CALL FOR CHAPTER PROPOSALS Proposal Submission Deadline: February 12, 2019 Leveraging Technology for the Improvement of School Safety and Student Wellbeing
A book edited by Dr. Stephanie Huffman, Dr. Stacey Loyless, Dr. Shelly Allbritton, and Dr. Charlotte Green (University of Central Arkansas)
Introduction
Technology permeates all aspects of today’s school systems. An Internet search on technology in schools can generate millions of website results. The vast majority of these websites (well over 8,000,000 results for one simple search) focuses on advice, activities, and uses of technology in the classroom. Clearly teaching and learning with technology dominates the literature and conversations on how technology should or could be used in classroom settings. A search on school safety and technology can produce more than 3,000,000 results with many addressing technological tools such as video cameras, entry control devices, weapon detectors, and other such hardware. However, in recent times, cyberbullying appears to dominate the Internet conversations in references to school safety. With an increase in school violence in the past two decades, school safety is a fundamental concern in our nation’s schools. Policy makers, educators, parents, and students are seeking answers in how best to protect the physical, emotional, and social well-being of all children.
Objective of the Book
The proposed edited book covers the primary topic of P-12 school safety and the use of technology and technology used for fostering an environment in which all students can be academically successful and thrive as global citizens. School safety is defined as the physical, social, and emotional well-being of children. The book will comprise empirical, conceptual and case based (practical application) research that craft an overall understanding of the issues in creating a “safe” learning environment and the role technology can and should play; where a student’s well-being is valued and protected from external and internal entities, equitable access is treasured as a means for facilitating the growth of the whole student, and policy, practices, and procedures are implemented to build a foundation to transform the culture and climate of the school into an inclusive nurturing environment.
Target Audience
The target audience is leadership and education scholars, leadership practitioners, and technology coordinators. This book will be used as a collective body of work for the improvement of K-12 schools and as a tool for improving leadership and teacher preparation programs. School safety is a major concern for educators. Technology has played a role in creating unsafe environments for children; however it also is an avenue for addressing the challenges of school safety
Recommended topics include, but are not limited to, the following:
Section I – Digital Leadership
Technology as a Climate and Cultural Transformation Tool
School Leadership in the Digital Age: Building a Shared Vision for all Aspects of Learning and Teaching
Ensuring Equity within a “One to One” Technology Framework
Infrastructure within Communities
Accessible WiFi for Low SES Students
Developing Culturally Responsive Pedagogy
Professional Development for School Leaders
Section II – Well Being
Social Media and School Safety: Inputs and Outputs
Tip lines: Crime, Bullying, Threats
Communication and Transparency
Platform for Social Justice
Teaching Strategies to Promote Healthy Student Interactions in Cyberspace (Digital Citizenship?)
Building Capacity and Efficacy, Platform to lower incidence of Cyber-Bullying, Boosting Instructional Engagement
Literacy and Preparedness for the Influence and Consequence of Digital Media Marketing Campaigns directed toward Children, Adolescents, and Teens.
Pioneering Innovative Technology Program in Curriculum: Fostering “Belonging” beyond Athletics & Arts.
Competence in the Blended/Hybrid/Flipped Classroom
Technology to enhance learning for all
Assistive Technology
Accessibility issues
Internet access for Low SES Students in the Blended/Hybrid/Flipped Classroom
Personal Learning Design
Differentiation for Student Efficacy
Strategies for Increasing Depth of Knowledge
Design Qualities for Enhanced Engagement
Submission Procedure
Researchers and practitioners are invited to submit on or before February 12, 2019, a chapter proposal of 1,000 to 2,000 words clearly explaining the purpose, methodology, and a brief summary findings of his or her proposed chapter. Authors will be notified by March 12, 2019 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by June 12, 2019, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. See Edited Chapter Template. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.
Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Leveraging Technology for the Improvement of School Safety and Student Wellbeing. All manuscripts are accepted based on a double-blind peer review editorial process.
Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), an international academic publisher of the “Information Science Reference” (formerly Idea Group Reference), “Medical Information Science Reference,” “Business Science Reference,” and “Engineering Science Reference” imprints. IGI Global specializes in publishing reference books, scholarly journals, and electronic databases featuring academic research on a variety of innovative topic areas including, but not limited to, education, social science, medicine and healthcare, business and management, information science and technology, engineering, public administration, library and information science, media and communication studies, and environmental science. For additional information regarding the publisher, please visit http://www.igi-global.com. This publication is anticipated to be released in 2020.
Important Dates February 12, 2019: Proposal Submission Deadline March 12, 2019: Notification of Acceptance June 12, 2019: Full Chapter Submission August 10, 2019: Review Results Returned August 10, 2019: Final Acceptance Notification September 7, 2019: Final Chapter Submission
Inquiries can be forwarded to
Dr. Stephanie Huffman
University of Central Arkansas steph@uca.edu or 501-450-5430
Scholars want peers to find—and cite—their research, and these days that increasingly happens on social media. The old adage ‘publish or perish’ could soon go digital as ‘clicks or canned.’
Several platforms have emerged over the past decade, offering researchers the chance to share their work and connect with other scholars. But some of those services have a bad rap from academics who say commercial sites lack the integrity of institutional repositories run by traditional universities. (Among the most widely-villified are ResearchGate and Academia.edu, which is evident by griping on social media and elsewhere.)
a 2015 paper comparing services and tools offered by various academic social networks, says researchers must weigh the benefits and drawbacks of each. “They can be great tools to advance your research, especially social research,” she says. “But just like with Facebook or any other social network, we need to be aware of potential issues we might have with copyright or privacy.”
Academia.edu is the largest of the academic social networks.
Created as a reference-management tool to help users organize their research, Mendeley also includes a number of social-networking features.
Scholabrate. The service claims to provide a more Facebook-esque, visual experience for academics seeking to network with others in their field.
Similar to Mendeley, Zotero functions primarily as a research tool, allowing users to collect, save, cite and share materials from a wide range of sources. The site also maintains a significant community of academics who can connect through groups and forums, or through their search engine.
Eureka: machine learning tool, brainstorming engine. give it an initial idea and it returns similar ideas. Like Google: refine the idea, so the machine can understand it better. create a collection of ideas to translate into course design or others.
Netlix:
influencers and microinfluencers, pre- and doing the execution
a machine can construct a book with the help of a person. bionic book. machine and person working hand in hand. provide keywords and phrases from lecture notes, presentation materials. from there recommendations and suggestions based on own experience; then identify included and excluded content. then instructor can construct.
Design may be the least interesting part of the book for the faculty.
multiple choice quiz may be the least interesting part, and faculty might want to do much deeper assessment.
use these machine learning techniques to build assessment. how to more effectively. inquizitive is the machine learning
students engagements and similar prompts
presence in the classroom: pre-service teachers class. how to immerse them and practice classroom management skills
First class: marriage btw VR and use of AI – an environment headset: an algorithm reacts how teachers are interacting with the virtual kids. series of variables, oppty to interact with present behavior. classroom management skills. simulations and environments otherwise impossible to create. apps for these type of interactions
facilitation, reflection and research
AI for more human experience, allow more time for the faculty to be more human, more free time to contemplate.
Jason: Won’t the use of AI still reduce the amount of faculty needed?
Christina Dumeng: @Jason–I think it will most likely increase the amount of students per instructor.
Andrew Cole (UW-Whitewater): I wonder if instead of reducing faculty, these types of platforms (e.g., analytic capabilities) might require instructors to also become experts in the various technology platforms.
Dirk Morrison: Also wonder what the implications of AI for informal, self-directed learning?
Kate Borowske: The context that you’re presenting this in, as “your own jazz band,” is brilliant. These tools presented as a “partner” in the “band” seems as though it might be less threatening to faculty. Sort of gamifies parts of course design…?
Dirk Morrison: Move from teacher-centric to student-centric? Recommender systems, AI-based tutoring?
Andrew Cole (UW-Whitewater): The course with the bot TA must have been 100-level right? It would be interesting to see if those results replicate in 300, 400 level courses
In simple words, a blockchain is a ledger that records transactions of a certain type. It uses mathematical functions such as integer factorization, which is easy to solve in one direction but hard in the other direction for security.
Quantum entanglement is a phenomenon in which the quantum states of two or more objects have to be described with reference to each other, even though the individual objects may be spatially separated.
What’s the future of blockchain in the world of Quantum computing?
One of the potential solutions is Quantum Blockchain, which uses quantum cryptography. This has been proposed by Del Rajan and Matt Visser of Victoria University of Wellington in New Zealand. The idea is simple — if computers can compute fast, make the puzzle more complex.
Integrating technology into your teaching practice can be intimidating. Where do you start? What tools do you choose? What are the questions you need to ask?
In Selecting the Right Tech Solutions for Your Classroom, you’ll get the guidance you need to thrive with edtech, whether you’re just dipping your toe in or rethinking a districtwide approach. Throughout the course, you’ll engage in online content, develop materials specific to your context and receive feedback from experts. The course culminates with a capstone project that can be used to communicate with stakeholders about your selected technology, your rationale for choosing it and how you’ll implement it.
Bryan Alexander’s Future Trends Forum with Guest Sue Bohle, Serious Play Conference
An interactive discussion on gaming in education
January 17, 2 – 3 PM (EST)
Sue Bohle, Executive Director, Producer, Serious Play Conference, for a lively discussion on gaming in education.
Sue is a leader in the space and has seen tremendous growth and potential of serious games in corporate training and eLearning. The interview has been edited for clarity and length.
++++++++
notes from the webinar:
i had issues connecting and the streams of the guest speaker (Sue) and Bryan will stall when each of them were talking.
examples for formally learning through games
I’d love to hear Sue chat about: Students as game authors, what do you do to encourage reflection on game events?
Dan LaSota:
Is there any intersection between “Minds on Fire” from Mark Carnes, https://reacting.barnard.edu and your conference?
Dan LaSota
To me “simulation” means some scenario that can be rapidly run again and again, with the user/player tweaking variables and seeing what happens. If it’s “fun” there is more of an intersection with games. If not so fun, it might be considered by most more of a model. Computers can and do help with the iteration process because they can reset to T=0 much quicker than human players. Although “role play” is also a kind of simulation.
Facebook group the Tribe:
Minecraft in education.
John Gould with Drexel: he is going now after the school boards about games in education
Noreen Barajas Horizon Project Director, Educause
AI book integrated in junior high Seattle Michelle Zimmerman, article in Forbes,
Keven Diel Lockhead expert on AI, military
gaming as a way to bypassing the metacognitive (thinking about thinking). Without teaching about learning. Number of libraries Nebraska State: games are developed by libraries.
Tobee Soultie gaming industry. National Intelligence Agency for first response and refurbished for teachers and bullying.
This tutelary theory is a pure mathematical fiction. From the start it has been founded on a formidable abstraction.
That said, this “theory” that is desocialised and dehistoricised at its roots has, today more than ever, the means of making itself true and empirically verifiable. In effect, neoliberal discourse is not just one discourse among many. Rather, it is a “strong discourse” – the way psychiatric discourse is in an asylum, in Erving Goffman’s analysis (2). It is so strong and so hard to combat only because it has on its side all of the forces of a world of relations of forces, a world that it contributes to making what it is.
The globalisation of financial markets, when joined with the progress of information technology, ensures an unprecedented mobility of capital.
Thus we see how the neoliberal utopia tends to embody itself in the reality of a kind of infernal machine, whose necessity imposes itself even upon the rulers. Like the Marxism of an earlier time, with which, in this regard, it has much in common, this utopia evokes powerful belief – the free trade faith – not only among those who live off it, such as financiers, the owners and managers of large corporations, etc., but also among those, such as high-level government officials and politicians, who derive their justification for existing from it.
Session 2: The Digital Age: The Impact and Future Possibilities Offered by Data and Technology
Thank you for registering to participate in the second Reimagining Minnesota State forum. The Forums have been designed to spark not only individual reflection but what we hope can serve as catalysts for discussions in a variety of venues. The Forum will be recorded and available for viewing on the Reimagining website.
Below are the directions whether you are attending in person or by live stream.
Catherine Haslag: Is there any research to show students retention in an online class vs a face-to-face course?
the challenge is not collecting, but integrating, using data.
silos = cylinder of excellence.
technology innovation around advising. iPASS resources.
adaptive learning systems – how students advance through the learning process.
games and simulations Bryan Mark Gill. voice recognition,
next 3 to 5 years AR. by 2023 40% with AR and VR
AI around the controversial. Chatbot and Voice assistants.
Unizin: 13 founding members to develop platform, Canvas, instructional services, data for predictive analytic, consistent data standard among institutions,
University innovation Alliance. Analytics as the linchpin for students’ success. graduation rates increase. racial gap graduation. Georgia State.
digital ethics. Mark Gill and Susana Nuccetelli. digital ethics: Susana Nuccetelli brought her students from the Philosophy Dept to Mark Gill’s SCSu Vizlab so we can discuss ethics and AI, last semester. jobrien@educause.edu
assistant vice president for student success and prevention Morgan State U
the importance of training in technology adoption
Dr. Peter Smith, Orkand Endowed Chair and Professor of Innovative Practices in Higher Education at University of Maryland University College
social disruption, national security issue,
Allan Taft Candadian researcher, 700 hours / year learning something. 14 h/w.
learners deserve recognition
free range learning.
how do we get a value on people from a different background? knowledge discrimination. we value it on where they learned it. then how you learned it and what you can do with it. talent and capacity not recognized.
we, the campus, don’t control the forces for a very first time. MIT undergrad curricula is free, what will happen. dynamics at work here. declining student numbers, legislation unhappy. technology had made college more expensive, not less. doing the right thing, leads to more disruption. local will be better, if done well. workplace can become a place for learning.
learning is a social activity. distance learning: being on the farthest raw of 300 Princeton lecture. there is a tool and there is people; has to have people at the heart.
what will work not only for MN, but for each of the campuses, the personalization.
staying still is death.
Panel discussion
what is the role of faculty in the vendor and discussions about technology. a heat map shows that IT people were testing the vendor web site most, faculty and student much less.
Investigators traced the man through digital tracks he left on the internet, as well as by speaking to witnesses, including another unnamed 19-year-old man that the hacker had communicated with via an encrypted messaging service. The hacker, who used the pseudonyms “G0t” and “Orbit”, was arrested on January 6 after investigators searched his home.
“Bad passwords were one of the reasons he had it so easy,” Seehofer said. “I was shocked at how simple most passwords were: ‘ILoveYou’, ‘1,2,3’. A whole array of really simple things.”
The latest incident comes just over a month after German security officials detected a major cyber attack against the email accounts of German lawmakers, as well as the military, and several German embassies by a Russian hacker group with ties to Moscow’s military intelligence wing, the GRU.
That attack occurred less than a year after the BfV, Germany’s intelligence service, said the Russian government was behind a cyberattack on German computer networks that was discovered in December 2017 and was also linked to the same hacker group that carried out the November 2018 breach.