Challenges and Issues: A Conversation Regarding Micro-Credentials
Level: Foundational
Location: Cedar
Alternative Credentials are important to the future of understanding cradle-to-career opportunities in Professional Education. Institutions interested in considering the use of micro-credentialing face many challenges and issues. This session will be presented from the perspective of panelists who are dealing with the issues and challenges of alternative credentials. The panelists will suggest pathways for institutions to consider as they work toward cradle-to-career opportunities.
Janet Staker Woemer, University of Wisconsin
Linda Kingston, Winona State University
Patricia Cook, University of Arizona
Asim Ali, Auburn University
Jacqui Williams, University of Melbourne
Moderator: Ray Schroeder, University of Illinois Springfield
Anchor allows users to record and edit podcast episodes, all through an app on their cellphones. The service distributes and uploads episodes to streaming services, such as Spotify and Apple Podcasts, and provides analytics following publication.
“Traditionally, it’s write, write, write, write, write, and if you’re not a strong writer, you may start to think you’re not good at an English class in general.”
Podcasts that require scripts similarly encourage students to explore writing formats that stray from the traditional essay.
“When it’s just my eyes seeing it, it’s one-on-one and I’m the safety net,” Stevens said. “Even when you open it up to their classmates, they realize ‘OK, I’m going to be judged by them,’ and then you open it up to the internet. It’s a big deal.”
Last spring, cinematic arts and broadcast journalism teacher Michael Hernandez introduced his 11th and 12th graders to podcasting to teach them speaking skills that could be necessary for upcoming college or job interview.
zSpace is a technology firm based in Sunnyvale, California that combine elements of virtual and augmented reality in a computer. zSpace allows people to interact with simulated objects in virtual environments as if they are real.[1][2][3]
Give your students the chance to learn science in an engaging and effective way with Labster’s virtual labs.
Labster offers students a true-to-life lab experience at a fraction of the cost of a real lab.
You can supplement your teaching with virtual labs to prepare your students for the wet lab, to help them understand difficult concepts, to engage them with your science course, and more.
n our virtual lab simulations, students work through real-life case stories, interact with lab equipment, perform experiments and learn with theory and quiz questions.
Thanks to engaging 3D animations, students can explore life science at the molecular level and look inside the machines they are operating. https://www.labster.com/why-choose-labster/
Twenty years have passed since renowned Harvard Professor Larry Lessig coined the phrase “Code is Law”, suggesting that in the digital age, computer code regulates behavior much like legislative code traditionally did.These days, the computer code that powers artificial intelligence (AI) is a salient example of Lessig’s statement.
Good AI requires sound data.One of the principles,some would say the organizing principle, of privacy and data protection frameworks is data minimization.Data protection laws require organizations to limit data collection to the extent strictly necessary and retain data only so long as it is needed for its stated goal.
Preventing discrimination – intentional or not.
When is a distinction between groups permissible or even merited and when is it untoward? How should organizations address historically entrenched inequalities that are embedded in data? New mathematical theories such as “fairness through awareness” enable sophisticated modeling to guarantee statistical parity between groups.
Assuring explainability – technological due process.In privacy and freedom of information frameworks alike, transparency has traditionally been a bulwark against unfairness and discrimination.As Justice Brandeis once wrote, “Sunlight is the best of disinfectants.”
Deep learning means that iterative computer programs derive conclusions for reasons that may not be evident even after forensic inquiry.
Yet even with code as law and a rising need for law in code, policymakers do not need to become mathematicians, engineers and coders.Instead, institutions must develop and enhance their technical toolbox by hiring experts and consulting with top academics, industry researchers and civil society voices.Responsible AI requires access to not only lawyers, ethicists and philosophers but also to technical leaders and subject matter experts to ensure an appropriate balance between economic and scientific benefits to society on the one hand and individual rights and freedoms on the other hand.
Weakest students more likely to take online college classes but do worse in them
Survey of rigorous academic research on online education finds lower grades and higher drop out rates Column by JILL BARSHAY February 4, 2019
According to the most recent federal statistics from 2016, roughly one out of every three or 6.3 million college students learned online. That number is growing even as fewer people are going to college.
Online degrees are also concentrated among a handful of nonprofit universities. Just three — Western Governors University, Liberty University and Southern New Hampshire University — enroll about a third of all online students at private, nonprofit institutions.
overwhelming research evidence that community college students aren’t faring well in online classes
Another 2017 study of students at a for-profit university which offers both in-person and online classes found that students who took an online class not only got lower grades in that class but also in future classes. Online students were more likely to drop out of college altogether than similar students who attended in-person classes.
There are much stronger results for courses that combine supplemental materials online with traditional, face-to-face instruction. But the authors do not consider this hybrid instruction to be “online” learning.
Smartphones also provide an easy way for teachers to “inspire students to positively contribute to and responsibly participate in the digital world,” as espoused by the ISTE Standards for Educators.
research shows that when students are engaged in their learning — and they’re almost always engaged with their phones when given a choice — they are less likely to succumb to distractions.
1. Create short videos.
Videos can express any type of learning in any style, from music videos to interviews, book trailers, historical re-enactments, tutorials and stop animations.
Flipgrid is the one of the best educational video-creation sites
Gartner predicts that nearly 38 percent of companies will stop providing devices to workers by 2017 — but 20 percent of those BYOD programs will fail because of overly restrictive mobile device management measures. So how can IT pros devise a BYOD strategy that stays afloat? Here are six guidelines to accommodate legitimate IT concerns without sinking a policy’s odds of success:
Look to Existing Policies
Before creating a BYOD policy, take a look at existing HR and legal procedures. Many email, VPN, and remote access security policies can be applied to mobile devices, as well.
Provide Training and Education
Employees are using personal devices at work, whether the company realizes it or not. But that doesn’t mean they are using them correctly. Employees often use file-sharing and other tools of their choosing without IT’s knowledge, which could put sensitive corporate data at risk. Use a BYOD policy to trainemployees how to correctly use their applications
Specify Devices
BYOD isn’t limited to smartphones. According to Gartner, a “new norm” is emerging in which employees manage up to four or five devices at work.
Enforce Passwords and Encryption
passwords aren’t foolprool. Data encryption is an additional security measure
A smart BYOD policy doesn’t mean IT is off the hook. Rather, successful policies rely on IT and employees sharing security obligations.
Set Ownership Expectations
Employees often fail to realize that all data on their devices is discoverable, regardless of whether the device is personal or company-owned. The question of who owns what is still a legal gray area, though companies increasingly take the liberty to remote wipe employees’ personal devices once they leave their job. Avoid the guessing game with a clear exit strategy.
Embracing online school requires a new mindset, as well as new criteria for measuring academic success—measures that take into account the nature of teaching and learning online, the types of students online schools serve, and the unique ways in which those students learn.
Teachers interact with students during synchronous learning sessions, and they connect one-on-one through calls, online chats, texts, and interactive whiteboard sessions.
Accountability measures must adapt to and reflect a self-paced, competency-based learning environment. A traditional one-size-fits-all rubric does not translate cleanly with respect to online schools.