shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
Estimated Hours of Learning: 28 Certificate of Completion available upon request
Learning outcomes
After participating in this eCourse, you will:
Gain experience using some of the best apps available and understand how they enable learning
Learn how to evaluate and review mobile apps
Learn how tablets complement laptops, and how their capabilities are creating new learning opportunities
Learn how apps are being used by people with special needs, and where to find additional resources for learning more
Receive guidance for creating your own app guides, offering workshops, and advising colleagues
In this 5-week eCourse, you’ll learn about the most useful apps available on tablet and mobile devices and how they can be applied in your library to create the best learning experiences for your patrons and students.
Mobile apps are empowering for people of all ages and abilities. Contrary to the popular idea that apps are only useful for “consumption,” the best apps are being used effectively as tools to enable learning and knowledge creation. In this eCourse, Nicole Hennig will show you how to incorporate apps as learning tools at your library.
Readings about security, writing, mobile apps in academia
Your thoughts on the readings (discussion forum)
Optional app review assignment
Week 3 – Reference
The Apps
Dictionaries, encyclopedias
Unit converters, maps, languages
Specialized reference apps
Subscription databases & citations
Readings & Discussion
Readings about jailbreaking, platforms, & mobile web
Apple’s iOS Human Interface Guidelines
Your thoughts on the readings (discussion forum)
Optional app review assignment
Week 4 – Multimedia
The Apps
Art viewing
Art creation
Photography and photo editing
Music listening
Music creation
Video viewing and editing
Readings & Discussion
Readings about technology & children
Your thoughts on the readings (discussion forum)
Optional app review assignment
Week 5 – Accessibility & More
Accessibility features of mobile devices
Readings & Discussion
Readings about assistive technology
Your thoughts on the readings (discussion forum)
Idea generation assignment
Ideas for using apps in library programs & services
Apps that wow
How this eCourse Works
The eCourse begins on June 5, 2017. Your participation will require approximately five to six hours a week, at times that fit your schedule. All activities take place on the website, and you will be expected to:
Read, listen to or view online content
Post to online discussion boards
Complete weekly assignments or activities
Instructor Nicole Hennig will monitor discussion boards regularly during the five-week period, lead group discussions, and will also answer individual questions. All interaction will take place on the eCourse site, which will be available 24 hours a day, 7 days a week. It’s recommended that students log into the site on the first day of class or within a few days for an overview of the content and to begin the first lesson.
The roles of librarians change with changes in user needs and demands and the technology employed. A survey conducted for Research Libraries UK found skill gaps in nine key areas in which subject librarians could be supporting researchers’ needs. Even though many librarians may want to hire new staff with these skills, a survey found that the reality for most will be training existing staff.
Definitions of library services will change. We need to grow the ways users can engage with whatever they value from libraries, whether papyrus rolls, maker spaces or data management instruction.
p. 19
What is the Unique Selling Point (USP) of libraries vis-à-vis other information service providers?
p. 21
Librarians should measure the effectiveness of services based on the users’ perceptions of success. Librarians also should move beyond surveys of how library space is being used and should conduct structured observations and interviews with the people using the space. It is not enough to know that the various spaces, whether physical or virtual, are busy. Librarians need to understand when and how the spaces are being used.
p. 33 What is Enough? Satisficing Information Needs
Role theory explains that: “When people occupy social positions their behavior is determined mainly by what is expected of that position rather than by their own individual characteristics” (Abercrombie et al., 1994, p. 360).
Rational choice theory is based on the premise that complex social behavior can be understood in terms of elementary individual actions because individual action is the elementary unit of social life. Rational choice theory posits that individuals choose or prefer what is best to achieve their objectives or pursue their interests, acting in their self-interest (Green, 2002). Stated another way, “When faced with several courses of action, people usually do what they believe is likely to have the best overall outcome” (Scott, 2000).
When individuals satisfice, they compare the benefits of obtaining “more information” against the additional cost and effort of continuing to search (Schmid, 2004)
p. 38
This paper examines the theoretical concepts—role theory, rational choice, and satisficing—by attempting to explain the parameters within which users navigate the complex information-rich environment and determine what and how much information will meet their needs.
p. 39
The information-seeking and -searching research that explicitly addresses the topic of “what is good enough” is scant, though several studies make oblique references to the stopping stage, or to the shifting of directions for want of adequate information. Kraft and Lee (1979, p. 50) propose three stopping rules:
1. The satiation rule, “where the scan is terminated only when the user becomes satiated by finding all the desired number of relevant documents”;
2. The disgust rule, which “allows the scan to be terminated only when the user becomes disgusted by having to examine too many irrelevant documents”; and
3. The combination rule, “which allows the user to be seen as stopping the scan if he/she is satiated by finding the desired number of relevant documents or disgusted by having to examine too many irrelevant documents, whichever comes first.”
p. 42
Ellis characterizes six different types of information activities: starting, chaining, browsing, differentiating, monitoring and extracting. He emphasizes the information- seeking activities, rather than the nature of the problems or criteria used for determining when to stop the information search process. In a subsequent article, Ellis (1997) observes that even in the final stages of writing, individuals may continue the search for information in an attempt to answer unresolved questions or to look for new literature.
p. 43
Undergraduate and graduate students
Situations creating the need to look for information (meeting assignment requirements):
• Writing research reports; and
• Preparing presentations.
Criteria used for stopping the information search (fulfilling assignment requirements):
1. Quantitative criteria:
— Required number of citations was gathered;
— Required number of pages was reached;
— All the research questions were answered; and
— Time available for preparing.
2. Qualitative criteria:
— Accuracy of information;
— Same information repeated in several sources;
— Sufficient information was gathered; and
— Concept understood.
Criteria used for stopping the information search (fulfilling assignment requirements):
1. Quantitative criteria:
— Required number of citations was gathered;
— Required number of pages was reached;
— All the research questions were answered; and
— Time available for preparing.
2. Qualitative criteria:
— Accuracy of information;
— Same information repeated in several sources;
— Sufficient information was gathered; and
— Concept understood.
p. 44
Faculty
Situations creating the need to look for information (meeting teaching needs):
• Preparing lectures and presentations;
• Delivering lectures and presentations;
• Designing and conducting workshops;
• Meeting scholarly and research needs; and
• Writing journal articles, books and grant proposals.
Criteria used for stopping the information search (fulfilling teaching needs):
1. Quantitative criteria:
— Time available for: preparing lectures and presentations; delivering lectures
— And presentations; and designing and conducting workshops; and
— Fulfilling scholarly and research needs.
2. Qualitative criteria:
— Every possible synonym and every combination were searched;
— Representative sample of research was identified;
— Current or cutting-edge research was found;
— Same information was repeated;
— Exhaustive collection of information sources was discovered;
— Colleagues’ feedback was addressed;
— Journal reviewers’ comments were addressed; and
— Publisher’s requirements were met.
1. Quantitative criteria for stopping:
— Requirements are met;
— Time constraints are limited; and
— Coverage of material for publication is verified by colleagues or reviewers.
2. Qualitative criteria for stopping:
— Trustworthy information was located;
— A representative sample of sources was gathered;
— Current information was located;
— Cutting-edge material was located;
— Exhaustive search was performed; and
— Exhaustive collection of information sources was discovered.
p. 53
“Screenagers” and Live Chat Reference: Living Up to the Promise
p. 81
Sense-Making and Synchronicity: Information-Seeking Behaviors of Millennials and Baby Boomers
p. 84 Millennials specific generational features pertinent to libraries and information-seeking include the following:
Rushkoff (1996) described the non-linearity of the thinking patterns of those he terms “children of chaos,” coining the term “screenagers” to describe those who grew up surrounded by television and computers (p. 3).
p. 85
Rational choice theory describes a purposive action whereby individuals judge the costs and benefits of achieving a desired goal (Allingham 1999; Cook and Levi 1990; Coleman and Fararo 1992). Humans, as rational actors, are capable of recognizing and desiring a certain outcome, and of taking action to achieve it. This suggests that information seekers rationally evaluate the benefits of information’s usefulness and credibility, versus the costs in time and effort to find and access it.
Role theory offers a person-in-context framework within the information-seeking situation which situates behaviors in the context of a social system (Mead 1934; Marks 1996). Abercrombie, et al. (1994, p. 360) state, “When people occupy social positions their behavior is determined mainly by what is expected of that position rather than by their own individual characteristics.” Thus the roles of information-seekers in the academic environment influence the expectations for performance and outcomes. For example, faculty would be expected to look for information differently than undergraduate students. Faculty members are considered researchers and experts in their disciplines, while undergraduate students are novices and protégés, roles that place them differently within the organizational structure of the academy (Blumer, 2004; Biddle, 1979; Mead, 1934; Marks, 1996; Marks, 1977).
meetings with Chief Learning Officers, talent management leaders, and vendors of next generation learning tools.
The corporate L&D industry is over $140 billion in size, and it crosses over into the $300 billion marketplace for college degrees, professional development, and secondary education around the world.
Digital Learning does not mean learning on your phone, it means “bringing learning to where employees are.” In other words, this new era is not only a shift in tools, it’s a shift toward employee-centric design. Shifting from “instructional design” to “experience design” and using design thinking are key here.
1) The traditional LMS is no longer the center of corporate learning, and it’s starting to go away.
LMS platforms were designed around the traditional content model, using a 17 year old standard called SCORM. SCORM is a technology developed in the 1980s, originally intended to help companies like track training records from their CD-ROM based training programs.
the paradigm that we built was focused on the idea of a “course catalog,” an artifact that makes sense for formal education, but no longer feels relevant for much of our learning today.
not saying the $4 billion LMS market is dead, but the center or action has moved (ie. their cheese has been moved). Today’s LMS is much more of a compliance management system, serving as a platform for record-keeping, and this function can now be replaced by new technologies.
We have come from a world of CD ROMs to online courseware (early 2000s) to an explosion of video and instructional content (YouTube and MOOCs in the last five years), to a new world of always-on, machine-curated content of all shapes and sizes. The LMS, which was largely architected in the early 2000s, simply has not kept up effectively.
2) The emergence of the X-API makes everything we do part of learning.
In the days of SCORM (the technology developed by Boeing in the 1980s to track CD Roms) we could only really track what you did in a traditional or e-learning course. Today all these other activities are trackable using the X-API (also called Tin Can or the Experience API). So just like Google and Facebook can track your activities on websites and your browser can track your clicks on your PC or phone, the X-API lets products like the learning record store keep track of all your digital activities at work.
3) As content grows in volume, it is falling into two categories: micro-learning and macro-learning.
4) Work Has Changed, Driving The Need for Continuous Learning
Why is all the micro learning content so important? Quite simply because the way we work has radically changed. We spend an inordinate amount of time looking for information at work, and we are constantly bombarded by distractions, messages, and emails.
5) Spaced Learning Has Arrived
If we consider the new world of content (micro and macro), how do we build an architecture that teaches people what to use when? Can we make it easier and avoid all this searching?
“spaced learning.”
Neurological research has proved that we don’t learn well through “binge education” like a course. We learn by being exposed to new skills and ideas over time, with spacing and questioning in between. Studies have shown that students who cram for final exams lose much of their memory within a few weeks, yet students who learn slowly with continuous reinforcement can capture skills and knowledge for decades.
6) A New Learning Architecture Has Emerged: With New Vendors To Consider
One of the keys to digital learning is building a new learning architecture. This means using the LMS as a “player” but not the “center,” and looking at a range of new tools and systems to bring content together.
On the upper left is a relatively new breed of vendors, including companies like Degreed, EdCast, Pathgather, Jam, Fuse, and others, that serve as “learning experience” platforms. They aggregate, curate, and add intelligence to content, without specifically storing content or authoring in any way. In a sense they develop a “learning experience,” and they are all modeled after magazine-like interfaces that enables users to browse, read, consume, and rate content.
The second category the “program experience platforms” or “learning delivery systems.” These companies, which include vendors like NovoEd, EdX, Intrepid, Everwise, and many others (including many LMS vendors), help you build a traditional learning “program” in an open and easy way. They offer pathways, chapters, social features, and features for assessment, scoring, and instructor interaction. While many of these features belong in an LMS, these systems are built in a modern cloud architecture, and they are effective for programs like sales training, executive development, onboarding, and more. In many ways you can consider them “open MOOC platforms” that let you build your own MOOCs.
The third category at the top I call “micro-learning platforms” or “adaptive learning platforms.” These are systems that operate more like intelligent, learning-centric content management systems that help you take lots of content, arrange it into micro-learning pathways and programs, and serve it up to learners at just the right time. Qstream, for example, has focused initially on sales training – and clients tell me it is useful at using spaced learning to help sales people stay up to speed (they are also entering the market for management development). Axonify is a fast-growing vendor that serves many markets, including safety training and compliance training, where people are reminded of important practices on a regular basis, and learning is assessed and tracked. Vendors in this category, again, offer LMS-like functionality, but in a way that tends to be far more useful and modern than traditional LMS systems. And I expect many others to enter this space.
Perhaps the most exciting part of tools today is the growth of AI and machine-learning systems, as well as the huge potential for virtual reality.
7) Traditional Coaching, Training, and Culture of Learning Has Not Gone Away
8) A New Business Model for Learning
he days of spending millions of dollars on learning platforms is starting to come to an end. We do have to make strategic decisions about what vendors to select, but given the rapid and immature state of the market, I would warn against spending too much money on any one vendor at a time. The market has yet to shake out, and many of these vendors could go out of business, be acquired, or simply become irrelevant in 3-5 years.
9) The Impact of Microsoft, Google, Facebook, and Slack Is Coming
The newest versions of Microsoft Teams, Google Hangouts and Google Drive, Workplace by Facebook, Slack, and other enterprise IT products now give employees the opportunity to share content, view videos, and find context-relevant documents in the flow of their daily work.
We can imagine that Microsoft’s acquisition of LinkedIn will result in some integration of Lynda.com content in the flow of work. (Imagine if you are trying to build a spreadsheet and a relevant Lynda course opens up). This is an example of “delivering learning to where people are.”
10) A new set of skills and capabilities in L&D
It’s no longer enough to consider yourself a “trainer” or “instructional designer” by career. While instructional design continues to play a role, we now need L&D to focus on “experience design,” “design thinking,” the development of “employee journey maps,” and much more experimental, data-driven, solutions in the flow of work.
lmost all the companies are now teaching themselves design thinking, they are using MVP (minimal viable product) approaches to new solutions, and they are focusing on understanding and addressing the “employee experience,” rather than just injecting new training programs into the company.
how data is produced, collected and analyzed. make accessible all kind of data and info
ask good q/s and find good answers, share finding in meaningful ways. this is where digital literacy overshadows information literacy and this the fact that SCSU library does not understand; besides teaching students how to find and evaluate data, I also teach them how to communicate effectively using electronic tools.
connecting people tools and resources and making it easier for everybody. building collaborative, open and interdisciplinary
robust data computational literates. developing workshops, project and events to practice new skills. to position the library as the interdisciplinary nexus
what are data: definition. items of information, facts, traces of content and form. higher level, conception discussion about data in terms of social effects: matadata capturing information about the world, social political and economic changes. move away the mystic conceptions about data. nothing objective about data.
the emergence of IoT – digital meets physical. cyber physical systems. smart objects driven by industry. . proliferation of sensor and device – smart devices.
what does privacy looks like ? what is netneutrality when IoT? library must restructure : collaborate across institutions about collections of data in opien and participatory ways. put IoT in the hands of make and break things (she is maker space aficionado)
make and break things hackathons – use cheap devices such as Arduino and Pi.
data literacy programs with higher level conception exploration; libraries empower the campus in data collection. data science norms, store and share data to existing repositories and even catalogs. commercial services to store and connect data, but very restrictive and this is why libraries must be involved.
linked data and dark data
linked data – draw connections around online data most of the data are locked. linked data uses metadata to link related information in ways computers can understand.
libraries take advantage of link data. link data opportunity for semantics, natural language processing etc. if hidden data is relative to our communities, it is a library responsibility to provide it. community data practitioners
dark data
massive data, which cannot be analyzed by relational processing. data not yield significant findings. might be valuable for researchers: one persons trash is another persons’ treasure. preserving data and providing access to info. collaborate with researchers across disciplines and assist decide what is worth keeping and what discarding and how to study.
rich learning experience working with lined and dark data enable fresh perspective and learning how to work with data architecture. data literacy programming.
in context of data is different from open source and open projects. the social side of data science . advising researchers on navigation data, ethical compilations.
open science movement .https://cos.io/ pushing beyond licences and reframe, position ourselves as collaborators
analysis and publishing ; use tools that can be shared and include data, code and executable files.
reproducibility and contestability https://www.lib.ncsu.edu/events/series/summer-of-open-science
In the age of Big Data, there is an abundance of free or cheap data sources available to libraries about their users’ behavior across the many components that make up their web presence. Data from vendors, data from Google Analytics or other third-party tracking software, and data from user testing are all things libraries have access to at little or no cost. However, just like many students can become overloaded when they do not know how to navigate the many information sources available to them, many libraries can become overloaded by the continuous stream of data pouring in from these sources. This session will aim to help librarians understand 1) what sorts of data their library already has (or easily could have) access to about how their users use their various web tools, 2) what that data can and cannot tell them, and 3) how to use the datasets they are collecting in a holistic manner to help them make design decisions. The presentation will feature examples from the presenters’ own experience of incorporating user data in decisions related to design the Bethel University Libraries’ web presence.
silos, IT barrier, focusing on student success, retention, server space is cheap, if
promotion and tenure for faculty can include incentive to work with the librarian
lack of fear, changing the mindset.
deep collaboration both within and cross-consortia
don’t rely on vendor solutions. changing mindset
development = oppty (versus development as “work”)
private higher education is PALNI
3d virtual picture of disastrous areas. unlock the digital information to be digitally accessible to all people who might be interested.
they opened the maps of Katmandu for the local community and they were coming up with the strategies to recover. democracy in action
i can’t stop thinking that the keynote speaker efforts are mere follow up of what Naomi Klein explains in her Shock Doctrine: http://www.naomiklein.org/shock-doctrine: a government country seeks reasons to destroy another country or area and then NGOs from the same country go to remedy the disasters
A question from a librarian from the U about the use of drones. My note: why did the SCSU library have to give up its drone?
Douglas County Library model. too resource intensive to continue
Marmot Library Network
ILS integrated library system – shared with other counties, same sever for the entire consortium. they have a programmer, viewfind, open source, discovery player, he customized viewfind community to viewfind plus. instead of using the ILS public access catalogue, they are using the Vufind interface
Caiifa Enki. public library – single access collection. they purchase ebooks from the publisher and they are using also the viewfind interface. but not integrated with the library catalogs. Kansas public library went from OverDrive to Viewfind. CA State library is funding for the time being this effort.
types of content – publisher will not understand issue, which clear for librarians
PDF and epub formats
purchase content –
title by title selection – academia is tired of selections. although it is intended to buy also collections
library – owned ( and shared collections)
host content from libraries – papers in academic lib, genealogy in pub lib.
options in license models .
e resource content. not only ebooks, after it is taken care of, add other types of digital objects.
instead of replicate, replacement of the commercial aggregators,
Amigos Shelf interface is the product of the presenter
instead of having a young reader collection as SCSU has on the third floor, an academic library is outsourcing through AMigos shelf ebooks for young readers
Harper Collins is too cumbersome and the reason to avoid working with them.
security issues. some of the material sent over ftp and immediately moved to sftp
decisions – use of internal resources only, if now – amazon
programmer used for the pilot. contracted programmers. lack of the ability to see the large picture. eventually hired a full time person, instead of outsourcing. RDA compliant MARC.
ONIX, spreadsheet MARC.
Decision about who to start with : public or academic.
attempt to keep pricing down –
own agreement with the customers, separate from the agreement with the Publisher
current development: web-based online reading, shared-consortial collections and SIP2 authentication
Seidel, V. P., & Fixson, S. K. (2013). Adopting Design Thinking in Novice Multidisciplinary Teams: The Application and Limits of Design Methods and Reflexive Practices: Adopting Design Thinking in Novice Teams. Journal of Product Innovation Management, 30, 19–33. https://doi.org/10.1111/jpim.12061
Razavi, M. N., & Iverson, L. (2007). Designing for privacy in personal learning spaces. New Review Of Hypermedia & Multimedia, 13(2), 163-185. doi:10.1080/13614560701709861
Jung, I., & Latchem, C. (2011). A model for e-education: Extended teaching spaces and extended learning spaces. British Journal Of Educational Technology, 42(1), 6-18. doi:10.1111/j.1467-8535.2009.00987.x
disconnects into three categories—technology, policy, and unexploited opportunities—and discuss ways academic libraries can create next-generation landscapes to address these gaps.
Most library information systems and discovery tools are not easy to customize and remain substantially limited by an enduring library obsession with individual privacy and copyright.
Technology Disconnects
Some of the key technology disconnects between libraries and current online communities include:
Libraries lack tools to support the creation of new-model digital scholarship and to enable the use of Web services frameworks to support information reformatting (for example, RSS) and point-of-need Web-based assistance (multimedia tutorials or instant messaging assistance).
Dogmatic library protection of privacy inhibits library support for file-sharing, work-sharing, and online trust-based transactions that are increasingly common in online environments, thus limiting seamless integration of Web-based services.
Ubiquitous handheld access is more prominent thanks to digital lifestyle devices such as smart phones and iPods, yet libraries still focus on digital content for typical desktop PCs.
Policy Disconnects
Drawing a clear line between technology and policy can be difficult. For example, how many of the characteristics of current libraries (identified by the list below) are driven purely by technology or by policy? These traits include:
Mainly electronic text-based collections with multimedia content noticeably absent
Constructed for individual use but requires users to learn from experts how to access and use information and services
Library presence usually “outside” the main online place for student activity (MySpace, iTunes, Facebook, the campus portal, or learning management system)
Similarly, a policy solution might be required to address the following types of disconnects between libraries and online users:
Deliberately pushing library search tools into other environments such as learning management systemsor social network infrastructure and, conversely, integrating popular external search tools into library frameworks (such as Google Scholar and MS Academic Live Search or LibX.org)
Libraries linking and pointing to larger sets of open-access data that add context to their local collections
Restructuring access to reflect use instead of library organizational structure
Opportunity Disconnects
What is your library doing to:
Support the user’s affinity for self-paced, independent, trial-and-error methods of learning?
Create opportunities to make library information look and behave like information that exists in online entertainment venues?
Explore alternative options for delivering information literacy skills to users in online environments and alternate spaces?
Apply the typical user’s desire for instant gratification to the ways that libraries could be using technology for streamlined services?
Redefine administrative, security, and policy restrictions to permit online users an online library experience that rivals that of a library site visit?
Preserve born-digital information?
The promise of seamlessness that stems from ubiquitous computing access and instantly available networked information is, unfortunately, stifled significantly within the libraries of today.
Faculty perceive undergraduates to be less proficient with digital literacy skills. One-third think
their students do not find or organize digital information very well. The majority (52%) think
they lack skill in validating digital information. My note: for the SCSU librarians, digital literacy is fancy word for information literacy. Digital literacy, as used in this report is much greater area, which encompasses much broader set of skills
Faculty do not prefer to teach online (57%) or in a hybrid format (where some sessions occur
online, 32%). One-third of faculty reported no experience with these least popular course types
my note: pay attention to the questions asked; questions I am asking Mike Penrod to let me work with faculty for years. Questions, which are snubbed by CETL and a dominance of D2L and MnSCU mandated tools is established.
Table 5. Do you use these in-class technologies for teaching undergraduates? Which are the Top 3 in-class technologies you would like to learn or use more? (n = 442)
usingonline resourcesto find high quality curricular materials
37%
48%
31%
3%
18%
iClickers
24%
23%
16%
9%
52%
otherpresentation tool (Prezi, Google presentation, Slide Carnival, etc.)
23%
14%
21%
15%
51%
whiteboard / blackboard
20%
58%
23%
6%
14%
Powerpoint or Keynote
20%
74%
16%
4%
5%
document camera / overhead projector
15%
28%
20%
14%
38%
Table 6. Do you have undergraduates use these assignment technology tools? Which are your Top 3 assignment technology tools to learn about or use more? (n = 432)
D2Lasa portal to other learning tools (homework websites, videos, simulations, Nota Bene/NB, Voice Thread, etc.)
21%
28%
18%
11%
42%
videos/animationsproducedelsewhere
19%
40%
36%
2%
22%
In both large and small classes, the most common responses faculty make to digital distraction are to discuss why it is a problem and to limit or ban phones in class. my note: which completely defies the BYOD and turns into empty talk / lip service.
Quite a number of other faculty (n = 18) reported putting the onus on themselves to plan engaging and busy class sessions to preclude distraction, for example:
“If my students are more interested in their laptops than my course material, I need to make my curriculum more interesting.”
I have not found this to be a problem. When the teaching and learning are both engaged/engaging, device problems tend to disappear.”
The most common complaint related to students and technology was their lack of common technological skills, including D2L and Google, and needing to take time to teach these skills in class (n = 14). Two commented that digital skills in today’s students were lower than in their students 10 years ago.
Table 9. Which of the following are the most effective types of learning opportunities about teaching, for you? Chose your Top 2-3. (n = 473)
Count Percentage
meeting 1:1 with anexpert
296
63%
hour-longworkshop
240
51%
contact an expert on-call (phone, email, etc)
155
33%
faculty learning community (meeting across asemester,
e.g. ASSETT’s Hybrid/Online Course Design Seminar)
116
25%
expert hands-on support for course redesign (e.g. OIT’s Academic Design Team)
114
24%
opportunityto apply for grant funding with expert support, for a project I design (e.g. ASSETT’s Development Awards)
97
21%
half-dayorday-longworkshop
98
21%
other
40
8%
multi-day retreats/ institutes
30
6%
Faculty indicated that the best times for them to attend teaching professional developments across the year are before and early semester, and summer. They were split among all options for meeting across one week, but preferred afternoon sessions to mornings. Only 8% of respondents (n = 40) indicated they would not likely attend any professional development session (Table 10).
Table T1: Faculty beliefs about using digital technologies in teaching
Count
Column N%
Technology is a significant barrier to teaching and learning.
1
0.2%
Technology can have a place in teaching, but often detracts from teaching and learning.
76
18.3%
Technology has a place in teaching, and usually enhances the teaching learning process.
233
56.0%
Technology greatly enhances the teaching learning process.
106
25.5%
Table T2: Faculty beliefs about the impact of technology on courses
Count
Column N%
Makes a more effective course
302
72.6%
Makes no difference in the effectiveness of a course
42
10.1%
Makes a less effective course
7
1.7%
Has an unknown impact
65
15.6%
Table T3: Faculty use of common technologies (most frequently selected categories shaded)
Once a month or less
A few hours a month
A few hours a week
An hour a day
Several hours a day
Count
%
Count
%
Count
%
Count
%
Count
%
Computer
19
4.8%
15
3.8%
46
11.5%
37
9.3%
282
70.7%
Smart Phone
220
60.6%
42
11.6%
32
8.8%
45
12.4%
24
6.6%
Office Software
31
7.8%
19
4.8%
41
10.3%
82
20.6%
226
56.6%
Email
1
0.2%
19
4.6%
53
12.8%
98
23.7%
243
58.7%
Social Networking
243
68.8%
40
11.3%
40
11.3%
23
6.5%
7
2.0%
Video/Sound Media
105
27.6%
96
25.2%
95
24.9%
53
13.9%
32
8.4%
Table T9: One sample t-test for influence of technology on approaches to grading and assessment
Test Value = 50
t
df
Sig. (2-tailed)
Mean Difference
95% Confidence Interval of the Difference
Lower
Upper
In class tests and quizzes
-4.369
78
.000
-9.74684
-14.1886
-5.3051
Online tests and quizzes
5.624
69
.000
14.77143
9.5313
20.0115
Ungraded assessments
1.176
66
.244
2.17910
-1.5208
5.8790
Formative assessment
5.534
70
.000
9.56338
6.1169
13.0099
Short essays, papers, lab reports, etc.
2.876
70
.005
5.45070
1.6702
9.2312
Extended essays and major projects or performances
1.931
69
.058
3.67143
-.1219
7.4648
Collaborative learning projects
.000
73
1.000
.00000
-4.9819
4.9819
Table T10: Rate the degree to which your role as a faculty member and teacher has changed as a result of increased as a result of increased use of technology
Strongly Disagree
Disagree
Somewhat Disagree
Somewhat Agree
Agree
Strongly Agree
Count
%
Count
%
Count
%
Count
%
Count
%
Count
%
shifting from the role of content expert to one of learning facilitator
12
9.2%
22
16.9%
14
10.8%
37
28.5%
29
22.3%
16
12.3%
your primary role is to provide content for students
14
10.9%
13
10.1%
28
21.7%
29
22.5%
25
19.4%
20
15.5%
your identification with your University is increased
23
18.3%
26
20.6%
42
33.3%
20
15.9%
12
9.5%
3
2.4%
you have less ownership of your course content
26
20.2%
39
30.2%
24
18.6%
21
16.3%
14
10.9%
5
3.9%
your role as a teacher is strengthened
13
10.1%
12
9.3%
26
20.2%
37
28.7%
29
22.5%
12
9.3%
your overall control over your course(s) is diminished
23
17.7%
44
33.8%
30
23.1%
20
15.4%
7
5.4%
6
4.6%
Table T14: One sample t-test for influence of technology on faculty time spent on specific teaching activities
Test Value = 50
t
df
Sig. (2-tailed)
Mean Difference
95% Confidence Interval of the Difference
Lower
Upper
Lecturing
-7.381
88
.000
-12.04494
-15.2879
-8.8020
Preparing course materials
9.246
96
.000
16.85567
13.2370
20.4744
Identifying course materials
8.111
85
.000
13.80233
10.4191
17.1856
Grading / assessing
5.221
87
.000
10.48864
6.4959
14.4813
Course design
12.962
94
.000
21.55789
18.2558
24.8600
Increasing access to materials for all types of learners
Social media has the potential to facilitate much closer relationships between libraries and their patrons. Current usage of social media by the library community generally remains ad hoc and somewhat experimental, but the uptake of these tools is accelerating, and they will likely play an increasingly important role in library service provision and outreach in the future. Taylor & Francis has produced a white paper that analyzes current practices relating social media’s use in the library and how this differs by librarian job role. The sample was taken from academic librarians around the world, which also allows us to examine differences by geographic location. The goal: to establish how librarians are currently using social media in their roles, the most useful social media tools and best applications for these tools in a library setting.
explores a variety of social media tools in terms of how they can be used to organize information and communities. Together, you will survey and use a variety of social media tools, such as Delicious, Diigo, Facebook, Goodreads, Google Hangouts, LibraryThing, Pinterest, Storify, Twitter, and more! You will also explore how social media tools can be used to organize and disseminate information and how they can be used to foster and sustain communities of learning.
With the widespread use of library technology that incorporates social media components, intelligent objects, and knowledge-sharing tools comes the ability of libraries to provide greater opportunities for patron engagement in those discovery systems through user-generated content. These features may include the ability of users to contribute commentary such as reviews, simple point-and-click rating systems (e.g. one star to five stars), or to engage in extensive discussions or other social interactions. This kind of content could transform authoritative files, alter information architecture, and change the flow of information within the library discovery system.
Across generations, concerns for privacy may dissipate with time as specific technologies take hold or as people become aware of a technology’s benefits and value those over their value for privacy.
Library Privacy Guidelines for Students in K-12 Schools