduate LMS courses 42%

of those respondents in 2011, 18% had the imitative started for four or more years, which place the program in 2007. Thus, SCSU is almost a decade behind.

p. 58 promotional methods:

  • word of mouth
  • personal invitation by librarians
  • email by librarians
  • library brochures
  • library blogs

four years later, the LRS reference librarians’ report https://magic.piktochart.com/output/5704744-libsmart-stats-1415 has no mentioning of online courses, less to say embedded librarianship

my note:
library blog
was offered numerous times to the LRS librarians and, consequently to the LRS dean, but it was brushed away, as were brushed away the proposals for modern institutional social media approach (social media at LRS does not favor proficiency in social media but rather sees social media as learning ground for novices, as per 11:45 AM visit to LRS social media meeting of May 6, 2015). The idea of the blog advantages to static HTML page was explained in length, but it was visible that the advantages are not understood, as it is not understood the difference of Web 2.0 tools (such as social media) and Web 1.0 tools (such as static web page). The consensus among LRS staff and faculty is to keep projecting Web 1.0 ideas on Web 2.0 tools (e.g. using Facebook as a replacement of Adobe Dreamweaver: instead of learning how to create static HTML pages to broadcast static information, use Facebook for fast and dirty announcement of static information). It is flabbergasting to be rejected offering a blog to replace Web 1.0 in times when the corporate world promotes live-streaming (http://www.socialmediaexaminer.com/live-streaming-video-for-business/) as a way to  promote services (academic librarians can deliver live their content)

p. 59 Marketing 2.0 in the information age is consumer-oriented. Marketing 3.0 in the values-driven era, which touches the human spirit (Kotler, Katajaya, and Setiawan 2010, 6).
The four Ps: products and services, place, price and promotion. Libraries should consider two more P’s: positioning and politics.

Mathews (2009) “library advertising should focus on the lifestyle of students. the academic library advertising to students today needs to be: “tangible, experiential, relatebale, measurable, sharable and surprising.” Leboff (2011, p. 400 agrees with Mathews: the battle in the marketplace is not longer for transaction, it is for attention. Formerly: billboards, magazines, newspapers, radio, tv, direct calls. Today: emphasize conversation, authenticity, values, establishing credibility and demonstrating expertise and knowledge by supplying good content, to enhance reputation (Leboff, 2011, 134). translated for the embedded librarians: Google goes that far; students want answers to their personal research dillemas and questions. Being a credentialed information specialist with years of experience is no longer enough to win over an admiring following. the embedded librarian must be seen as open and honest in his interaction with students.
p. 60  becoming attractive to end-users is the essential message in advertising LMS embedded librarianship. That attractivness relies upon two elements: being noticed and imparting values (Leboff, 2011, 99)

p. 61 connecting with faculty

p. 62 reaching students

  • attending a synchronous chat sessions
  • watching a digital tutorial
  • posting a question in a discussion board
  • using an instant messaging widget

be careful not to overload students with too much information. don’t make contact too frequently and be perceived as an annoyance and intruder.

p. 65. contemporary publicity and advertising is incorporating storytelling. testimonials differ from stories

p. 66 no-cost marketing. social media

low-cost marketing – print materials, fliers, bookmarks, posters, floor plans, newsletters, giveaways (pens, magnets, USB drives), events (orientations, workshops, contests, film viewings), campus media, digital media (lib web page, blogs, podcasts, social networking cites

p. 69 Instructional Content and Instructional Design
p. 70 ADDIE Model

ADDIE model ADDIE model

Analysis: the requirements for the given course, assignments.
Ask instructors expectations from students vis-a-vis research or information literacy activities
students knowledge about the library already related to their assignments
which are the essential resources for this course
is this a hybrid or online course and what are the options for the librarian to interact with the students.
due date for the research assignment. what is the timeline for completing the assignment
when research tips or any other librarian help can be inserted

copy of the syllabus or any other assignment document

p. 72 discuss the course with faculty member. Analyze the instructional needs of a course. Analyze students needs. Create list of goals. E.g.: how to find navigate and use the PschInfo dbase; how to create citations in APA format; be able to identify scholarly sources and differentiate them from popular sources; know other subject-related dbases to search; be able to create a bibliography and use in-text citations in APA format

p. 74 Design (Addie)
the embedded component is a course within a course. Add pre-developed IL components to the broader content of the course. multiple means of contact information for the librarians and /or other library staff. link to dbases. link to citation guidance and or tutorial on APA citations. information on how to distinguish scholarly and popular sources. links to other dbases. information and guidance on bibliographic and in-text citations n APA either through link, content written within the course a tutorial or combination. forum or a discussion board topic to take questions. f2f lib instruction session with students
p. 76 decide which resources to focus on and which skills to teach and reinforce. focus on key resources

p. 77 development (Addie).
-building content;the “landing” page at LRS is the subject guides page.  resources integrated into the assignment pages. video tutorials and screencasts

-finding existing content; google search of e.g.: “library handout narrowing topic” or “library quiz evaluating sources,” “avoiding plagiarism,” scholarly vs popular periodicals etc

-writing narrative content. p. 85

p. 87 Evaluation (Addie)

formative: to change what the embedded librarian offers to improve h/er services to students for the reminder of the course
summative at the end of the course:

p. 89  Online, F2F and Hybrid Courses

p. 97 assessment impact of embedded librarian.
what is the purpose of the assessment; who is the audience; what will focus on; what resources are available
p. 98 surveys of faculty; of students; analysis of student research assignments; focus groups of students and faculty

p. 100 assessment methods: p. 103/4 survey template
https://www.ets.org/iskills/about
https://www.projectsails.org/ (paid)
http://www.trails-9.org/
http://www.library.ualberta.ca/augustana/infolit/wassail/
p. 106 gathering LMS stats. Usability testing
examples: p. 108-9, UofFL : pre-survey and post-survey of studs perceptions of library skills, discussion forum analysis and interview with the instructor

p. 122 create an LMS module for reuse (standardized template)
p. 123 subject and course LibGuides, digital tutorials, PPTs,
research mind maps, charts, logs, or rubrics
http://creately.com/blog/wp-content/uploads/2012/12/Research-Proposal-mind-map-example.png
http://www.library.arizona.edu/help/tutorials/mindMap/sample.php  (excellent)
or paper-based if needed: Concept Map Worksheet
Productivity Tools for Graduate Students: MindMapping http://libguides.gatech.edu/c.php

rubrics:
http://www.cornellcollege.edu/LIBRARY/faculty/focusing-on-assignments/tools-for-assessment/research-paper-rubric.shtml
http://gvsu.edu/library/instruction/research-guidance-rubric-for-assignment-design-4.htm
Creating Effective Information Literacy Assignments http://www.lib.jmu.edu/instruction/assignments.aspx

course handouts
guides on research concepts http://library.olivet.edu/subject-guides/english/college-writing-ii/research-concepts/
http://louisville.libguides.com/c.php
Popular versus scholar http://www.library.arizona.edu/help/tutorials/scholarly/guide.html

list of frequently asked q/s:
blog posts
banks of reference q/s

p. 124. Resistance or Receptivity

p. 133 getting admin access to LMS for the librarians.

p. 136 mobile students, dominance of born-digital resources

 

 

 

———————-

Summey T, Valenti S. But we don’t have an instructional designer: Designing online library instruction using isd techniques. Journal Of Library & Information Services In Distance Learning [serial online]. January 1, 2013;Available from: Scopus®, Ipswich, MA. Accessed May 11, 2015.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-84869866367%26site%3deds-live%26scope%3dsite

instructional designer library instruction using ISD techniques

Shank, J. (2006). The blended librarian: A job announcement analysis of the newly emerging position of instructional design librarian. College And Research Libraries, 67(6), 515-524.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-33845291135%26site%3deds-live%26scope%3dsite

The Blended Librarian_ A Job Announcement Analysis of the Newly Emerging Position of Instructional Design Librarian

Macklin, A. (2003). Theory into practice: Applying David Jonassen’s work in instructional design to instruction programs in academic libraries. College And Research Libraries, 64(6), 494-500.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-7044266019%26site%3deds-live%26scope%3dsite

Theory into Practice_ Applying David Jonassen_s Work in Instructional Design to Instruction Programs in Academic Libraries

Walster, D. (1995). Using Instructional Design Theories in Library and Information Science Education. Journal of Education for Library and Information Science, (3). 239.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedsjsr%26AN%3dedsjsr.10.2307.40323743%26site%3deds-live%26scope%3dsite

Using Instructional Design Theories in Library and Information Science Education

Mackey, T. )., & Jacobson, T. ). (2011). Reframing information literacy as a metaliteracy. College And Research Libraries, 72(1), 62-78.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-79955018169%26site%3deds-live%26scope%3dsite

Reframing Information Literacy as a metaliteracy

Nichols, J. (2009). The 3 directions: Situated information literacy. College And Research Libraries, 70(6), 515-530.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-73949087581%26site%3deds-live%26scope%3dsite

The 3 Directions_ Situated literacy

 

—————

Journal of Library & Information Services in Distance Learning (J Libr Inform Serv Dist Learn)

https://www.researchgate.net/journal/1533-290X_Journal_of_Library_Information_Services_in_Distance_Learning

http://conference.acrl.org/

http://www.loex.org/conferences.php

http://www.ala.org/lita/about/igs/distance/lit-igdl

————

https://magic.piktochart.com/output/5704744-libsmart-stats-1415

IPython notebook

Library Juice Academy

course_intro

I also encourage students to download and install Python on their own systems. Python is a
mature and robust language with a great many third party distributions and versions, such as Ipython.
One I recommend is Active State Python. Active State produces refined and well supported
distributions with easy to use installers. Their basic, individual distribution is free. You can find it at
http://www.activestate.com/activepython/downloads
https://host.lja-computing.net:8888/notebooks/profile_intro_programming_p1/Intro_Programming_Lesson1_pmiltenoff.ipynb
  • Integers: A signed or unsigned whole number running from -32,768 to 32,768 or from 0 to 65,535 if not signed. Integers are used anytime something needs to be counted.
  • Long Integer: Any whole number outside the above range. Python doesn’t distinguish between the two though many languages do. Practically, Python’s integers range from −2,147,483,648 to 2,147,483,648 or 0 to 0 to 4,294,967,295. Most of us will be very happy with this many whole numbers to choose from.
  • Real and Floating Point Numbers: Real numbers are signed or unsigned numbers including decimals. The numbers 2,3,4 are Integers and Real Numbers. The numbers 2.1, 2.9,3.9 are Real Numbers, but not Integers. Real Numbers can include representations of irrational numbers such as pi. Real numbers must be rational, that is a decimal number that terminates after a finite number of decimals. You will sometimes encounter the term Floating Point Numbers. This is a technical term referring to the way that large Real Numbers are represented in a computer. Python hides this detail from you so Real and Floating Point are used intercangeably in this language.
  • Binary Numbers: And Octal and Hexadecimal. These are numbers used internally by computers. You will run into these values fairly often. For instance, when you see color values in HTML such as “FFFFFF” or “0000FF”,
Hexadecimal and Octal are used because humans can read them without too much trouble and they are compromise between what computers process and what we can read. Any time you see something in Octal or Hexadecimal, you are looking at something that interfaces with the lower levels of a computer. You will most commonly use Hexadecimal numbers when dealing with Unicode character encodings. Python will interpret any number which begins with a leading zero as binary unless formatting commands have been used.
Numbers such as 7i are referred to as complex. They have a real part, the 7, and an imaginary part, i. Chance are you won’t use complex numbers unless you’re working with scientific data.
A String consists of a sequence of characters. The term String refers to how this data type is represented internally. You store text in Strings. Text can by anything, letters, words, sentences, paragraphs, numbers, just about anything.
Lists are close cousins to Strings, though you may never need to think of them that way. A list is just that, a list of things. Lists may contain any number of numbers or any number of strings. List may even contain any number of other lists. Lists are compared to arrays, but they are not the same thing. In most uses, the function the same so the difference, for our purposes, is moot. Strings are like lists in that, internally, the computer works with strings in an identical manner to lists. This is why the operations on Strings are so different from numbers.
The last main data type in the Python programming language is the dictionary. Dictionaries are map types, known in other languages as hashes, and in computer science as Associative Arrays. The best way to think of what the dictionary does is to consider a Library of Congress Call Number(something this audience is familiar with). The call number is what’s called a Key. It connects to a record which contains information about a book. The combination of keys and records, called values, comprises a dictionary. A single key will connect to a discrete group of values such as the items in this record. Dictionaries will be touched on in the next lesson in some detail in the next course. These are fairly advanced data structures and require a solid understanding a programming fundamentals in order to be used properly.

Statements, an Overview

Programs consist of statements. A statement is a unit of executable code. Think of a statement like a sentence. In a nutshell, statements are how you do things in a program. Writing a program consists of breaking down a problem you want to solve into smaller pieces that you can represent as mathematical propositions and then solve. The statement is where this process gets played out. Statements themselves consist of some number of expressions involving data. Let’s see how this works.

An expression would be something like 2+2=4. This expression, however is not a complete statements. Ask Python to evaluate it and you will get the error “SyntaxError: can’t assign to operator”. What’s going on here? Basically we didn’t provide a complete statement. If we want to see the sum of 2+2 we have to write a complete statement that tells the interpreter what to do and what to do it with. The verb here is ‘print’ and the object is ‘2+2’. Ask Python to evaluate ‘print 2+2’ and it will show ‘4’. We could also throw in subject and do something a bit more detailed: ‘Sum=2+2’. In this case we are assigning the value of 2+2 to the variable, Sum. We can then do all sorts of things with Sum. We can print it. We can add other numbers to it, hand it off to a function and so on. For instance, might want to know the root of Sum. In which case we might write something like ‘print sqrt(sum)’ which will display ‘2’.

A shell is essentially a user interface that provides you access to a system’s features. Normally, this means access to an Operating System. In cases like this, the shell provides you access to the Python programming environment.

Anything preceed by a “#” is not interpreted or executed by the programming shell. Comments are used widely to document programs. One school of programming holds that code should be so clear that comments are uncessary.

Operations on Numbers

Expressions are discrete statements in programming that do something. They typically occupy one line of code, though programmers will sometimes squeeze more in. This is generally bad form and can really make your program a mess. Expressions consist of operations and data or rather data and operations on them. So, what can you do with numbers? Here is a concise list of the basic operations for integers and real numbers of all types:

Arithemetic:

  • Addition: z= x + y
  • Subtraction: z = x – y
  • Multiplication: z = x * y. Here the asterisk serves as the ‘X’ multiplication symbol from grade school.
  • Division: z = x/y. Division.
  • Exponents: z = x ** y or xy, x to the y power.

Operations have an order of precedence which follows the algebraic order of precedence. The order can be remembered by the old Algebra mnenomic, Please Excuse My Dear Aunt Sally which is remeinds you that the order of operations is:

  1. Parentheses
  2. Exponents
  3. Multiplication
  4. Division
  5. Addition
  6. Subtraction

Operations on Strings

Strings are strange creatures as I’ve noted before. They have their own operations and the arithmetic operations you saw earlier don’t behave the same way with strings.

Putting Expressions Together to Make Statements

As I noted earlier, all computer languages, and natural languages, possess pragmatics, larger scale structures which reduce ambiguity by providing context. This is a fancy way of saying just as sentences posses rules of syntax to make able to be comprehended, larger documents have similar rules. Computer Programs are no different. Here’s a break down of the structure of programs in Python, in a general sense.

  1. Programs consist of one or more modules.
  2. Modules consist of one or more statements.
  3. Statements consist of one or more expressions.
  4. Expressions create and/or manipulate objects(and variables of all kinds).

Modules and Programs are for the next class in the series, though we will survey these larger structures next lesson. For now, we’ll focus on statements and expressions. Actually, we’ve already started with expressions above. In Python, statements can do three things.

  • Assign a variable
  • Change a variable
  • Take an action

Variable Names and Reserved Words

Now that we’ve seen some variable assignments, let’s talk about best practices. First off, aside from reserved words, variable names can be almost any combination of letters, numbers and punctuation marks. You, however, should never ever, use the following punctuation marks in variable names:

      • +
      • !
      • @
      • ^
      • %
      • (
      • )
      • .
      • ?
      • /
      • :
      • ;

*

These punctuation marks tends to be operators and characters that have special meanings in most computer languages. The other issue is reserved words. What are “reserved words”? They are words that Python interprets as commands. Pythons reservers the following words.:

  • True: A special value set aside for boolean values
  • False: The other special value set aside for boolean vaules
  • None: The logical equivalent of 0
  • and: a way of combining logical conditions
  • as: describes how modules are imported
  • assert: a way of forcing something to take on a certain value. Used in debugging of large programs
  • break: breaks out of a loop and goes on with the rest of the program
  • class: declares a class for object oriented design. For now, just remember not to use this variable name
  • continue: returns to the top of the loop and keeps on going again
  • def: declares functions which allow you to modularize your code.
  • elif: else if, a cotnrol structure we’ll see next lesson
  • else: as above
  • except: another control structure
  • finally: a loop control structure
  • for: a loop control structure
  • from: used to import modules
  • global: a scoping statement
  • if: a control structure/li>
  • in: used in for each loops
  • is: a logical operator
  • lamda: like def, but weird. It defines a function in a single line. I will not teach this becuase it is icky. If you ever learn Perl you will see this sort of thing a lot and you will hate it, but that’s just my personal opinion.
  • nonlocal: a scoping command
  • not: a logical operator
  • or: another logical operator
  • pass: does nothing. Used as placeholder
  • raise: raises an error. This is used to write custom error messages. Your programs may have conditions which would be considered invalid based on our business situation. The interpreter may not consider them errors, but you might not want your user to do something so you ‘raise’ an exception and stop the program.
  • return: tells a function to return a value
  • try: this is part of an error testing statement
  • while: starts a while loop
  • with: a context manager. This will be covered in the course after the next one in this series
  • yield: works like return
Variable names should be meaningful. Let’s say I have to track a person’s driver license number. explanatory names like ‘driverLicenseNumber’.

  • Use case to make your variable names readable. Python is case sensitive, meaning a variable named ‘cat’ is different from named ‘Cat’. If you use more than one word to name variable, start of lower case the change case on the second word. For instance “bigCats = [‘Tiger’,’Lion’,’Cougar’, ‘Desmond’]”. The common practice used by programmers in many settings is that variables start with lowercase and functions(methods and so on) start with upper case. This is called “Camel Case” for its lumpy, the humpy appearance. Now, as it happens, there is something of a religious debate over this. Many Python programmers prefer to keep everything lower case and join words in a name by underscores such as “big_cats”. Use whichever is easiest or looks the nicest to you.
  • Variable names should be unique. Do not reuse names. This will cause confusion later on.
  • Python conventions. Python, as with any other programming language, has culture built up around it. That means there are some conventions surrounding variable naming. Two leading underscores, __X, denote system variables which have special meaning to the interpreter. So avoid using this for your own variables. There may be a time and place, but that’s for an advanced prorgramming course. A single underscore _X indicates to other programmers that this a fundamental variable and that they mess with it at their own peril.
  • Avoid starting variable names with a number. This may or may not return an error. It can also mislead anyone reading your program.
  • “A foolish consistency is the hobgoblin of little minds”. But not to programming minds. Consistency helps the readability of code a great deal. Once you start a system, stick with it.

Statement Syntax

Putting together valid statements can be a little hard at first. There’s a grammar to them. Thus far, we’ve mainly been workign with expressions such as “x = x+1”. You can think of expression as nouns. We’ve clearly defined x, but how do we look inside? For that we need to give it a verb, the print command. We would then write “print x”. However we can skip the middle statement and print an expression such as “print x + 1”. The interpreter evaluates this per the order of operations I laid out earlier. However, once that expression is evaluated, it then applies the verb, “print”, to that expression.

Print is a function that comes with the Python distribution. There are many more and you can create your own. We’ll cover that a bit in next lesson. Let’s look at little more at the grammar of a statement. Consider:

x = sin(b)

Assume that b has been defined elsewhere. x is the subject, b is the object and sin is the verb. Python will go to the right side of the equal sign first. It will then go to the inside of the function and evaluate what’s there first. It then evaluates the value of the function and finishes by setting x to that value. What about something like this?

x=sin(x+3/y)

Python evaluates from the inside out according to the rules of operation. Very complex statements can be built up this way.

x = sin(log((x + 3)/(e**2)))
Regardless of what this expression evaluates to (I don’t actually know), Python starts with the innermost parentheses, then works through the value of e squared then adds 3 to x and divides the result by e squared. With that worked out, it takes the logarithm of the result and takessthe sine of that before setting x to the final result.What you cannot do is execute more than one statement on a line. No more than one verb on a line. In this context, a verb is an assignment, or a command acting on an expression
markdown cell
code cell

Call up your copy of Think Python or go to the website at http://www.greenteapress.com/thinkpython/html/. Read Chapter 2. This will reiterate much of what I’ve presnted here, but this will help cement the content into you minds. Skip section 2.6 because IPython treats everything as script mode. IPyton provides you with the illusion of interactive, but everything happens asynchronously. This means that any action you type in will not instantaneously resolve as it would if you were running Python interactively on your computer. You will have to use print statements to see the results of your work.

Your assignment consists of the following:

  • Exercise 1 from Chapter 2 of Think Python. If you type an integer with a leading zero, you might get a confusing error:
    <<< zipcode = 02492

    SyntaxError: invalid token
    Other numbers seem to work, but the results are bizarre:
    <<< zipcode = 02132
    <<< zipcode
    1114
    Can you figure out what is going on? Hint: display the values 01, 010, 0100 and 01000.

  • Exercise 3 from Chapter 2 of Think Python.Assume that we execute the following assignment statements:
    width = 17
    height = 12.0
    delimiter = ‘.’
    For each of the following expressions, write the value of the expression and the type (of the value of the expression).

    width/2
    width/2.0
    height/3
    1 + 2 5
    delimiter
    5

  • Exercise 4 from Capter 2 of Think Python. Practice using the Python interpreter as a calculator:
    1. The volume of a sphere with radius r is 4/3 π r3. What is the volume of a sphere with radius 5? Hint: 392.7 is wrong!
    2. Suppose the cover price of a book is $24.95, but bookstores get a 40% discount. Shipping costs $3 for the first copy and 75 cents for each additional copy. What is the total wholesale cost for 60 copies?
    3/ If I leave my house at 6:52 am and run 1 mile at an easy pace (8:15 per mile), then 3 miles at tempo (7:12 per mile) and 1 mile at easy pace again, what time do I get home for breakfast?

In your IPython notebook Create a markdown cell and write up your exercise in there. Just copy it from the textbook or from the above write up. Next ceate a code cell and do your work in there. Please, comment your work thoroughly. You cannot provide too many comments. Use print statements to see the outcome of your work.

education reform Finland

Finland schools: Subjects scrapped and replaced with ‘topics’ as country reforms its education system

http://www.independent.co.uk/news/world/europe/finland-schools-subjects-are-out-and-topics-are-in-as-country-reforms-its-education-system-10123911.html

Programme for International Student Assessment (PISA) rankings https://nces.ed.gov/surveys/pisa/

Subject-specific lessons – an hour of history in the morning, an hour of geography in the afternoon – are already being phased out for 16-year-olds in the city’s upper schools. They are being replaced by what the Finns call “phenomenon” teaching – or teaching by topic. For instance, a teenager studying a vocational course might take “cafeteria services” lessons, which would include elements of maths, languages (to help serve foreign customers), writing skills and communication skills.

The reforms reflect growing calls in the UK – not least from the Confederation of British Industry and Labour’s Shadow Education Secretary Tristram Hunt – for education to  promote character, resilience and communication skills, rather than just pushing children through “exam factories”. (http://www.theguardian.com/education/2015/mar/20/labour-calls-time-on-exam-factory-approach-to-schooling)
(My Note/Question: so UK is ready to scrap what US pushes even harder with the STEM idea?)

More on education in Finland and its education in this IMS blog:

https://blog.stcloudstate.edu/ims/?s=finland

digital portfolio

Digital Portfolios: Facilitating Authentic Learning and Cultivating Student Ownership

presented on Tuesday, March 3, 2015.

Steve Zimmerman (charter school director), New York

digital porfolio software: open source. Google Sites – free, but too laborious for teachers

must be student owned and intuitive interface (you cannot say this about MN eFolio)

assessment rubrics

easy sharing and feedback

accessible form mobile devices (you cannot say this about MN eFolio)

easy integration with other applications (you cannot say this about MN eFolio)

Tina Holland

she is not a test person. good for her.
writing, critical thinking, creative thinking, soft skills (communication, collaboration, negotiation). team players, problme solvers, prioritize,

education is moving from traditional teaching methods, to inquiry based. self-directed learning. from summative to formative assessment

21st century learning competencies

#DigitalPortfolio

the presentation is now available on-demand at: http://w.on24.com/r.htm?e=936737&s=1&k=93DDFD3EB35B18A080B8EB13DD8FA770.

More on digital portfolio in this blog:

https://blog.stcloudstate.edu/ims/?s=digital+portfolio

Games in the library

Games in the library

bibliography and research

http://scottnicholson.com/pubs/index.html

Playing in the Past: A History of Games, Toys, and Puzzles in North American Libraries
Author(s): Scott Nicholson
Source: The Library Quarterly, Vol. 83, No. 4 (October 2013), pp. 341-361
Published by: The University of Chicago Press
Stable URL: http://www.jstor.org/stable/10.1086/671913

demonstrate the different ways in which libraries have used games, toys, and puzzles over the last 150 years through bothcollections and services
p, 342 Defining games –
p. 348 Games as the Subject of Collections\
p. 350A significant shift in academic libraries is a focus on providing services to students. Since agrowing number of academic publications both current issues and back volumes

are ac-cessible online through library subscriptions, the physical space of academic libraries is notneeded for collections of periodicals. The concept of the “learning commons”has become
popular on US campuses in the past decade; it combines traditional library resources and
the availability of library staff members with group work spaces, computer access and assis-
tance, and writing assistance to provide one place where students can get assistance with
course work. In addition, many of these learning commons also include cafes, social spaces,
and other support of the social lives of students, and it is in this role that academic libraries
provide access to collections of games.

p. 357 Another upcoming area of gaming in libraries is gamification. Gamification is the application of game design elements to a nongame setting ðDeterding et al. 2011Þ.

————————————-

Nicholson, S. (2013, June). Exploring Gamification Techniques for Classroom Management. Paper Presented at Games+Learning+Society 9.0, Madison, WI

The concept of meaningful gamification is that the primary use of game layers is not to provide
external rewards, but rather to help participants find a deeper connection to the underyling topic

——————————-

 

More on games in education in this blog

https://blog.stcloudstate.edu/ims/?s=games

https://blog.stcloudstate.edu/ims/?s=gaming

https://blog.stcloudstate.edu/ims/?s=gamification

Electronics Graveyard

A Shadow Economy Lurks In An Electronics Graveyard

http://www.npr.org/2015/01/04/374780916/a-shadow-economy-lurks-in-an-electronics-graveyard

notes under the NPR article and on its Facebook posting most interesting, as usually. E.g.:

Brian Trudo I wrote my final paper in college english on this subject. I believe that ultimately it is the producers of electronic devices (like apple) responsibility to rebuy and recycle older electronics. especially whwn they come out with a new device every year

Dan Neidlinger I did a report on this kind of thing in college, just for a basic writing class. First world pollution of the third world is a big and nasty problem that’s not given great focus.

1 15 16 17 18 19 20