As online education expands, students are bringing old-fashioned cheating into the digital age
According to the latest report from Babson Survey Research Group, nearly 6.5 million American undergraduates now take at least one course online
1. Listen to students and faculty. Every college, university, or online-learning provider has a different approach to online learning. At Indiana University, where more than 30 percent of students take at least one online course, the online education team has launched Next.IU, an innovative pilot program to solicit feedback from the campus community before making any major edtech decision. By soliciting direct feedback from students and faculty, institutions can avoid technical difficulties and secure support before rolling out the technology campus-wide.
2. Go mobile. Nine in 10 undergraduates own a smartphone, and the majority of online students complete some coursework on a mobile device. Tapping into the near-ubiquity of mobile computing on campus can help streamline the proctoring and verification process. Rather than having to log onto a desktop, students can use features like fingerprint scan and facial recognition that are already integrated into most smartphones to verify their identity directly from their mobile device.
For a growing number of students, mobile technology is the most accessible way to engage in online coursework, so mobile verification provides not only a set of advanced security tools, but also a way for universities to meet students where they are.
3. Learn from the data. Analytical approaches to online test security are still in the early stages. Schools may be more susceptible to online “heists” if they are of a certain size or administer exams in a certain way, but institutions need data to benchmark against their peers and identify pain points in their approach to proctoring.
In an initial pilot with 325,000 students, for instance, we found that cheating rose and fell with the seasons—falling from 6.62 percent to 5.49 percent from fall to spring, but rising to a new high of 6.65 percent during the summer.
Digital storytelling uses video, audio, social media, blogging and other tools to convey ideas and information effectively. The emphasis is on empowering students to create authentic products that they can share with others beyond the classroom walls, and to allow for audience interaction and feedback.
why should we inspire students to be digital storytellers?
Requires critical thinking: Creating an interdisciplinary product from scratch requires high level thinking skills like evaluating evidence, editing and curation, and production timelines. Digital stories often use multiple skills like writing, public speaking, photography, design and collaboration in a single project which makes them ideal for practicing skills learned other units or classes.
Authentic projects have impact: Creating real-world, impactful products that students share with an audience beyond the classroom is one of the best ways to enhance motivation and increase quality.
Places focus on writing: A picture is worth a thousand words, and video is 30 photos a second. It has its own grammar and style, but concepts of content, structure, tone and audience impact are just as important in multimedia as they are for an essay. Scripts, voiceovers and interview questions emphasize traditional writing skills and are the backbone of all multimedia projects.
Develops digital citizens: What to post online, when and how are all important questions for our students to learn to answer. Require them to comment on others’ work and develop etiquette for online posts and feedback. Rather than being afraid of the internet, embrace it to teach digital citizenship.
Students can add to digital portfolios: All student work can be compiled into a digital portfolio that they can use to promote themselves for jobs/internships
How to Educate Digital Storytellers
1. Focus on content, not the tools
2. Take it to the next “SAMR level.” The SAMR model is a way to gauge how deeply and effectively you use technology (Salvador Dali)
Tom Dickinson describes four different types of distributed ‘fake news’.
‘Fake news’ is lazy language. Be specific. Do you mean: A) Propaganda B) Disinformation C) Conspiracy theory D) Clickbait
The RAND Corporation, a US think-tank with strong ties to the military industrial complex, recently looked at the influence of the Russian Propaganda Model and how best to deal with it.
Three factors have been shown to increase the (limited) effectiveness of retractions and refutations: (1) warnings at the time of initial exposure to misinformation, (2) repetition of the retraction or refutation, and (3) corrections that provide an alternative story to help fill the resulting gap in understanding when false ‘facts’ are removed.
Critical thinking requires us to constantly question assumptions, especially our own. To develop these skills, questioning must be encouraged. This runs counter to most schooling and training practices. When do students or employees get to question underlying assumptions of their institutions? If they cannot do this, how can we expect them to challenge various and pervasive types of ‘fake news’?
$129. Select CoSN Member or Non-member, change the “0” next to the “Symposium on Educating for Digital Citizenship ONLY” to a “1”. Click “next” and complete your registration.
CoSN and UNESCO, in partnership with the Global Education Conference, HP, ClassLink, Participate, Qatar Foundation International, Partnership for 21st Century Learning, ISTE, iEARN-USA, The Stevens Initiative at the Aspen Institute, World Savvy, Wikimedia, TakingITGlobal, Smithsonian Institute, and Project Tomorrow, are hosting this event to bring together thought leaders from across the world to explore the role of education in ensuring students are responsible digital citizens.
Internet safety has been a concern for policymakers and educators since the moment technology, particularly the Internet, was introduced to classrooms. Increasingly many school systems are evolving that focus from simply minimizing risk and blocking access, to more responsible use policies and strategies that empower the student as a digital citizen. Digital citizenship initiatives also seek to prepare students to live in a world where online hate and radicalization are all too common.
Join us for a lively and engaging exploration of what are the essential digital citizenship skills that students need, including policies and practices in response to the following questions:
How can technology be used to improve digital citizenship and to what extent is technology providing new challenges to digital citizenship?
How should we access information effectively and form good evaluate its accuracy?
How should we develop the skills to engage with others respectfully and in a sensitive and ethical manner?
How should we develop an appropriate balance between instruction and nurturing student behaviors that ensure ICT (Information and communications technology) is used safely and responsibly?
Combine the superfast calculational capacities of Big Compute with the oceans of specific personal information comprising Big Data — and the fertile ground for computational propaganda emerges. That’s how the small AI programs called bots can be unleashed into cyberspace to target and deliver misinformation exactly to the people who will be most vulnerable to it. These messages can be refined over and over again based on how well they perform (again in terms of clicks, likes and so on). Worst of all, all this can be done semiautonomously, allowing the targeted propaganda (like fake news stories or faked images) to spread like viruses through communities most vulnerable to their misinformation.
According to Bolsover and Howard, viewing computational propaganda only from a technical perspective would be a grave mistake. As they explain, seeing it just in terms of variables and algorithms “plays into the hands of those who create it, the platforms that serve it, and the firms that profit from it.”
Computational propaganda is a new thing. People just invented it. And they did so by realizing possibilities emerging from the intersection of new technologies (Big Compute, Big Data) and new behaviors those technologies allowed (social media). But the emphasis on behavior can’t be lost.
People are not machines. We do things for a whole lot of reasons including emotions of loss, anger, fear and longing. To combat computational propaganda’s potentially dangerous effects on democracy in a digital age, we will need to focus on both its howand its why.
According to a survey by the European Commission, two out of three EU online providers use geo-blocking, forcing third country customers to pay more for products or not offer their services.
Customers in smaller countries like Malta, Luxembourg, Cyprus, and Slovenia were affected by practices experienced by residents of border regions. They are often unable to order services or goods online from a neighbouring country.
Just as in the 1970s, when antidrug campaigns were scoffed at by the very people they were targeting, anti-bullying campaigns are also losing their effectiveness. I got a taste of this firsthand last year when I spoke about sexting, online safety and cyberbullying at an all-school assembly. When a student blurted out an obscenity during the sexting portion, the students went wild and didn’t listen to a thing I said. I was frustrated and discouraged. Later, I offered an iPad mini to the student who produced the best video and poster. Even that got little response.
The fact is, anti-bullying clichés have become a shut-off switch. What we really need to be doing is giving students actual skills to prevent bullying. To get that conversation going, I pose this question to students: “Will you accept the identity that others give you?”
Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library. During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety