Archive of ‘information technology’ category

collaboration in academia

International Survey of Research University Faculty: Means of Scholarly Communications and Collaboration (ISBN No:978-157440-446-3 )

http://www.primaryresearch.com/AddCart.aspx?ReportID=397

The survey data is based on a survey of more than 500 scholars drawn from more than 50 major research universities in the USA, Canada, the UK, Australia, New Zealand and Ireland. Data is broken out by various criteria, such as type of university, scholar’s country, gender, political views, academic subject specialty, academic title and other criteria.

  • 50.69% of respondents are currently collaborating or coordinating research with scholars or other researchers from other universities or colleges outside of their country.
  • Web based meetings were most common in the Engineering, Mathematics, Computer Science, Physics, Chemistry and other Science and Technology fields, 33.70, and least common in the Literature and Languages fields, 2.92.
  • 7.72% of respondents routinely use Adobe Connect to communicate with scholars at other locations.
  • 87.52% of respondents have co-authored a journal article with one or more other authors. Co-authorship was most common in Australia/New Zealand, 96.77%, followed by Canada, 93.10%, and the UK/Ireland, 89.83%. It was least common in the USA, 85.07%.

++++++++++++++++++
more on collaboration in academia in this IMS blog
https://blog.stcloudstate.edu/ims?s=collaboration

student data mining

Beyond the Horizon Webinar on Student Data

March 29, 2017 @ 12-1pm US Central Time

NMC Beyond the Horizon > Integrating Student Data Across Platforms

The growing use of data mining software in online education has great potential to support student success by identifying and reaching out to struggling students and streamlining the path to graduation. This can be a challenge for institutions that are using a variety of technology systems that are not integrated with each other. As institutions implement learning management systems, degree planning technologies, early alert systems, and tutor scheduling that promote increased interactions among various stakeholders, there is a need for centralized aggregation of these data to provide students with holistic support that improves learning outcomes. Join us to hear from an institutional exemplar who is building solutions that integrate student data across platforms. Then work with peers to address challenges and develop solutions of your own.

+++++++++++++++++++++++
more on altmetrics in this IMS blog
https://blog.stcloudstate.edu/ims?s=altmetrics

more on big data in this IMS blog
https://blog.stcloudstate.edu/ims?s=big+data

digital badges and micro credentials

per Tom Hergert (thank you)

AECT-OTP Webinar: Digital Badges and Micro-Credentials for the Workplace

Time: Mar 27, 2017 1:00 PM Central Time (US and Canada)

Learn how to implement digital badges in learning environments. Digital badges and micro-credentials offer an entirely new way of recognizing achievements, knowledge, skills, experiences, and competencies that can be earned in formal and informal learning environments. They are an opportunity to recognize such achievements through credible organizations that can be integrated in traditional educational programs but can also represent experience in informal contexts or community engagement.  Three guiding questions will be discussed in this webinar: (1) digital badges’ impact on learning and assessment, (2) digital badges within instructional design and technological frameworks, and (3) the importance of stakeholders for the implementation of digital badges.

Dirk Ifenthaler is Professor and Chair of Learning, Design and Technology at University of Mannheim, Germany and Adjunct Professor at Curtin University, Australia. His previous roles include Professor and Director, Centre for Research in Digital Learning at Deakin University, Australia, Manager of Applied Research and Learning Analytics at Open Universities, Australia, and Professor for Applied Teaching and Learning Research at the University of Potsdam, Germany. He was a 2012 Fulbright Scholar-in-Residence at the Jeannine Rainbolt College of Education, at the University of Oklahoma, USA

Directions to connect via Zoom Meeting:
Join from PC, Mac, Linux, iOS or Android: https://zoom.us/j/8128701328
Or iPhone one-tap (US Toll):  +14086380968,8128701328# or +16465588656,8128701328#
Or Telephone:
Dial: +1 408 638 0968 (US Toll) or +1 646 558 8656 (US Toll)
Meeting ID: 812 870 1328
International numbers available: https://zoom.us/zoomconference?m=EedT5hShl1ELe6DRYI58-DeQm_hO10Cp

+++++++++++++++++++++++++++++
Notes from the webinar
http://www.springer.com/education+%26+language/learning+%26+instruction/journal/10758

Technology, Knowledge and Learning

 and

14th International Conference on  Cognition and Exploratory Learning in Digital Age 2017 18 – 20 October Vilamoura, Algarve, Portugal

http://celda-conf.org/

learning is a process, not a product.

Each student learns differently and assessment is not linear. Learning for different students can be a longer or shorter path.

representation graph:

assessment comes before badges

what are credentials:
how well i can show my credentials: can i find it, can i translate it, issuer, earner, achievement description, date issued.

the potential to become an alternative credentialing system to link directly via metadata to validating evidence of educational achievements.

DB is not an assessment, it is the ability to demonstrate the assessment.
They are a motivational mechanism, supporting alternative forms of assessment, a way to credentialize learning, charting learning pathways, support self-reflection and planning

digital humanities for librarians

Introduction to Digital Humanities for Librarians

Instructor: John Russell Dates: April 3rd to 28th, 2017 Credits: 1.5 CEUs Price: $175

http://libraryjuiceacademy.com/112-digital-humanities.php

Digital humanities (DH) has been heralded as the next big thing in humanities scholarship and universities have been creating initiatives and new positions in this field. Libraries, too, have moved to create a presence in the digital humanities community, setting up centers and hiring librarians to staff them. This course is designed as an introduction for librarians or library school students who have little or no exposure to DH and wish to be better positioned to offer DH support or services in a library setting. Participants will read and discuss DH scholarship, learn about frequently-used software, and think about why and how libraries and librarians engage DH. While I will encourage participants to explore more complex computing approaches (and I will support those who do as best I can), this course does not presuppose computing skills such as programming or use of the command line and will not ask participants to do much more than upload files to websites or install and use simple programs. Participants should have an interest and background in humanities scholarship and humanities librarianship and while the readings will focus on activities in the United States, our discussions can be more geographically wide-ranging.

Objectives:

– A basic knowledge of what digital humanities is and how it effects scholarship in the humanities disciplines.

– Exposure to core tools and approaches used by digital humanists.

– An understanding of how libraries and librarians have been involved with digital humanities.

– Critical engagement with the role of librarians and libraries in digital humanities.

This class has a follow-up, Introduction to Text Encoding

http://libraryjuiceacademy.com/133-text-encoding.php

John Russell is the Associate Director of the Center for Humanities and Information at Pennsylvania State University. He has been actively involved in digital humanities projects, primarily related to text encoding, and has taught courses and workshops on digital humanities methods, including “Introduction to Digital Humanities for Librarians.”

Read an interview with John Russell about this class:

http://libraryjuiceacademy.com/news/?p=769

+++++++++++++++++

more on digital humanities in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+humanities

Susan Grajek at Bryan Alexander on IT and education

Susan Grajek at Bryan Alexander on IT and education

Forum takes a deep dive into higher education and technology. On Thursday, March 23rd, from 2-3 pm EST we will be joined by Susan Grajek, the vice president for communities and research at EDUCAUSE

+++++++++++++++++++

Top 10 IT Issues, 2017: Foundations for Student Success

OpenRefine

http://openrefine.org/

A free, open source, powerful tool for working with messy data

OpenRefine (formerly Google Refine) is a powerful tool for working with messy data: cleaning it; transforming it from one format into another; and extending it with web services and external data.

Please note that since October 2nd, 2012, Google is not actively supporting this project, which has now been rebranded to OpenRefine. Project development, documentation and promotion is now fully supported by volunteers.

++++++++++++++++++++++
more on big data in this IMS blog
https://blog.stcloudstate.edu/ims?s=big+data

CIA hacks

WikiLeaks: Here’s how the CIA hacks your phones, TVs and PCs

The organization released thousands of documents it claims show how the US spy agency can crack open devices from Apple, Samsung, Google and Microsoft.

  https://www.cnet.com/news/wikileaks-cia-hacking-tools-phones-apple-samsung-microsoft-google/

This debate took off when the US Department of Justice sought to require Apple to help it open an encrypted iPhone belonging to one of the San Bernardino shooters. After Apple fought back in court, the FBI said it had obtained another way to access the phone.

Apple, Google and Motorola declined to comment on WikiLeaks’ claims. Samsung didn’t respond to a request for comment.

“The CIA/Wikileaks story today is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption,” said Moxie Marlinspike, the founder of Signal. “This story isn’t about Signal or WhatsApp, but to the extent that it is, we see it as confirmation that what we’re doing is working.”

Telegram said on its website that the problem lies with operating systems and not encrypted messaging apps and that naming specific encrypted services is “misleading.” WhatsApp declined to comment.

+++++++++++++++++++++++++++++++
more on surveillance in this IMS blog
https://blog.stcloudstate.edu/ims?s=surveillance

cybersecurity grants

Grant program would support state, local cybersecurity

By Mark Rockwell Mar 02, 2017

https://fcw.com/articles/2017/03/02/state-cyber-bill-rockwell.aspx

The proposed legislation, said the lawmakers, would set up a cybersecurity grant program that would provide resources for states to develop and implement effective cyber resiliency plans, including efforts to identify, detect, protect, respond, and recover from cyber threats. It also would encourage development of a stronger cybersecurity workforce.

++++++++++++++++
more on cybersecurity in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

1 80 81 82 83 84 114