Digital storytelling uses video, audio, social media, blogging and other tools to convey ideas and information effectively. The emphasis is on empowering students to create authentic products that they can share with others beyond the classroom walls, and to allow for audience interaction and feedback.
why should we inspire students to be digital storytellers?
Requires critical thinking: Creating an interdisciplinary product from scratch requires high level thinking skills like evaluating evidence, editing and curation, and production timelines. Digital stories often use multiple skills like writing, public speaking, photography, design and collaboration in a single project which makes them ideal for practicing skills learned other units or classes.
Authentic projects have impact: Creating real-world, impactful products that students share with an audience beyond the classroom is one of the best ways to enhance motivation and increase quality.
Places focus on writing: A picture is worth a thousand words, and video is 30 photos a second. It has its own grammar and style, but concepts of content, structure, tone and audience impact are just as important in multimedia as they are for an essay. Scripts, voiceovers and interview questions emphasize traditional writing skills and are the backbone of all multimedia projects.
Develops digital citizens: What to post online, when and how are all important questions for our students to learn to answer. Require them to comment on others’ work and develop etiquette for online posts and feedback. Rather than being afraid of the internet, embrace it to teach digital citizenship.
Students can add to digital portfolios: All student work can be compiled into a digital portfolio that they can use to promote themselves for jobs/internships
How to Educate Digital Storytellers
1. Focus on content, not the tools
2. Take it to the next “SAMR level.” The SAMR model is a way to gauge how deeply and effectively you use technology (Salvador Dali)
Publisher / Organization: Athabasca University Press
Year founded: 2000
Description: The International Review of Research in Open and Distributed Learning disseminates original research, theory, and best practice in open and distributed learning worldwide.
Publisher / Organization: The University of Illinois at Chicago- University Library
Year founded: 1996
Description: First Monday is among the very first open access journals in the EdTech field. The journal’s subject matter encompasses the full range of Internet issues, including educational technologies, social media and web search. Contributors are urged via author guidelines to use simple explanations and less complex sentences and to be mindful that a large proportion of their readers are not part of academia and do not have English as a first language.
Academic Management: University of Catalonia (UOC)
Year founded: 2004
Description: This journal aims to: provide a vehicle for scholarly presentation and exchange of information between professionals, researchers and practitioners in the technology-enhanced education field; contribute to the advancement of scientific knowledge regarding the use of technology and computers in higher education; and inform readers about the latest developments in the application of information technologies (ITs) in higher education learning, training, research and management.
Description: Online Learning promotes the development and dissemination of new knowledge at the intersection of pedagogy, emerging technology, policy, and practice in online environments. The journal has been published for over 20 years as the Journal of Asynchronous Learning Networks (JALN) and recently merged with the Journal of Online Learning and Teaching (JOLT).
Publisher / Organization: International Forum of Educational Technology & Society
Year founded:1998
Description: Educational Technology & Society seeks academic articles on the issues affecting the developers of educational systems and educators who implement and manage these systems. Articles should discuss the perspectives of both communities – the programmers and the instructors. The journal is currently still accepting submissions for ongoing special issues, but will cease publication in the future as the editors feel that the field of EdTech is saturated with high quality publications.
Description: The Australasian Journal of Educational Technology aims to promote research and scholarship on the integration of technology in tertiary education, promote effective practice, and inform policy. The goal is to advance understanding of educational technology in post-school education settings, including higher and further education, lifelong learning, and training.
DESCRIPTION: The Internet and Higher Education is devoted to addressing contemporary issues and future developments related to online learning, teaching, and administration on the Internet in post-secondary settings. Articles should significantly address innovative deployments of Internet technology in instruction and report on research to demonstrate the effects of information technology on instruction in various contexts in higher education.
Publisher / Organization: British Educational Research Association (BERA)
YEAR FOUNDED: 1970
DESCRIPTION: The journal publishes theoretical perspectives, methodological developments and empirical research that demonstrate whether and how applications of instructional/educational technology systems, networks, tools and resources lead to improvements in formal and non-formal education at all levels, from early years through to higher, technical and vocational education, professional development and corporate training.
Description: Computers & Education aims to increase knowledge and understanding of ways in which digital technology can enhance education, through the publication of high quality research, which extends theory and practice.
Description: TechTrends targets professionals in the educational communication and technology field. It provides a vehicle that fosters the exchange of important and current information among professional practitioners. Among the topics addressed are the management of media and programs, the application of educational technology principles and techniques to instructional programs, and corporate and military training.
Description: Advances in technology and the growth of e-learning to provide educators and trainers with unique opportunities to enhance learning and teaching in corporate, government, healthcare, and higher education. IJEL serves as a forum to facilitate the international exchange of information on the current research, development, and practice of e-learning in these sectors.
Led by an Editorial Review Board of leaders in the field of e-Learning, the Journal is designed for the following audiences: researchers, developers, and practitioners in corporate, government, healthcare, and higher education. IJEL is a peer-reviewed journal.
Description: JCMST is a highly respected scholarly journal which offers an in-depth forum for the interchange of information in the fields of science, mathematics, and computer science. JCMST is the only periodical devoted specifically to using information technology in the teaching of mathematics and science.
Just as researchers build reputation over time that can be depicted (in part) through quantitative measures such as h-index and i10-index, journals are also compared based on the number of citations they receive..
Description: The Journal of Interactive Learning Research (JILR) publishes papers related to the underlying theory, design, implementation, effectiveness, and impact on education and training of the following interactive learning environments: authoring systems, cognitive tools for learning computer-assisted language learning computer-based assessment systems, computer-based training computer-mediated communications, computer-supported collaborative learning distributed learning environments, electronic performance support systems interactive learning environments, interactive multimedia systems interactive simulations and games, intelligent agents on the Internet intelligent tutoring systems, microworlds, virtual reality based learning systems.
Description: JEMH is designed to provide a multi-disciplinary forum to present and discuss research, development and applications of multimedia and hypermedia in education. It contributes to the advancement of the theory and practice of learning and teaching in environments that integrate images, sound, text, and data.
Publisher / Organization: Society for Information Technology and Teacher Education (SITE)
Year founded: 1997
Description: JTATE serves as a forum for the exchange of knowledge about the use of information technology in teacher education. Journal content covers preservice and inservice teacher education, graduate programs in areas such as curriculum and instruction, educational administration, staff development instructional technology, and educational computing.
Publisher / Organization: Association for the Advancement of Computing in Education (AACE)
YEAR FOUNDED: 2015
DESCRIPTION: The Journal of Online Learning Research (JOLR) is a peer-reviewed, international journal devoted to the theoretical, empirical, and pragmatic understanding of technologies and their impact on primary and secondary pedagogy and policy in primary and secondary (K-12) online and blended environments. JOLR is focused on publishing manuscripts that address online learning, catering particularly to the educators who research, practice, design, and/or administer in primary and secondary schooling in online settings. However, the journal also serves those educators who have chosen to blend online learning tools and strategies in their face-to-face classroom.
The most commonly used index to measure the relative importance of journals is the annual Journal Citation Reports (JCR). This report is published by Clarivate Analytics (previously Thomson Reuters).
SCImago Journal Rank (SJR indicator) measures the influence of journals based on the number of citations the articles in the journal receive and the importance or prestige of the journals where such citations come from. The SJR indicator is a free journal metric which uses an algorithm similar to PageRank and provides an open access alternative to the journal impact factor in the Web of Science Journal Citation Report. The portal draws from the information contained in the Scopus database (Elsevier B.V.).
Introduced by Google in 2004, Scholar is a freely accessible search engine that indexes the full text or metadata of scholarly publications across an array of publishing formats and disciplines.
Introduced by Elsevier in 2004, Scopus is an abstract and citation database that covers nearly 18,000 titles from more than 5,000 publishers. It offers journal metrics that go beyond just journals to include most serial titles, including supplements, special issues and conference proceedings. Scopus offers useful information such as the total number of citations, the total number of articles published, and the percent of articles cited.
Anne-Wil Harzing:
“Citations are not just a reflection of the impact that a particular piece of academic work has generated. Citations can be used to tell stories about academics, journals and fields of research, but they can also be used to distort stories”.
Harzing, A.-W. (2013). The publish or perish book: Your guide to effective and responsible citation analysis. http://harzing.com/popbook/index.htm
ResearchGate is a social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators. The community was founded in May 2008. Today it has over 14 million members.
Google Scholar allows users to search for digital or physical copies of articles, whether online or in libraries. It indexes “full-text journal articles, technical reports, preprints, theses, books, and other documents, including selected Web pages that are deemed to be ‘scholarly. It comprises an estimated 160 million documents.
Academia.edu is a social-networking platform for academics to share research papers. You can upload your own work, and follow the updates of your peers. Founded in 2008, the network currently has 59 million users, and adding 20 million documents.
The ORCHID (Open Researcher and Contributor ID) is a nonproprietary alphanumeric code to uniquely identify scientific and other academic authors and contributors. It provides a persistent identity for humans, similar to content-related entities on digital networks that utilize digital object identifiers (DOIs). The organization offers an open and independent registry intended to be the de facto standard for contributor identification in research and academic publishing.
The Scopus Author Identifier assigns a unique number to groups of documents written by the same author via an algorithm that matches authorship based on a certain criteria. If a document cannot be confidently matched with an author identifier, it is grouped separately. In this case, you may see more than one entry for the same author.
+++++++++++++++++
more on metrics in this iMS blog
Lazer, D. M. J., Baum, M. A., Benkler, Y., Berinsky, A. J., Greenhill, K. M., Menczer, F., … Zittrain, J. L. (2018). The science of fake news. Science, 359(6380), 1094–1096. https://doi.org/10.1126/science.aao2998
Baum and David Lazer, M. A. (2017, May 11). Social media must be held to account on fake news. Winnipeg Free Press (MB). p. A7.
In a paper published in March in the journal Science, David Lazer, Matthew Baum and 14 co-authors consider what we do and don’t know about the science of fake news. They definefake news as “fabricated information that mimics news media content in form but not in organizational process or intent,” and they go on to discuss problems at multiple levels: individual, institutional and societal. What do we know about individuals’ exposure to fake news and its influence upon them? How can Internet platforms help limit the dissemination of fake news? And most fundamentally: How can we succeed in creating and perpetuating a culture that values and promotes truth?
Steven Sloman, professor of cognitive, linguistic and psychological sciences at Brown University, and one of the paper’s 16 authors. Sloman is also author of The Knowledge Illusion: Why We Never Think Alone, a book about the merits and failings of our collaborative minds, published in 2017 with co-author Philip Fernbach.
Sloman, S. A. (2017). The knowledge illusion: Why we never think alone. New York: Riverhead Books.
social media – call centers in Iowa, where agriculture is expected. not an awesome job. http://sched.co/D7pQ
Caleris as featured in New York Times.
Sarah Roberts talk about psychological effects of working at Caleris; it resembles the effect of air strikes on the drone pilots
Drupal based. Google Analytics like. Bookmarks. objects list can be shared through social media, email, etc. Pachyderm used to have timeline like Islandora. still images, audio, video
Over the past 10 years, new learning management systems (LMSs) have sprung on the scene to rival the Blackboards and Moodles of old. On the EdSurge Product Index alone, 56 products self-identify and fall into the LMS category. And with certain established companies like Pearson pulling out of the LMS ranks, where do you start?
As University of Central Florida’s Associate Vice President of Distributed Learning, Tom Cavanagh, wrote in an article for EDUCAUSE, “every institute has a unique set of instructional and infrastructure circumstances to consider when deciding on an LMS,” but at the same time, “all institutions face certain common requirements”—whether a small charter school, a private university or a large public school district.
The LMS Checklist
#1: Is the platform straightforward and user-friendly?
#2: Who do we want to have access to this platform, and can we adjust what they can see?
#3: Can the instructor and student(s) talk to and communicate with each other easily?
“Students and faculty live a significant portion of their daily lives online in social media spaces,” writes University of Central Florida’s Tom Cavanagh in his article on the LMS selection process. “Are your students and faculty interested in these sorts of interplatform connections?”
#5: Does this platform plug in with all of the other platforms we have?
“Given the pace of change and the plethora of options with educational technology, it’s very difficult for any LMS vendor to keep up with stand-alone tools that will always outperform built-in tools,” explains Michael Truong, executive director of innovative teaching and technology at Azusa Pacific University. According to Truong, “no LMS will be able to compete directly with tools like Piazza (discussion forum), Socrative (quizzing), EdPuzzle (video annotation), etc.”
As a result, Truong says, “The best way to ‘prepare’ for future technological changes is to go with an LMS that plays well with external tools.”
Combine the superfast calculational capacities of Big Compute with the oceans of specific personal information comprising Big Data — and the fertile ground for computational propaganda emerges. That’s how the small AI programs called bots can be unleashed into cyberspace to target and deliver misinformation exactly to the people who will be most vulnerable to it. These messages can be refined over and over again based on how well they perform (again in terms of clicks, likes and so on). Worst of all, all this can be done semiautonomously, allowing the targeted propaganda (like fake news stories or faked images) to spread like viruses through communities most vulnerable to their misinformation.
According to Bolsover and Howard, viewing computational propaganda only from a technical perspective would be a grave mistake. As they explain, seeing it just in terms of variables and algorithms “plays into the hands of those who create it, the platforms that serve it, and the firms that profit from it.”
Computational propaganda is a new thing. People just invented it. And they did so by realizing possibilities emerging from the intersection of new technologies (Big Compute, Big Data) and new behaviors those technologies allowed (social media). But the emphasis on behavior can’t be lost.
People are not machines. We do things for a whole lot of reasons including emotions of loss, anger, fear and longing. To combat computational propaganda’s potentially dangerous effects on democracy in a digital age, we will need to focus on both its howand its why.
Effective communication is one critical characteristics of effective and successful school principal. Research on effective schools and instructional leadership emphasizes the impact of principal leadership on creating safe and secure learning environment and positive nurturing school climate (Halawah, 2005, p. 334)
Halawah, I. (2005). The Relationship between Effective Communication of High School Principal and School Climate. Education, 126(2), 334-345.
Selection of school principals in Hong Kong. The findings confirm a four-factor set of expectations sought from applicants; these are Generic Managerial Skills; Communication and Presentation Skills; Knowledge and Experience; and Religious Value Orientation.
Kwan, P. (2012). Assessing school principal candidates: perspectives of the hiring superintendents. International Journal Of Leadership In Education, 15(3), 331-349. doi:10.1080/13603124.2011.617838
Yee, D. L. (2000). Images of school principals’ information and communications technology leadership. Journal of Information Technology for Teacher Education, 9(3), 287–302. https://doi.org/10.1080/14759390000200097
Catano, N., & Stronge, J. H. (2007). What do we expect of school principals? Congruence between principal evaluation and performance standards. International Journal of Leadership in Education, 10(4), 379–399. https://doi.org/10.1080/13603120701381782
Communication can consist of two large areas:
broadcasting information: PR, promotions, notifications etc.
two-way communication: collecting feedback, “office hours” type of communication, backchanneling, etc.
Further communication initiated by/from principals can have different audiences
Reyes, P., & Hoyle, D. (1992). Teachers’ Satisfaction With Principals’ Communication. The Journal of Educational Research, 85(3), 163–168. https://doi.org/10.1080/00220671.1992.9944433
parents: involvement, feeling of empowerment, support, volunteering
students
board members
community
Epstein, J. L. (1995). School/family/community partnerships – ProQuest. Phi Delta Kappan, 76(9), 701.
Others
Communication and Visualization
The ever-growing necessity to be able to communicate data to different audiences in digestible format.
considering the information discussed in class, split in groups of 4 and develop your institution strategy for effective and modern communication across and out of your school.
until recently, broadcasting and publishing were difficult and expensive affairs, their infrastructures riddled with bottlenecks and concentrated in a few hands.
When protests broke out in Ferguson, Missouri, in August 2014, a single livestreamer named Mustafa Hussein reportedly garnered an audience comparable in size to CNN’s for a short while. If a Bosnian Croat war criminal drinks poison in a courtroom, all of Twitter knows about it in minutes.
In today’s networked environment, when anyone can broadcast live or post their thoughts to a social network, it would seem that censorship ought to be impossible. This should be the golden age of free speech.
And sure, it is a golden age of free speech—if you can believe your lying eyes. Is that footage you’re watching real? Was it really filmed where and when it says it was? Is it being shared by alt-right trolls or a swarm of Russian bots? My note: see the ability to create fake audio and video footage: https://blog.stcloudstate.edu/ims/2017/07/15/fake-news-and-video/
HERE’S HOW THIS golden age of speech actually works: In the 21st century, the capacity to spread ideas and reach an audience is no longer limited by access to expensive, centralized broadcasting infrastructure. It’s limited instead by one’s ability to garner and distribute attention. And right now, the flow of the world’s attention is structured, to a vast and overwhelming degree, by just a few digital platforms: Facebook, Google (which owns YouTube), and, to a lesser extent, Twitter.
at their core, their business is mundane: They’re ad brokers
They use massive surveillance of our behavior, online and off, to generate increasingly accurate, automated predictions of what advertisements we are most susceptible to and what content will keep us clicking, tapping, and scrolling down a bottomless feed.
in reality, posts are targeted and delivered privately, screen by screen by screen. Today’s phantom public sphere has been fragmented and submerged into billions of individual capillaries. Yes, mass discourse has become far easier for everyone to participate in—but it has simultaneously become a set of private conversations happening behind your back. Behind everyone’s backs.
It’s important to realize that, in using these dark posts, the Trump campaign wasn’t deviantly weaponizing an innocent tool. It was simply using Facebook exactly as it was designed to be used. The campaign did it cheaply, with Facebook staffers assisting right there in the office, as the tech company does for most large advertisers and political campaigns.
From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.
Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.
2. Unknown Devices
Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.
3. Out of Date Technology
Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.
Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.
4. User Error
A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.
User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.
Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.
5. No Backup
As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.
Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.