some of the findings in Kahoot!’s first-ever EdTrends Report : Google is gaining a stronghold in United States classrooms, with Chrome OS expanding its presence on school computers, while Apple’s iOS has been on the decline since the first quarter of 2015 among students and teachers.
Chromebook had the highest number of users among teachers (44 percent) and students (46 percent), when they were asked about their top devices used. Google’s Productivity Suite (G Suite or Classroom) was the most widely used productivity suite in U.S. classrooms, with 57 percent saying they used it, compared to 23 percent saying they used Microsoft Office 365.
a majority of educators (more than 60 percent) said the purpose of adopting education technology was to increase student productivity and efficiency. Their key educational priorities for 2017-18 are “to improve student learning and outcomes” (88 percent), and to “better leverage available time and motivate students” (71 percent).
Educators saw the top ed tech trends in the next school year as:
Digital platforms for teaching, learning and assessment;
Personalized learning;
Computational thinking, coding and robotics;
Increased understanding of data; and
Gamificiation.
Some other key findings in the report include:
A majority of U.S. public school educators surveyed said they are challenged with budget restraints and lack of resources when it comes to implementing education technology;
A majority of U.S. private school educators said they lack training to understand or adopt new technology;
Many public and private school educators said they saw the adoption of “technology for the sake of technology” as a challenge;
Educators in California struggle with lack of training and “technology for the sake of technology,” while teachers in Texas struggle with bureaucracy, budget constraints and a lack of resources.
MPS students will be receiving devices that come with 3GB of high-speed LTE data (with unlimited data available at 2G speeds if usage exceeds that amount). Students can keep their device up to four years while they are in high school no cost, according to initiative site. Additionally, devices are equipped with filters to block adult content that cannot be disabled and are Free Children’s Internet Protection Act (CIPA) compliant.
Videotapes Are Becoming Unwatchable As Archivists Work To Save Them
Scott Greenstone
Kidd and the others are archivists and preservationists, and they’re part of a group called XFR Collective (pronounced Transfer Collective). Most work professionally, but they volunteer their free time to do this.
That’s because research suggests that tapes like this aren’t going to live beyond 15 to 20 years. Some call this the “magnetic media crisis,” and archivists, preservationists, and librarians like the ones in the XFR Collective are trying to reverse it.
Some are old videos of police brutality; others are just weddings or old public access TV that isn’t saved anywhere else. All tapes are from people who want their content to be publicly available, and after the tapes are transferred, they’re stored on the nonprofit Internet Archive. To date, they’ve transferred 155 tapes—67 hours in total.
Of course, this doesn’t guarantee that they will be saved forever. Digital has its own problems, and Lukk says that some film preservationists argue we should be looking back to before magnetic media for stable preservation — many Hollywood films, for instance, are often stored on film in salt mines, where they can last 100 years.
a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.
53 percent of survey respondents reported a year-over-year increase in cyber attacks;
62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
16 percent do not have an incident response plan.
65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
More than half say cyber security professionals “lack an ability to understand the business”;
One in four organizations allot less than $1,000 per cyber security team member for training; and
About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.
++++++++++++++++++++++++++
IoT to Represent More Than Half of Connected Device Landscape by 2021
analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.
IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.
Etiquette is the proper way to behave and Ethics studies ideas about good and bad behavior. Both combine into Professionalism, which is the skill, good judgment, and polite behavior expected from a person trained to do a job such as social media marketing. Because social media blurs the lines between our personal and professional lives it is useful to look at actions in social media from three perspectives: Personal (as an individual), Professional (as an employee or perspective employee) and Brand (as an organization). To simplify the discussion I have created questions for each category in the Social Media Etiquette and Ethics Guide below. Click here to download.
Before you post or comment in a personal capacity consider:
Is it all about me? No one likes someone who only talks about themselves. The same applies in social media. Balance boasting with complimenting.
Am I stalking someone? It is good to be driven and persistent but be careful not to cross the line into creepy. Don’t be too aggressive in outreach.
Am I spamming them? Not everything or even the majority of what you post should ask for something. Don’t make everything self-serving.
Am I venting or ranting? Venting and ranting may feel good, but research says it doesn’t help and no matter how justified you feel, it never presents you in a positive light. Do not post negative comments or gossip.
Did I ask before I tagged? You had a great time and want to share those memories, but your friends, family or employer may have different standards than a friends. Check before you tag people in posts.
Did I read before commenting or sharing? Don’t make yourself look foolish by not fully reviewing something you are commenting on or sharing with others. Don’t jump to conclusions.
Am I grateful and respectful? Don’t take people for granted. Respond and thank those who engage with you.
Is this the right medium for the message? Not everything should be said in social media. Consider the feelings of the other person. Some messages should be given in person, by phone or email.
Am I logged into the right account? There are too many corporate examples of embarrassing posts meant for personal jokes that went out on official brand accounts. Always double check which account you are on. Don’t post personal information on brand accounts.
Before you post or comment as a professional consider:
Does it meet the Social Media Policy? Most organizations have official social media policies that you probably received when hired. Don’t assume you know what the policy says. Many employees have been fired for not following company social media regulations. Make sure you know and follow employer or client requirements.
Does it hurt my company’s reputation? No matter how many disclaimers you put on your accounts such as “views are my own” certain content and behavior will negatively impact your employer. If your bio states where you work, your personal account represents your employer.
Does it help my company’s marketing? Employee advocacy is an important strategy. Have a positive impact on your company’s image and when you can advocate for your brand in social.
Would my boss/client be happy to see it? You may not have “friended” your boss or client but a co-worker may have and your post is only a share or screen grab away. Even private accounts are never fully private.
Am I being open about who I work for? It is good to post positive content about your employer and it is nice to receive gifts, but if you are trying to pass it off as unbiased opinion that is wrong. Be transparent about your financial connections.
Am I being fair and accurate? Everyone is entitled to their person opinion, but if your opinion tends to always be unfounded and seems to have an agenda it will reflect negatively upon you. Criticism is welcome when it is constructive and opinion is backed by evidence.
Am I being respectful and not malicious? People can get very insensitive, judgmental and angry in social media posts. That does not convey a professional image. Don’t post what you wouldn’t say in person. Even an outburst in person fades in memory, but a malicious post is there forever.
Does it respect intellectual property? Not everything on the Internet is free. Check for or get permission to post company or client brand assets and content.
Is this confidential information? As an employee or contractor you are granted access to privileged and confidential information. Don’t assume it is fine to share. Do not disclose non-public company or client information.
Before posting or commenting as a brand on a social account consider:
Does it speak to my target market? Social media is unique from traditional marketing and requires a different perspective to be effective. Be sure to focus on your target’s wants and needs not yours.
Does it add value? Social media only works if people view and share it. Make your content educational, insightful or entertaining to grab interest and draw engagement.
Does it fit the social channel? Don’t post content ideal for Twitter on Instagram or Reddit. Each channel has its own culture and community. Make sure each post fits the channel’s environment, mission and policies or standards.
Is it authentic and transparent? Trying to trick people into clicking a link or making a purchase will get you nowhere. Don’t hide or exclude any relevant information.
Is it real and unique? Bots can automate tasks and be a great time saver, but use them for the right actions. Don’t use auto responses and create anything that could be perceived as spam.
Is it positive and respectful? It may be fine to talk trash about competitors or complain about customers in the office, but not in social media. Don’t badmouth the competition or customers.
Does it meet codes of conduct? As professionals we are part of trade associations that set standards of conduct. Be sure you are meeting these ethical standards such as the Word of Mouth Marketing Association’s Code of Ethics.
Does it meet all laws and regulations? Government has been catching up with social media and have issued regulations and laws you must follow. See guides on requirements like the FTC social media endorsement guidelines.
Does it meet the Social Media Policy? Most likely your brand or a client’s brand has a social media policy. Ensure you follow your own company standards.
Here’s an easy way to explain IoT hacks to students:
A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.
a few tips that students can use to protect their privacy while using smartphones:
Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.
Bornett, C. C. (2016). Leseförderung digital genial: WieTablets die Bibliothekspädagogik verändern / Tipps nicht nur für Bilderbuch-Apps. (German). Bub: Forum Bibliothek Und Information, 68(10), 606-608.
Correlation and regression analysis based on survey data revealed that the attributes of digital natives are poor predictors of IL. information and communication technologies (ICT) experiences expressed as the sum of the use of different applications do not necessarily contribute to IL; some applications have a positive and some a negative effect; personal ownership of smartphones, portable computers and desktop computers has no direct effect on IL, while ownership of a tablet computer is actually a negative predictor; personal ownership of ICT devices has an impact on ICT experiences and Internet confidence, and, therefore, an indirect impact on IL; and ICT-rich university courses (if not designed to cultivate IL) have only a marginal impact on IL, although they may have some impact on ICT experiences and Internet confidence. The overall conclusion is that digital natives are not necessarily information literate, and that IL should be promoted with hands-on and minds-on courses based on IL standards.
Sharman, A. (2014). Roving Librarian: The Suitability of Tablets in Providing Personalized Help Outside of the Traditional Library. New Review Of Academic Librarianship, 20(2), 185-203. doi:10.1080/13614533.2014.914959
Eyal, L. (2012). Digital Assessment Literacy — the Core Role of the Teacher in a Digital Environment. Journal Of Educational Technology & Society, 15(2), 37-49.
Common to all is a view of the level of literacy as a measure of the quality of human capital of a society or a particular area. Literacy develops in interaction with the environment (Vygotsky, 1987).
digital assessment literacy refers to the role of the teacher as an assessor in a technology-rich environment.
Learning Management Systems (LMS) benefits and limitations
Measurement allows quantitative description of a particular characterization of an individual, expressed in numbers.
the combination of assessment and measurement provides a thorough and accurate picture, based upon which practical conclusions can be drawn (Wagner, 1997). A test is a systematic process in which an aspect of student behavior is quantitatively evaluated (Suen & Parkes, 2002).
For several decades this system of assessment has been criticized for a variety of reasons, including the separation between the teaching-learning process and the evaluation process, the relatively low level of thinking required, and the quantitative reporting of results, which does not contribute to students’ progress. In the last decade, the central argument against the tests system is that their predictability is limited to the field and context in which the students are tested, and that they do not predict student problem solving ability, teamwork, good work habits and honesty.
teachers mistakenly believe that repeating lessons will improve students’ achievements.
To evaluate how well the goals were achieved, objective measurement methods are employed (Black, et al., 2004).
Eshet- Alkalai (2004) offered a detailed conceptual framework for the term ‘digital literacy’ that includes: photo-visual thinking; reproduction thinking; branching thinking; information thinking; and socio-emotional thinking.
Eshet-Alkalai, Y. (2004). Digital literacy: A conceptual framework for survival skills in the digital era. Journal of Educational Multimedia and Hypermedia, 13(1), 93–106.
Eshet-Alkalai, Y., & Chajut, E. (2009). Changes Over Time in Digital Literacy. Cyberpsychology & Behavior, 12(6), 713-715. doi:10.1089/cpb.2008.0264
two major patterns of change over time: (a) closing the gap between younger and older participants in the tasks that emphasize profi- ciency and technical control and (b) widening the gap between younger and older participants in tasks that emphasize creativity and critical thinking. Based on the comparison with the matched control groups, we suggest that experience with technology, and not age, accounts for the observed lifelong changes in digital literacy skills
Eshet-Alkalai, Y., & Soffer, O. (2012). Guest Editorial – Navigating in the Digital Era: Digital Literacy: Socio-Cultural and Educational Aspects. Journal Of Educational Technology & Society, 15(2), 1.
a wide range of technological, cognitive and social competences—collectively termed “DigitalLiteracy.” Users thus must become “digitally literate” in order to cope effectively with the complex sociological, cognitive and pedagogical challenges these technologies pose. These skills include, for example, the ability to operate computers and navigate the net effectively, to cope with large volumes of information, to evaluate the reliability of information, and to critically assess what seem to be natural (and not ideologically biased) technological tools. In a different way from the spirit of modern print, learners construct and consume knowledge in non-linear environments. They need to learn, collaborate and solve problems effectively in virtual (non face-to-face) learning environments, and to communicate effectively in technology-mediated social participation environments.
It is important to note: digital literacy, then, is not limited simply to computer and Internet operation and orientation. It also relates to a variety of epistemological and ethical issues arise due to the unique characteristics of digital technologies and that are often overlapped with trends related to the post-modern and post-structural era. These include questions regarding the authority of knowledge, intellectual property and ownership, copyright, authenticity and plagiarism. Furthermore, issues such as self-representation, virtual group dynamics, and on-line addiction also arise.
shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.
One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.
Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.
Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services
EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.
“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.
Introduction (5-10 min)
Plamen: http://web.stcloudstate.edu/pmiltenoff/faculty/
students: interests and related information
Group assignment (5-10 min)
Effective communication strategies. List 3-5 and discuss the pros and cons (what makes them effective and are there any impediments, limitations)
Class discussion on effective communication strategies: based on the group work findings, how do you think digital storytelling may be [can it be] an effective communication tool
What is Storytelling? How does it differ from Digital Storytelling?
Rossiter & Garcia (2010) consider “digital stories are short vignettes that combine the art of telling stories with multimedia objects including images, audio, and video” (p. 37)
Is Digital Storytelling more then just storytelling on technology steroids?
What is Digital Storytelling (DS) for school leadership? A bibliographic research reveals a plenitude of research on DS in the classroom, for educators, but not much for educational leaders.
Guajardo, Oliver, Rodrigez, Valcez, Cantu, & Guajardo (2011) view digital storytelling for emerging educational leaders as “as a process for data creation, analysis, and synthesis.”
There is information for corporate leaders or community leaders and DS, but not much for ed leaders.
Let’s create our own understanding of digital storytelling for educational leaders.
Basic definitions, concepts and processes.
Learn about Web 1.0 versus Web 2.0; the Cloud; transliteracy and multiliteracy
Multimodal Literacy refers to meaning-making that occurs through the reading, viewing, understanding, responding to and producing and interacting with multimedia and digital texts. It may include oral and gestural modes of talking, listening and dramatising as well as writing, designing and producing such texts. The processing of modes, such as image, words, sound and movement within texts can occur simultaneously and is often cohesive and synchronous. Sometimes specific modes may dominate.
group work (15-20) min
split in groups of 3: an ed leader, a media specialist (or teacher with technology background) and a teacher (to represent a school committee on community relations)
you have 5 min to research (Internet, access to school resources) and 5-10 min to come up with a strategy for use of digital storytelling for expanding and improving community relationship
Base your strategy on existing examples.
E.g.:
Do the following electronic resources regarding this particular educational institution relay digital story: http://strideacademy.org/ https://www.facebook.com/StrideAcademy/ https://twitter.com/search?q=Stride%20Academy%20Charter%20School&src=tyah https://youtu.be/eekIUqMQ4v0
What do you like?
What would you do differently?
Digital Storytelling for building, expanding, improving community relations – final thoughts
**********************
literature:
Rossiter, M., & Garcia, P. A. (2010). Digital storytelling: A new player on the narrative field.
New Directions For Adult & Continuing Education, 2010(126), 37-48. http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.
com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d51532202%26
site%3dehost-live%26scope%3dsite