textbook model

Fixing the Textbook Model

Indiana University’s Brad Wheeler explains how his institution is ditching the college textbook and replacing it with digital alternatives that are accessible to students from day one.

By Dian Schaffhauser 06/21/17

https://campustechnology.com/articles/2017/06/21/fixing-the-textbook-model.aspx

Brad Wheeler, the vice president for IT and CIO of Indiana University

it’s taken a long time for textbook publishers to own up to the “fundamental flaw” of their industry: “They are obsessed with counting their gross margins on the things they actually do sell.” And, he added, they ignore the enormous amounts they lose through the other 75 percent of the market made up of used and rented books and other kinds of substitutes. Because of those blinders, the publishers have “long pursued a model that has been failing, year over year.”

Starting in the mid-1990s, the price of educational books rose faster than just about any other measure, including healthcare. Something had to give. Wheeler has seen a “constellation of things” forming to bring about change. First, the e-reader software has matured, he said. “It works on your phone, your tablet, your laptop.”

Second, students are “increasingly digital.” They’re “comfortable with interacting with digital information [and] electronically marking it up.” After all, he noted, “some of them went through high school with digital books and materials.”

Third, familiarity is growing among faculty too. “They see e-texts not just as a substitute for paper, but as a teaching and pedagogical tool. They can go in and annotate that paragraph in the textbook and point to classroom materials or go online and correct something,

Fourth, the printed textbook-first philosophy has stopped paying off for publishers.

The three biggies — Pearson, McGraw-Hill and Cengage — weren’t first in line to sign on, even as additional universities piled onto Indiana U’s project. As a result, their reticence to promote textbook alternatives hit their bottom lines. Eventually, Pearson’s shares took a hit, hovering currently around $8; McGraw-Hill’s education division was peeled off and sold to Apollo Global Management in 2013; and just months later Cengage filed for bankruptcy, emerging a year later with $4 billion less debt.

the College Board decreased the undergraduate student budget for books and supplies in its “Trends in College Pricing” report.

Indiana U has seen nothing but growth for its IU eTexts digital initiative:

Unizin. This is the organization created by Indiana U and other large institutional partners to develop services that could replace major paid third-party applications, such as learning management, digital textbook and data warehouse platforms. The goal: to enable higher ed to own its data.

++++++++++++++++++
more on open text book in this IMS blog
https://blog.stcloudstate.edu/ims/2016/04/06/e-textbook-ad-hoc-team/

app smashing

My note:
#appsmashing must be the evolution of the ~ 2010 #mashup

appsmashing

from: http://www.zigzagstech.com/app-smashing

http://k12technology.weebly.com/app-smashing.html

App Smashing is the process of using multiple apps to create projects or complete tasks. App Smashing can provide your students with creative and inspired ways to showcase their learning and allow you to assess their understanding and skills.

6 Amazing App Smash Examples to Inspire Creativity

http://edtechteacher.org/unleashing-creativity-greg-kulowiec-app-smashing-from-beth-holland/

https://padlet.com/lmoore4/72nzkwdipo5y

Why App Smash?

What is an App Smash?

Content created in one app transferred to and enhanced by a second app and sometimes third. Preferably the final product is then published to the web – remember, digital presence is the new résumé (CV).

Reasons to App Smash:

  1. It demands creative thinking
  2. It demands more from the technology (value for money)
  3. It turns the issue of not having a ‘wonder app’ into a positive
  4. It removes any restrictions to take a topic as far as it can be taken.
  5. It often results in more engaging learning products
  6. It’s a fun challenge for ‘digital natives’

Key rules for successful App Smashing:

  1. Use the Camera Roll as your main conduit between apps
  2. Leave the app choice to the students
  3. Have a list of apps capable of smashing content together (See below)

19 Apps to Bring App Smashing to Your Classroom

 

TELLAGAMI, 

GREEN SCREEN DOINK 

YAKIT KIDS AND CHATTERPIX

EDUCREATIONS AND DOCERI 

BOOK CREATOR 

GOOGLE DOCS, SLIDES 

STRIP CREATOR 

SCOODLEJAM 

HELLO CRAYON 

GOOGLE DRAWING 

TOONTASTIC

PUBLISHING

thinglink, youtube, padlet, seesaw, realtimes,

K12 cyber incidents

K–12 Cyber Incidents Have Been Increasing in 2017

The creator of a national K–12 Cyber Incident Map warns that schools should act now, not later, to bolster their security.

By Richard Chang 06/08/17

https://thejournal.com/articles/2017/06/08/k12-cyber-incidents-have-been-increasing-in-2017.aspx

Ed Tech Strategies' K–12 Cyber Incident Map. Courtesy of Doug Levin.

K–12 Cyber Incident Map , Doug Levin, president of Ed Tech Strategies

Levin has been tracking the publicly disclosed K–12 incidents on a color-coded map on his website, edtechstrategies.com. His sources include media reports, DataBreaches.net and the Privacy Rights Clearinghouse.

In a post published this week on the newly revamped Ferpa Sherpa education privacy site, Levin argues that not only have schools been “experiencing an increasing number of cyber incidents,” but “the range of cyber threats affecting schools appears to be diverse and shifting over time.”

K12 cyber incidents 2016 to present

concrete steps schools can take to improve their security, such as:

  • Use special software or hardware to protect data;
  • Create better password and authorization policies;
  • Use secondary authentication methods;
  • Train school staff, particularly about phishing and downloading of unfamiliar files; and
  • Hire more staff with IT security expertise.

++++++++++++++++++++
more on cyber security in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

digital learning faculty support

Report: Faculty Support Lacking for Wide Adoption of Digital Learning

By Dian Schaffhauser 06/19/17

https://campustechnology.com/articles/2017/06/19/faculty-support-lacking-for-wide-adoption-of-digital-learning.aspx

new report produced by Tyton Partners in collaboration with the Babson Survey Research Group. two fall 2016 surveys of a national sample of 3,500 postsecondary respondents.

extent of digital learning implementation in support of strategic priorities

These gaps and others “suggest a disconnect, the report stated, “between the impacts that many administrators perceive and the reality of how digital learning is changing the market.” Open-ended responses suggested that expectations for the impact of digital learning were “set too high” or weren’t being “measured or communicated well.” Another common refrain: There’s inadequate institutional support.

While most administrators told researchers that “faculty are crucial to the success of digital learning initiatives — serving as both a bolster and a barrier to implementation success,” the resources for supporting faculty to implement digital learning are insufficient. Just a quarter of respondents said faculty professional development was implemented “effectively and at scale.” Thirty-five percent said implementation was in progress. And a third (33 percent) reported that faculty professional development was “incomplete, inconsistent, informal and/or optional.”

The report offered recommendations for improving and expanding digital learning adoption. Among the guidance:

  • Get realistic. While the data suggested that digital learning could improve scheduling flexibility and access, among other benefits, schools need to identify which goals are most important and “clearly articulate how and to what extent its digital learning programs are expected to help.”
  • Measure impact and broadcast it. Forget about small pilots; go for a scale that will demonstrate impact and then share the findings internally and with other institutions.
  • Use buying power to influence the market. Connect faculty with vendors for “education, product discovery and feedback.” Insist on accessibility within products, strong integration features and user friendliness.
  • Prepare faculty for success. Make sure there are sufficient resources and incentives to help faculty “buy into the strategy” and follow through on implementation.

++++++++++++++++++
more on digital learning in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+learning

VR chemistry

MEL Science Launches Virtual Reality Chemistry Lessons

By Richard Chang 06/15/17

https://thejournal.com/articles/2017/06/15/mel-science-launches-virtual-reality-chemistry-lessons.aspx

MEL Science, based in London, has launched a series of virtual reality (VR) chemistry lessons for K–12. The 3-year-old company this week released a MEL Chemistry VR app, featuring a virtual chemistry lab, for free on Google Daydream. This free version, which contains the first six chemistry lessons, is available at this MEL Science site.

MEL Science aims to release more than 150 lessons covering all the main topics included in K–12 schools’ chemistry curriculum. Later this year, MEL Science also aims to add support for other VR platforms, including Google Cardboard and Samsung Gear VR.

+++++++++++++++++++
more on VR in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=virtual+reality

GradeCraft

University of Michigan Commercializes Gameful Learning Tool

By Rhea Kelly 06/20/17

https://campustechnology.com/articles/2017/06/20/university-of-michigan-commercializes-gameful-learning-tool.aspx

GradeCraft, the software uses gaming elements such as competition, badges and unlocks to help students progress through their courses.

GradeCraft was co-developed in 2012 by Barry Fishman, professor at the University of Michigan’s Schools of Information and Education, and Caitlin Holman, doctoral candidate in the School of Information and lead software developer at Office of Academic Innovation‘s Digital Innovation Greenhouse. The project was recognized with a Campus Technology Innovators award in 2016.

The University of Arizona has become one of the first universities to purchase a site license for GradeCraft.

++++++++++++++++++
more on gamification in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=gamification

microcredentials

What You Need to Know About Microcredentials

ELI Online Event | July 12, 2017 | Noon–4:00 p.m. (ET)

One in five colleges have issued digital badges, according to a recent survey.* Today, all kinds of organizations, from higher education institutions to professional associations to employers, are issuing digital microcredentials. Are you?

Join us for “Microcredentials and Digital Badging in Higher Education,” where expert presenters from various higher education, industry, and government fields will explore today’s issues. Here are just a few highlights:

Join us for an introductory webinar, “Alternative Credentialing in Higher Education,” on July 10. Both events are free and open to all EDUCAUSE members (available to purchase for nonmembers).

Register Now →

++++++++++++++++++++
more about badges and microcredentials
https://blog.stcloudstate.edu/ims?s=badges

library website content strategy

Developing a Website Content Strategy

Instructor: Shoshana Mayden, Dates: July 3-28, 2017
http://libraryjuiceacademy.com/049-content-strategy.php

Shoshana Mayden is a content strategist with the University of Arizona Libraries in Tucson, Arizona. She advises on issues related to website content and contributes to developing a content strategy across multiple channels for the library. She works with content managers and library stakeholders to re-write, re-think and re-organize content for the main library website, as well as develop workflows related to the lifecycle of content. She also a copy editor for Weave: the Journal of Library User Experience.

++++++++++++++++++++++++

Information Architecture: Designing Navigation for Library Websites

Instructor: Laura-Edythe Coleman

http://libraryjuiceacademy.com/046-designing-navigation.php

Information Architecture is an essential component of user-centered design of information spaces, especially websites. Website navigation is a key design device to help users search and browse library websites and information systems. The design of Website navigation can be simple or complex, flat or deep. In all cases, website navigation should take into account information architecture (IA) best practices, common user tasks in the library domain, user research, analytics and information seeking models.

Laura-Edythe Coleman is a Museum Informaticist: her focus is on the point of convergence for museums, information, people, and technology. Knowing that societies need museums for creating and sustaining cultural memory, she strives to help communities co-create heritage collections with museums. She holds a PhD in Information Science, a Masters of Library and Information Science and a Bachelors of Fine Arts. She can be reached via Twitter: @lauraedythe, website: http://www.lauraedythe.com, or by email lauraedythecoleman@gmail.com

+++++++++++++++++++++++++

Content Strategy for Library Websites from Rebecca Blakiston
http://www.academia.edu/12370418/Content_Strategy_for_Library_Websites 
https://steadfastlibrarian.wordpress.com/2012/06/27/211/
https://connect.library.utoronto.ca/download/attachments/25199917/2013_-__-_DevelopingaContentStrategyforanAcademicLibraryWebs%5Bretrieved-2015-11-17%5D.pdf
https://www.researchgate.net/publication/271758861_Developing_a_Content_Strategy_for_an_Academic_Library_Website
+++++++++++++++++++++
Other resources: 
http://guiseppegetto.com/ux-content-strategy-library/

+++++++++++++++++
more on Libary web site in this IMS blog
https://www.lib.umich.edu/blog-tags/web-content-strategy
https://blog.stcloudstate.edu/ims?s=library+web+page

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

5 ways to use the Internet of Things in higher ed

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
https://blog.stcloudstate.edu/ims?s=internet+of+things
https://blog.stcloudstate.edu/ims?s=iot 

Social Media Etiquette Ethics

Social Media Etiquette & Ethics: A Guide for Personal, Professional & Brand Use.

Published on , Marketing Professor & Researcher

https://www.linkedin.com/pulse/social-media-etiquette-ethics-guide-personal-brand-use-quesenberry

definition:

Etiquette is the proper way to behave and Ethics studies ideas about good and bad behavior. Both combine into Professionalism, which is the skill, good judgment, and polite behavior expected from a person trained to do a job such as social media marketing. Because social media blurs the lines between our personal and professional lives it is useful to look at actions in social media from three perspectives: Personal (as an individual), Professional (as an employee or perspective employee) and Brand (as an organization). To simplify the discussion I have created questions for each category in the Social Media Etiquette and Ethics Guide below. Click here to download.

Before you post or comment in a personal capacity consider:

  1. Is it all about me? No one likes someone who only talks about themselves. The same applies in social media. Balance boasting with complimenting.
  2. Am I stalking someone? It is good to be driven and persistent but be careful not to cross the line into creepy. Don’t be too aggressive in outreach.
  3. Am I spamming them? Not everything or even the majority of what you post should ask for something. Don’t make everything self-serving.
  4. Am I venting or ranting? Venting and ranting may feel good, but research says it doesn’t help and no matter how justified you feel, it never presents you in a positive light. Do not post negative comments or gossip.
  5. Did I ask before I tagged? You had a great time and want to share those memories, but your friends, family or employer may have different standards than a friends. Check before you tag people in posts.
  6. Did I read before commenting or sharing? Don’t make yourself look foolish by not fully reviewing something you are commenting on or sharing with others. Don’t jump to conclusions.
  7. Am I grateful and respectful? Don’t take people for granted. Respond and thank those who engage with you.
  8. Is this the right medium for the message? Not everything should be said in social media. Consider the feelings of the other person. Some messages should be given in person, by phone or email.
  9. Am I logged into the right account? There are too many corporate examples of embarrassing posts meant for personal jokes that went out on official brand accounts. Always double check which account you are on. Don’t post personal information on brand accounts.

Before you post or comment as a professional consider:

  1. Does it meet the Social Media Policy? Most organizations have official social media policies that you probably received when hired. Don’t assume you know what the policy says. Many employees have been fired for not following company social media regulations. Make sure you know and follow employer or client requirements.
  2. Does it hurt my company’s reputation? No matter how many disclaimers you put on your accounts such as “views are my own” certain content and behavior will negatively impact your employer. If your bio states where you work, your personal account represents your employer.
  3. Does it help my company’s marketing? Employee advocacy is an important strategy. Have a positive impact on your company’s image and when you can advocate for your brand in social.
  4. Would my boss/client be happy to see it? You may not have “friended” your boss or client but a co-worker may have and your post is only a share or screen grab away. Even private accounts are never fully private.
  5. Am I being open about who I work for? It is good to post positive content about your employer and it is nice to receive gifts, but if you are trying to pass it off as unbiased opinion that is wrong. Be transparent about your financial connections.
  6. Am I being fair and accurate? Everyone is entitled to their person opinion, but if your opinion tends to always be unfounded and seems to have an agenda it will reflect negatively upon you. Criticism is welcome when it is constructive and opinion is backed by evidence.
  7. Am I being respectful and not malicious? People can get very insensitive, judgmental and angry in social media posts. That does not convey a professional image. Don’t post what you wouldn’t say in person. Even an outburst in person fades in memory, but a malicious post is there forever.
  8. Does it respect intellectual property? Not everything on the Internet is free. Check for or get permission to post company or client brand assets and content.
  9. Is this confidential information? As an employee or contractor you are granted access to privileged and confidential information. Don’t assume it is fine to share. Do not disclose non-public company or client information.

Before posting or commenting as a brand on a social account consider:

  1. Does it speak to my target market? Social media is unique from traditional marketing and requires a different perspective to be effective. Be sure to focus on your target’s wants and needs not yours.
  2. Does it add value? Social media only works if people view and share it. Make your content educational, insightful or entertaining to grab interest and draw engagement.
  3. Does it fit the social channel? Don’t post content ideal for Twitter on Instagram or Reddit. Each channel has its own culture and community. Make sure each post fits the channel’s environment, mission and policies or standards.
  4. Is it authentic and transparent? Trying to trick people into clicking a link or making a purchase will get you nowhere. Don’t hide or exclude any relevant information.
  5. Is it real and unique? Bots can automate tasks and be a great time saver, but use them for the right actions. Don’t use auto responses and create anything that could be perceived as spam.
  6. Is it positive and respectful? It may be fine to talk trash about competitors or complain about customers in the office, but not in social media. Don’t badmouth the competition or customers.
  7. Does it meet codes of conduct? As professionals we are part of trade associations that set standards of conduct. Be sure you are meeting these ethical standards such as the Word of Mouth Marketing Association’s Code of Ethics.
  8. Does it meet all laws and regulations? Government has been catching up with social media and have issued regulations and laws you must follow. See guides on requirements like the FTC social media endorsement guidelines.
  9. Does it meet the Social Media Policy? Most likely your brand or a client’s brand has a social media policy. Ensure you follow your own company standards.

 

++++++++++++++
more on social media netiquette in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+netiquette

1 291 292 293 294 295 493