Searching for "social media"

Zygmunt Bauman

Zygmunt Bauman: “Social media are a trap”

The Polish-born sociologist is skeptical about the possibilities for political change

RICARDO DE QUEROL 25 ENE 2016 

https://elpais.com/elpais/2016/01/19/inenglish/1453208692_424660.html

Leeds University where he is now Emeritus Professor of Sociology.

his theory of liquid modernity in the late 1990s – which describes our age as one in which “all agreements are temporary, fleeting, and valid only until further notice” – he has become a leading figure in the field of sociology.

People no longer believe in the democratic system because it doesn’t keep its promises. We see this, for example, with the migration crisis: it’s a global phenomenon, but we still act parochially. Our democratic institutions were not designed for dealing with situations of interdependence. The current crisis of democracy is a crisis of democratic institutions.

If you want more security, you’re going to have to give up a certain amount of freedom; if you want more freedom, you’re going to have to give up security. This dilemma is going to continue forever. Forty years ago we believed that freedom had triumphed and we began an orgy of consumerism.

The situation in Catalonia, as in Scotland or Lombardy, is a contradiction between tribal identity and citizenship. They are Europeans, but they don’t want to talk to Brussels via Madrid, but via Barcelona. The same logic is emerging in almost every country. We are still following the same principles established at the end of World War I, but there have been many changes in the world.

Q. You are skeptical of the way people protest through social media, of so-called “armchair activism,” and say that the internet is dumbing us down with cheap entertainment. So would you say that the social networks are the new opium of the people?

A. The question of identity has changed from being something you are born with to a task: you have to create your own community. But communities aren’t created, and you either have one or you don’t. What the social networks can create is a substitute. The difference between a community and a network is that you belong to a community, but a network belongs to you. You feel in control.

Social media don’t teach us to dialogue because it is so easy to avoid controversy… But most people use social media not to unite, not to open their horizons wider, but on the contrary, to cut themselves a comfort zone where the only sounds they hear are the echoes of their own voice

+++++++++++
more on sociology in this IMS blog
https://blog.stcloudstate.edu/ims?s=sociology

Gen Z and the workforce

Gen Z is coming to your office. Get ready to adapt

Janet Adamy, Sept 6, 2018

https://www.wsj.com/graphics/genz-is-coming-to-your-office/

Early signs suggest Gen Z workers are more competitive and pragmatic, but also more anxious and reserved, than millennials, the generation of 72 million born from 1981 to 1996, according to executives, managers, generational consultants and multidecade studies of young people. Gen Zers are also the most racially diverse generation in American histor

With the generation of baby boomers retiring and unemployment at historic lows, Gen Z is filling immense gaps in the workforce. Employers, plagued by worker shortages, are trying to adapt.

LinkedIn Corp. and Intuit Inc. have eased requirements that certain hires hold bachelor’s degrees to reach young adults who couldn’t afford college. At campus recruiting events, EY is raffling off computer tablets because competition for top talent is intense.

Companies are reworking training so it replicates YouTube-style videos that appeal to Gen Z workers reared on smartphones.

“They learn new information much more quickly than their predecessors,”

A few years ago Mr. Stewart noticed that Gen Z hires behaved differently than their predecessors. When the company launched a project to support branch managers, millennials excitedly teamed up and worked together. Gen Z workers wanted individual recognition and extra pay.

diverse age group

 

Much of Gen Z’s socializing takes place via text messages and social media platforms—a shift that has eroded natural interactions and allowed bullying to play out in front of wider audiences.

The flip side of being digital natives is that Gen Z is even more adept with technology than millennials. Natasha Stough, Americas campus recruiting director at EY in Chicago, was wowed by a young hire who created a bot to answer questions on the company’s Facebook careers page.

To lure more Gen Z workers, EY rolled out video technology that allows job candidates to record answers to interview questions and submit them electronically.

LinkedIn, which used to recruit from about a dozen colleges, broadened its efforts to include hundreds of schools and computer coding boot camps to capture a diverse applicant pool that mirrors the changing population.

++++++++++
more on Gen Z in this IMS blog
https://blog.stcloudstate.edu/ims?s=gen+z

Russian manipulation Instagram

Russia’s election manipulation a bigger win on Instagram than on Facebook, report finds

RUSSIAN TROLLS USED MEME WARFARE

HOW RUSSIAN TROLLS USED MEME WARFARE TO DIVIDE AMERICA

NICHOLAS THOMPSON AND Issy Lapowsky 12.17.18

https://www.wired.com/story/russia-ira-propaganda-senate-report/

THERE’S A MEME on Instagram, circulated by a group called “Born Liberal.”  “Born Liberal” was a creation of the Internet Research Agency, the Russian propaganda wing

Conversations around the IRA’s operations traditionally have focused on Facebook and Twitter, but like any hip millennial, the IRA was actually most obsessive about Instagram.

the IRA deployed 3,841 accounts, including several personas that “regularly played hashtag games.” That approach paid off; 1.4 million people engaged with the tweets, leading to nearly 73 million engagements. Most of this work was focused on news, while on Facebook and Instagram, the Russians prioritized “deeper relationships,” according to the researchers. On Facebook, the IRA notched a total of 3.3 million page followers, who engaged with their politically divisive content 76.5 million times. Russia’s most popular pages targeted the right wing and the black community. The trolls also knew their audiences; they deployed Pepe memes at pages intended for right-leaning millennials, but kept them away from posts directed at older conservative Facebook users. Not every attempt was a hit; while 33 of the 81 IRA Facebook pages had over 1,000 followers, dozens had none at all.

The report also points out new links between the IRA’s pages and Wikileaks, which helped disseminate hacked emails from Clinton campaign manager John Podesta

Russian presence unrelated to the relatively small ad spend that Facebook executives pointed to as the story first unfolded, in what the report authors describe as an attempt to downplay the problem.

“While many people think of memes as “cat pictures with words,” the Defense Department and DARPA have studied them for years as a powerful tool of cultural influence, capable of reinforcing or even changing values and behavior.

“over the past five years, disinformation has evolved from a nuisance into high-stakes information war.” And yet, rather than fighting back effectively, Americans are battling each other over what to do about it.

++++++++++

memetic warfare:

https://en.wikipedia.org/wiki/Memetic_warfare

++++++++++

Is America Prepared for Meme Warfare?  Memes function like IEDs.

Jacob Siegel Jan 31 2017, 9:00am
https://motherboard.vice.com/en_us/article/xyvwdk/meme-warfare
https://soundcloud.com/motherboard/meme-warfare

A year after the Meme Warfare Center proposal was published, DARPA, the Pentagon agency that develops new military technology, commissioned a four-year study of memetics. The research was led by Dr. Robert Finkelstein, founder of the Robotic Technology Institute, and an academic with a background in physics and cybernetics.

Finkelstein’s study of “Military Memetics” centered on a basic problem in the field, determining “whether memetics can be established as a science with the ability to explain and predict phenomena.” It still had to be proved, in other words, that memes were actual components of reality and not just a nifty concept with great marketing.

+++++++++

++++++++++
more on social media in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media

Russian Influence Operations on Twitter

Russian Influence Operations on Twitter

Summary This short paper lays out an attempt to measure how much activity from Russian state-operated accounts released in the dataset made available by Twitter in October 2018 was targeted at the United Kingdom. Finding UK-related Tweets is not an easy task. By applying a combination of geographic inference, keyword analysis and classification by algorithm, we identified UK-related Tweets sent by these accounts and subjected them to further qualitative and quantitative analytic techniques.

We find:

 There were three phases in Russian influence operations : under-the-radar account building, minor Brexit vote visibility, and larger-scale visibility during the London terror attacks.

 Russian influence operations linked to the UK were most visible when discussing Islam . Tweets discussing Islam over the period of terror attacks between March and June 2017 were retweeted 25 times more often than their other messages.

 The most widely-followed and visible troll account, @TEN_GOP, shared 109 Tweets related to the UK. Of these, 60 percent were related to Islam .

 The topology of tweet activity underlines the vulnerability of social media users to disinformation in the wake of a tragedy or outrage.

 Focus on the UK was a minor part of wider influence operations in this data . Of the nine million Tweets released by Twitter, 3.1 million were in English (34 percent). Of these 3.1 million, we estimate 83 thousand were in some way linked to the UK (2.7%). Those Tweets were shared 222 thousand times. It is plausible we are therefore seeing how the UK was caught up in Russian operations against the US .

 Influence operations captured in this data show attempts to falsely amplify other news sources and to take part in conversations around Islam , and rarely show attempts to spread ‘fake news’ or influence at an electoral level.

On 17 October 2018, Twitter released data about 9 million tweets from 3,841 blocked accounts affiliated with the Internet Research Agency (IRA) – a Russian organisation founded in 2013 and based in St Petersburg, accused of using social media platforms to push pro-Kremlin propaganda and influence nation states beyond their borders, as well as being tasked with spreading pro-Kremlin messaging in Russia. It is one of the first major datasets linked to state-operated accounts engaging in influence operations released by a social media platform.

Conclusion

This report outlines the ways in which accounts linked to the Russian Internet ResearchAgency (IRA) carried out influence operations on social media and the ways their operationsintersected with the UK.The UK plays a reasonably small part in the wider context of this data. We see two possibleexplanations: either influence operations were primarily targeted at the US and British Twitterusers were impacted as collate, or this dataset is limited to US-focused operations whereevents in the UK were highlighted in an attempt to impact US public, rather than a concertedeffort against the UK. It is plausible that such efforts al so existed but are not reflected inthis dataset.Nevertheless, the data offers a highly useful window into how Russian influence operationsare carried out, as well as highlighting the moments when we might be most vulnerable tothem.Between 2011 and 2016, these state-operated accounts were camouflaged. Through manualand automated methods, they were able to quietly build up the trappings of an active andwell-followed Twitter account before eventually pivoting into attempts to influence the widerTwitter ecosystem. Their methods included engaging in unrelated and innocuous topics ofconversation, often through automated methods, and through sharing and engaging withother, more mainstream sources of news.Although this data shows levels of electoral and party-political influence operations to berelatively low, the day of the Brexit referendum results showed how messaging originatingfrom Russian state-controlled accounts might come to be visible on June 24th 2016, we believe UK Twitter users discussing the Brexit Vote would have encountered messages originating from these accounts.As early as 2014, however, influence operations began taking part in conversations aroundIslam, and these accounts came to the fore during the three months of terror attacks thattook place between March and June 2017. In the immediate wake of these attacks, messagesrelated to Islam and circulated by Russian state-operated Twitter accounts were widelyshared, and would likely have been visible in the UK.The dataset released by Twitter begins to answer some questions about attempts by a foreignstate to interfere in British affairs online. It is notable that overt political or electoralinterference is poorly represented in this dataset: rather, we see attempts at stirring societaldivision, particularly around Islam in the UK, as the messages that resonated the most overthe period.What is perhaps most interesting about this moment is its portrayal of when we as socialmedia users are most vulnerable to the kinds of messages circulated by those looking toinfluence us. In the immediate aftermath of terror attacks, the data suggests, social mediausers were more receptive to this kind of messaging than at any other time.

It is clear that hostile states have identified the growth of online news and social media as aweak spot, and that significant effort has gone into attempting to exploit new media toinfluence its users. Understanding the ways in which these platforms have been used tospread division is an important first step to fighting it.Nevertheless, it is clear that this dataset provides just one window into the ways in whichforeign states have attempted to use online platforms as part of wider information warfare
and influence campaigns. We hope that other platforms will follow Twitter’s lead and release
similar datasets and encourage their users to proactively tackle those who would abuse theirplatforms.

+++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

microcredentialing and students abilities

Badge breakthroughs

Micro-credentials awarded for in-demand skills give employers deeper detail about a student’s abilities.Matt Zalaznick. June 7, 2017
While employers increasingly demand that new hires have college degrees, the transcripts supporting those hard-earned credentials are no longer the most informative tool students have to exhibit their skills.

An estimated 1 in 5 institutions issue digital badges, which can be posted to social media, stored on digital portfolios and displayed by other specially designed platforms. When clicked on, the badge lists a range of skills a student has demonstrated beyond grades.

“The reason they’re taking off in higher education is most employers are not getting the information they need about people emerging from higher ed, with previous tools we’ve been using,” says Jonathan Finkelstein, founder and CEO of the widely used badging platform Credly. “The degree itself doesn’t get to level of describing particular competencies.”

For instance, a Notre Dame student who goes on a trip to Ecuador to build bridges can earn a badge for mastering the calculations involved in the construction, says G. Alex Ambrose, associate program director of e-portfolio assessment at the Indiana university’s Kaneb Center for Teaching & Learning.

Students can be pretty certain when they have passed calculus or creative writing, but they don’t always recognize when they’ve excelled in demonstrating soft skills such as critical thinking, communication and work ethic, says MJ Bishop, director of the system’s William E. Kirwan Center for Academic Innovation.

Badges have been most popular in the school of education—including with student teachers who, in turn, have created badges for the elementary and secondary classrooms where they’ve apprenticed, says Anna Catterson, the university’s educational technology director.

The campus library is another badging hotspot. Students there have earned microcredentials for research, 3D printing and other skills. These badges are being shared on LinkedIn and other platforms to obtain internships and scholarships.

The university runs faculty training sessions on badging and has established a review process for when faculty submit ideas for microcredentials.

One pothole to avoid is trying to create a schoolwide badge that’s standardized across a wide range of courses or majors. This can force the involvement of committees that can bog down the process, so it’s better to start with skills within single courses, says Ambrose at Notre Dame.

When creating a badge, system faculty have to identify a business or industry interested in that credential.

Badges that have the backing of a college or university are more impressive to job recruiters than are completion certificates from skill-building websites like Lynda.com.

Students won’t be motivated to earn a badge that’s a stock blue ribbon downloaded off the internet. Many institutions put a lot work into the design, and this can include harnessing expertise from the marketing department and graphic designers

+++++++++++
more on micro-credentialing in this IMS blog
https://blog.stcloudstate.edu/ims?s=microcredentialing

WhatsApp and fake news

The three types of WhatsApp users getting Brazil’s Jair Bolsonaro elected

https://www.theguardian.com/world/2018/oct/25/brazil-president-jair-bolsonaro-whatsapp-fake-news

Opinion | Fake News Is Poisoning Brazilian Politics. WhatsApp …

https://www.nytimes.com/2018/10/17/opinion/brazil-election-fake-news-whatsapp.html

Facebook’s WhatsApp flooded with fake news in Brazil election

https://www.reuters.com/article/us-brazil-election-whatsapp-explainer/facebooks-whatsapp-flooded-with-fake-news-in-brazil-election-idUSKCN1MU0UP

Viral WhatsApp Hoaxes Are India’s Own Fake News Crisis

Misinformation and political propaganda in the world’s largest democracy often go undetected — until they have brutal real-world impact.

https://www.buzzfeednews.com/article/pranavdixit/viral-whatsapp-hoaxes-are-indias-own-fake-news-crisis

WhatsApp fights fake news with Indian newspaper ads

The push follows the lynching of five men over fake messages.

BY SEAN KEANE JULY 10, 2018 2:37 AM PDT

https://www.cnet.com/news/whatsapp-fights-fake-news-with-indian-newspaper-ads/
++++++++++++
more on fake news and social media in this IMS blog
https://blog.stcloudstate.edu/ims?s=fake+news+social+media

Inclusive Design of Artificial Intelligence

EASI Free Webinar: Inclusive Design of Artificial Intelligence Thursday

October 25
Artificial Intelligence (AI) and accessibility: will it enhance or
impede accessibility for users with disabilities?
Artificial intelligence used to be all about the distance future, but it
has now become mainstream. It is already impacting us in ways we may not
recognize. It is impacting us today already. It is involved in search
engines. It is involved in the collecting of big data and analyzing it.
It is involved in all the arguments about the way social media is being
used to effect, or try to effect, our thinking and our politics. How
else might it play a role in the future of accessibility?
The webinar presenter: Jutta Treviranus at University of Toronto will
explore these questions in the webinar on Thursday, October 25 at 11
Pacific, noon Mountain, 1 central or 2 Eastern You can register now but
registration closes Wed. Oct. 24 at midnight Eastern.
You can register now on the web at https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Feasi.cc&data=01%7C01%7Cpmiltenoff%40STCLOUDSTATE.EDU%7C4afdbee13881489312d308d6383f541b%7C5e40e2ed600b4eeaa9851d0c9dcca629%7C0&sdata=O7nOVG8dbkDX7lf%2FR6nWJi4f6qyHklGKfc%2FaB8p4r5o%3D&reserved=0and look for the link
for webinars.
Those who register should get directions for joining sent late wednesday
or Early on Thursday.

+++++++++++
more on AI in this IMS blog
https://blog.stcloudstate.edu/ims?s=artificial+intelligence

ELI 2018 Key Issues Teaching Learning

Key Issues in Teaching and Learning

https://www.educause.edu/eli/initiatives/key-issues-in-teaching-and-learning

A roster of results since 2011 is here.

ELI 2018 key issues

1. Academic Transformation

2. Accessibility and UDL

3. Faculty Development

4. Privacy and Security

5. Digital and Information Literacies

https://cdn.nmc.org/media/2017-nmc-strategic-brief-digital-literacy-in-higher-education-II.pdf
Three Models of Digital Literacy: Universal, Creative, Literacy Across Disciplines

United States digital literacy frameworks tend to focus on educational policy details and personal empowerment, the latter encouraging learners to become more effective students, better creators, smarter information consumers, and more influential members of their community.

National policies are vitally important in European digital literacy work, unsurprising for a continent well populated with nation-states and struggling to redefine itself, while still trying to grow economies in the wake of the 2008 financial crisis and subsequent financial pressures

African digital literacy is more business-oriented.

Middle Eastern nations offer yet another variation, with a strong focus on media literacy. As with other regions, this can be a response to countries with strong state influence or control over local media. It can also represent a drive to produce more locally-sourced content, as opposed to consuming material from abroad, which may elicit criticism of neocolonialism or religious challenges.

p. 14 Digital literacy for Humanities: What does it mean to be digitally literate in history, literature, or philosophy? Creativity in these disciplines often involves textuality, given the large role writing plays in them, as, for example, in the Folger Shakespeare Library’s instructor’s guide. In the digital realm, this can include web-based writing through social media, along with the creation of multimedia projects through posters, presentations, and video. Information literacy remains a key part of digital literacy in the humanities. The digital humanities movement has not seen much connection with digital literacy, unfortunately, but their alignment seems likely, given the turn toward using digital technologies to explore humanities questions. That development could then foster a spread of other technologies and approaches to the rest of the humanities, including mapping, data visualization, text mining, web-based digital archives, and “distant reading” (working with very large bodies of texts). The digital humanities’ emphasis on making projects may also increase

Digital Literacy for Business: Digital literacy in this world is focused on manipulation of data, from spreadsheets to more advanced modeling software, leading up to degrees in management information systems. Management classes unsurprisingly focus on how to organize people working on and with digital tools.

Digital Literacy for Computer Science: Naturally, coding appears as a central competency within this discipline. Other aspects of the digital world feature prominently, including hardware and network architecture. Some courses housed within the computer science discipline offer a deeper examination of the impact of computing on society and politics, along with how to use digital tools. Media production plays a minor role here, beyond publications (posters, videos), as many institutions assign multimedia to other departments. Looking forward to a future when automation has become both more widespread and powerful, developing artificial intelligence projects will potentially play a role in computer science literacy.

6. Integrated Planning and Advising Systems for Student Success (iPASS)

7. Instructional Design

8. Online and Blended Learning

In traditional instruction, students’ first contact with new ideas happens in class, usually through direct instruction from the professor; after exposure to the basics, students are turned out of the classroom to tackle the most difficult tasks in learning — those that involve application, analysis, synthesis, and creativity — in their individual spaces. Flipped learning reverses this, by moving first contact with new concepts to the individual space and using the newly-expanded time in class for students to pursue difficult, higher-level tasks together, with the instructor as a guide.

Let’s take a look at some of the myths about flipped learning and try to find the facts.

Myth: Flipped learning is predicated on recording videos for students to watch before class.

Fact: Flipped learning does not require video. Although many real-life implementations of flipped learning use video, there’s nothing that says video must be used. In fact, one of the earliest instances of flipped learning — Eric Mazur’s peer instruction concept, used in Harvard physics classes — uses no video but rather an online text outfitted with social annotation software. And one of the most successful public instances of flipped learning, an edX course on numerical methods designed by Lorena Barba of George Washington University, uses precisely one video. Video is simply not necessary for flipped learning, and many alternatives to video can lead to effective flipped learning environments [http://rtalbert.org/flipped-learning-without-video/].

Myth: Flipped learning replaces face-to-face teaching.

Fact: Flipped learning optimizes face-to-face teaching. Flipped learning may (but does not always) replace lectures in class, but this is not to say that it replaces teaching. Teaching and “telling” are not the same thing.

Myth: Flipped learning has no evidence to back up its effectiveness.

Fact: Flipped learning research is growing at an exponential pace and has been since at least 2014. That research — 131 peer-reviewed articles in the first half of 2017 alone — includes results from primary, secondary, and postsecondary education in nearly every discipline, most showing significant improvements in student learning, motivation, and critical thinking skills.

Myth: Flipped learning is a fad.

Fact: Flipped learning has been with us in the form defined here for nearly 20 years.

Myth: People have been doing flipped learning for centuries.

Fact: Flipped learning is not just a rebranding of old techniques. The basic concept of students doing individually active work to encounter new ideas that are then built upon in class is almost as old as the university itself. So flipped learning is, in a real sense, a modern means of returning higher education to its roots. Even so, flipped learning is different from these time-honored techniques.

Myth: Students and professors prefer lecture over flipped learning.

Fact: Students and professors embrace flipped learning once they understand the benefits. It’s true that professors often enjoy their lectures, and students often enjoy being lectured to. But the question is not who “enjoys” what, but rather what helps students learn the best.They know what the research says about the effectiveness of active learning

Assertion: Flipped learning provides a platform for implementing active learning in a way that works powerfully for students.

9. Evaluating Technology-based Instructional Innovations

Transitioning to an ROI lens requires three fundamental shifts
What is the total cost of my innovation, including both new spending and the use of existing resources?

What’s the unit I should measure that connects cost with a change in performance?

How might the expected change in student performance also support a more sustainable financial model?

The Exposure Approach: we don’t provide a way for participants to determine if they learned anything new or now have the confidence or competence to apply what they learned.

The Exemplar Approach: from ‘show and tell’ for adults to show, tell, do and learn.

The Tutorial Approach: Getting a group that can meet at the same time and place can be challenging. That is why many faculty report a preference for self-paced professional development.build in simple self-assessment checks. We can add prompts that invite people to engage in some sort of follow up activity with a colleague. We can also add an elective option for faculty in a tutorial to actually create or do something with what they learned and then submit it for direct or narrative feedback.

The Course Approach: a non-credit format, these have the benefits of a more structured and lengthy learning experience, even if they are just three to five-week short courses that meet online or in-person once every week or two.involve badges, portfolios, peer assessment, self-assessment, or one-on-one feedback from a facilitator

The Academy Approach: like the course approach, is one that tends to be a deeper and more extended experience. People might gather in a cohort over a year or longer.Assessment through coaching and mentoring, the use of portfolios, peer feedback and much more can be easily incorporated to add a rich assessment element to such longer-term professional development programs.

The Mentoring Approach: The mentors often don’t set specific learning goals with the mentee. Instead, it is often a set of structured meetings, but also someone to whom mentees can turn with questions and tips along the way.

The Coaching Approach: A mentor tends to be a broader type of relationship with a person.A coaching relationship tends to be more focused upon specific goals, tasks or outcomes.

The Peer Approach:This can be done on a 1:1 basis or in small groups, where those who are teaching the same courses are able to compare notes on curricula and teaching models. They might give each other feedback on how to teach certain concepts, how to write syllabi, how to handle certain teaching and learning challenges, and much more. Faculty might sit in on each other’s courses, observe, and give feedback afterward.

The Self-Directed Approach:a self-assessment strategy such as setting goals and creating simple checklists and rubrics to monitor our progress. Or, we invite feedback from colleagues, often in a narrative and/or informal format. We might also create a portfolio of our work, or engage in some sort of learning journal that documents our thoughts, experiments, experiences, and learning along the way.

The Buffet Approach:

10. Open Education

Figure 1. A Model for Networked Education (Credit: Image by Catherine Cronin, building on
Interpretations of
Balancing Privacy and Openness (Credit: Image by Catherine Cronin. CC BY-SA)

11. Learning Analytics

12. Adaptive Teaching and Learning

13. Working with Emerging Technology

In 2014, administrators at Central Piedmont Community College (CPCC) in Charlotte, North Carolina, began talks with members of the North Carolina State Board of Community Colleges and North Carolina Community College System (NCCCS) leadership about starting a CBE program.

Building on an existing project at CPCC for identifying the elements of a digital learning environment (DLE), which was itself influenced by the EDUCAUSE publication The Next Generation Digital Learning Environment: A Report on Research,1 the committee reached consensus on a DLE concept and a shared lexicon: the “Digital Learning Environment Operational Definitions,

Figure 1. NC-CBE Digital Learning Environment

1 32 33 34 35 36 70

Skip to toolbar