Posts Tagged ‘mobile devices’
7 Places to Create Your Own Educational Games for Students to Play at Home
ProProfs Brain Games provides templates for building interactive crossword puzzles, jigsaw puzzles, word searches, hangman games, and sliding puzzle games. The games you create can be embedded into your blog or shared via email, social media, or any place that you’d typically post a link for students. If you don’t want to take the time to create your own game, you can browse the gallery of games. Most of the games in gallery can be embedded into your blog.
ClassTools.net templates for creating map-based games, word sorting games, matching games, and many more common game formats.
Purpose Games is a free service for creating and or playing simple educational games. The service currently gives users the ability to create seven types of games. Those game types are image quizzes, text quizzes, matching games, fill-in-the-blank games, multiple choice games, shape games, and slide games.
TinyTap is a free iPad app and Android app that enables you to create educational games for your students to play on their iPads or Android tablets. Through TinyTap you can create games in which students identify objects and respond by typing, tapping, or speaking. You can create games in which students complete sentences or even complete a diagram by dragging and dropping puzzle pieces.
Wherever I’ve demonstrated it in the last year, people have been intrigued by Metaverse. It’s a free service that essentially lets you create your own educational versions of Pokemon Go. This augmented reality platform has been used by teachers to create digital breakout games, augmented reality scavenger hunts, and virtual tours.
There was a time when Kahoot games could only be played in the classroom and only created on your laptop. That is no longer the case. Challenge mode lets you assign games to your students to play at home or anywhere else on their mobile devices.
You can even share those challenges through Remind. And the latest update to Kahoot enables you and your students to build quiz games on your mobile devices.
Flippity’s assortment of game templates.
In Major Privacy Win, Supreme Court Rules Police Need Warrant To Track Your Cellphone
June 22, 201810:41 AM ET
Cellphone providers routinely keep location information for customers to help improve service. And until now, the prevailing legal theory was that if an individual voluntarily shares his information with a third party — for instance, by signing up for cellphone service — police can get that information without a search warrant.
On Friday, the Supreme Court blew a hole in that theory. Writing for the court majority, Chief Justice John Roberts said that cellphone location information is a “near perfect” tool for government surveillance, analogous to an electronic monitoring ankle bracelet.
While Friday’s decision may limit the government’s access to cellphone data, it has no impact on the ability of private companies to amass, use and sell their customers’ information. That is because the Fourth Amendment only limits government conduct, not private conduct. Only Congress, in enacting legislation, can limit how private companies amass and use information.
Aral Balkan: https://blog.stcloudstate.edu/lib290/2018/03/01/duckduckgo-privacy-free-service/
more on privacy and surveillance in this IMS blog
Are your phone camera and microphone spying on you?
Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber
Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:
- Access both the front and the back camera.
- Record you at any time the app is in the foreground.
- Take pictures and videos without telling you.
- Upload the pictures and videos without telling you.
- Upload the pictures/videos it takes immediately.
- Run real-time face recognition to detect facial features or expressions.
- Livestream the camera on to the internet.
- Detect if the user is on their phone alone, or watching together with a second person.
- Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.
For instance, here’s a Find my Phone application which a documentary maker installed on a phone, then let someone steal it. After the person stole it, the original owner spied on every moment of the thief’s life through the phone’s camera and microphone.
- Edward Snowden revealed an NSA program called Optic Nerves. The operation was a bulk surveillance program under which they captured webcam images every five minutes from Yahoo users’ video chats and then stored them for future use. It is estimated that between 3% and 11% of the images captured contained “undesirable nudity”.
- Government security agencies like the NSA can also have access to your devices through in-built backdoors. This means that these security agencies can tune in to your phone calls, read your messages, capture pictures of you, stream videos of you, read your emails, steal your files … at any moment they please.
Hackers can also gain access to your device with extraordinary ease via apps, PDF files, multimedia messages and even emojis.
An application called Metasploit on the ethical hacking platform Kali uses an Adobe Reader 9 (which over 60% of users still use) exploit to open a listener (rootkit) on the user’s computer. You alter the PDF with the program, send the user the malicious file, they open it, and hey presto – you have total control over their device remotely.
Once a user opens this PDF file, the hacker can then:
- Install whatever software/app they like on the user’s device.
- Use a keylogger to grab all of their passwords.
- Steal all documents from the device.
- Take pictures and stream videos from their camera.
- Capture past or live audio from the microphone.
- Upload incriminating images/documents to their PC, and notify the police.
And, if it’s not enough that your phone is tracking you – surveillance cameras in shops and streets are tracking you, too
- You might even be on this website, InSeCam, which allows ordinary people online to watch surveillance cameras free of charge. It even allows you to search cameras by location, city, time zone, device manufacturer, and specify whether you want to see a kitchen, bar, restaurant or bedroom.
more on privacy in this IMS blog
more on surveillance in this IMS blog
As online education expands, students are bringing old-fashioned cheating into the digital age
According to the latest report from Babson Survey Research Group, nearly 6.5 million American undergraduates now take at least one course online
1. Listen to students and faculty. Every college, university, or online-learning provider has a different approach to online learning. At Indiana University, where more than 30 percent of students take at least one online course, the online education team has launched Next.IU, an innovative pilot program to solicit feedback from the campus community before making any major edtech decision. By soliciting direct feedback from students and faculty, institutions can avoid technical difficulties and secure support before rolling out the technology campus-wide.
2. Go mobile. Nine in 10 undergraduates own a smartphone, and the majority of online students complete some coursework on a mobile device. Tapping into the near-ubiquity of mobile computing on campus can help streamline the proctoring and verification process. Rather than having to log onto a desktop, students can use features like fingerprint scan and facial recognition that are already integrated into most smartphones to verify their identity directly from their mobile device.
For a growing number of students, mobile technology is the most accessible way to engage in online coursework, so mobile verification provides not only a set of advanced security tools, but also a way for universities to meet students where they are.
3. Learn from the data. Analytical approaches to online test security are still in the early stages. Schools may be more susceptible to online “heists” if they are of a certain size or administer exams in a certain way, but institutions need data to benchmark against their peers and identify pain points in their approach to proctoring.
In an initial pilot with 325,000 students, for instance, we found that cheating rose and fell with the seasons—falling from 6.62 percent to 5.49 percent from fall to spring, but rising to a new high of 6.65 percent during the summer.
more on proctoring in this IMS blog
How social media is socially stunting our society: An anthropologist and acclaimed journalist shares his warnings
Monday, November 20, 2017 by: Rita Winters
One of the founders of Facebook, Sean Parker, explains that these social media devices exploit the vulnerability of the human essence. The dopamine that is social media only creates a narcissistic, self-validating loops that consume valuable time and conscious attention. “Liking”, “commenting”, and “sharing” (which are virtually useless in reality) causes us to run around an endless cycle of insignificant information documentation in hopes of acknowledgment, which later on propels us to create more of the same.
Social media platform owners and creators are aware of this weakness in human psychology, and are taking advantage of it. Parker is just one of the many individuals who regret having a hand in creating these life-stagnating technologies. The mental health of the global population is deteriorating and is mostly due to anxieties produced by social media.
more on contemplative computing in this IMS blog
How Has Google Affected The Way Students Learn?
con?:with the advent of personal assistants like Siri and Google Now that aim to serve up information before you even know you need it, you don’t even need to type the questions.
pro: Whenever new technology emerges — including newspapers and television — discussions about how it will threaten our brainpower always crops up, Harvard psychology professor Steven Pinker wrote in a 2010 op-ed in The New York Times. Instead of making us stupid, he wrote, the Internet and technology “are the only things that will keep us smart.”
Pro and con: Daphne Bavelier, a professor at the University of Geneva, wrote in 2011 that we may have lost the ability for oral memorization valued by the Greeks when writing was invented, but we gained additional skills of reading and text analysis.
con: Daphne Bavelier, a professor at the University of Geneva, wrote in 2011 that we may have lost the ability for oral memorization valued by the Greeks when writing was invented, but we gained additional skills of reading and text analysis.
con: A 2008 study commissioned by the British Library found that young people go through information online very quickly without evaluating it for accuracy.
pro or con?: A 2011 study in the journal Science showed that when people know they have future access to information, they tend to have a better memory of how and where to find the information — instead of recalling the information itself.
pro: The bright side lies in a 2009 study conducted by Gary Small, the director of University of California Los Angeles’ Longevity Center, that explored brain activity when older adults used search engines. He found that among older people who have experience using the Internet, their brains are two times more active than those who don’t when conducting Internet searches.
the Internet holds great potential for education — but curriculum must change accordingly. Since content is so readily available, teachers should not merely dole out information and instead focus on cultivating critical thinking
make questions “Google-proof.”
“Design it so that Google is crucial to creating a response rather than finding one,” he writes in his company’s blog. “If students can Google answers — stumble on (what) you want them to remember in a few clicks — there’s a problem with the instructional design.”
more on use of laptop and phones in the classroom in this IMS blog
3 Tips for Managing Phone Use in Class
Setting cell phone expectations early is key to accessing the learning potential of these devices and minimizing the distraction factor.Liz Kolb September 11, 2017
Ten is now the average age when children receive their first cell phones
Ask your students questions such as:
- What do you like to do on your cell phone and why? (If they don’t have one, what would they like to do?)
- What are the most popular apps and websites you use?
- What do you think are inappropriate ways that cell phones have been used?
- What is poor cell phone etiquette? Why?
- How can cell phones help you learn?
- How can cell phones distract from your learning?
- How do you feel about your cell phone and the activities you do on your phone?
- What should teachers know about your cell phone use that you worry we do not understand?
- Do you know how to use your cell phone to gather information, to collaborate on academic projects, to evaluate websites?
- How can we work together to create a positive mobile mental health?
Using a Stoplight Management Approach
Post a red button on the classroom door: the cell phone parking lot.
Post a yellow button on the classroom door
Post a green button on the classroom door
Establishing a Class Contract: Ask them to brainstorm consequences and write them into a class contract.
more on the use of BYOD in this IMS blog
Report: Google Gaining in U.S. Classrooms, Apple’s iOS Slipping
By Richard Chang 06/21/17
some of the findings in Kahoot!’s first-ever EdTrends Report :
Google is gaining a stronghold in United States classrooms, with Chrome OS expanding its presence on school computers, while Apple’s iOS has been on the decline since the first quarter of 2015 among students and teachers.
Chromebook had the highest number of users among teachers (44 percent) and students (46 percent), when they were asked about their top devices used. Google’s Productivity Suite (G Suite or Classroom) was the most widely used productivity suite in U.S. classrooms, with 57 percent saying they used it, compared to 23 percent saying they used Microsoft Office 365.
a majority of educators (more than 60 percent) said the purpose of adopting education technology was to increase student productivity and efficiency. Their key educational priorities for 2017-18 are “to improve student learning and outcomes” (88 percent), and to “better leverage available time and motivate students” (71 percent).
Educators saw the top ed tech trends in the next school year as:
- Digital platforms for teaching, learning and assessment;
- Personalized learning;
- Computational thinking, coding and robotics;
- Increased understanding of data; and
Some other key findings in the report include:
- A majority of U.S. public school educators surveyed said they are challenged with budget restraints and lack of resources when it comes to implementing education technology;
- A majority of U.S. private school educators said they lack training to understand or adopt new technology;
- Many public and private school educators said they saw the adoption of “technology for the sake of technology” as a challenge;
- Educators in California struggle with lack of training and “technology for the sake of technology,” while teachers in Texas struggle with bureaucracy, budget constraints and a lack of resources.
The complete report can be read on the Kahoot! website here. Kahoot! will be at the International Society for Technology in Education (ISTE) conference
Milwaukee Public Schools to Receive Hotspots, Tablets, Smartphones from Sprint
By Sri Ravipati 06/19/17
Milwaukee Public Schools (MPS), will be receiving some tech handouts from Sprint for the 2017-2018 school year. As part of the company’s 1Million Project — which aims to deliver high-speed internet access to 1 million high school students nationwide — more than 2,500 students at 25 MPS high schools will each receive either a hotspot device, tablet or smartphone.
MPS students will be receiving devices that come with 3GB of high-speed LTE data (with unlimited data available at 2G speeds if usage exceeds that amount). Students can keep their device up to four years while they are in high school no cost, according to initiative site. Additionally, devices are equipped with filters to block adult content that cannot be disabled and are Free Children’s Internet Protection Act (CIPA) compliant.
more about mobile devices in education in this IMS blog
1 2 3 Next