Searching for "Internet"

trends mobile devices

Report: Google Gaining in U.S. Classrooms, Apple’s iOS Slipping

By Richard Chang 06/21/17

https://thejournal.com/articles/2017/06/21/report-google-gaining-in-u.s.-classrooms-apples-ios-slipping.aspx

some of the findings in Kahoot!’s first-ever EdTrends Report :
Google is gaining a stronghold in United States classrooms, with Chrome OS expanding its presence on school computers, while Apple’s iOS has been on the decline since the first quarter of 2015 among students and teachers.

Chromebook had the highest number of users among teachers (44 percent) and students (46 percent), when they were asked about their top devices used. Google’s Productivity Suite (G Suite or Classroom) was the most widely used productivity suite in U.S. classrooms, with 57 percent saying they used it, compared to 23 percent saying they used Microsoft Office 365.

a majority of educators (more than 60 percent) said the purpose of adopting education technology was to increase student productivity and efficiency. Their key educational priorities for 2017-18 are “to improve student learning and outcomes” (88 percent), and to “better leverage available time and motivate students” (71 percent).

Educators saw the top ed tech trends in the next school year as:

  • Digital platforms for teaching, learning and assessment;
  • Personalized learning;
  • Computational thinking, coding and robotics;
  • Increased understanding of data; and
  • Gamificiation.

Some other key findings in the report include:

  • A majority of U.S. public school educators surveyed said they are challenged with budget restraints and lack of resources when it comes to implementing education technology;
  • A majority of U.S. private school educators said they lack training to understand or adopt new technology;
  • Many public and private school educators said they saw the adoption of “technology for the sake of technology” as a challenge;
  • Educators in California struggle with lack of training and “technology for the sake of technology,” while teachers in Texas struggle with bureaucracy, budget constraints and a lack of resources.

The complete report can be read on the Kahoot! website here. Kahoot! will be at the International Society for Technology in Education (ISTE) conference

+++++++++++++++++++++++++++++

Milwaukee Public Schools to Receive Hotspots, Tablets, Smartphones from Sprint

By Sri Ravipati 06/19/17

https://thejournal.com/articles/2017/06/19/milwaukee-public-schools-to-receive-hotspots-tablets-smartphones-from-sprint.aspx

Milwaukee Public Schools (MPS), will be receiving some tech handouts from Sprint for the 2017-2018 school year. As part of the company’s 1Million Project — which aims to deliver high-speed internet access to 1 million high school students nationwide — more than 2,500 students at 25 MPS high schools will each receive either a hotspot device, tablet or smartphone.

MPS students will be receiving devices that come with 3GB of high-speed LTE data (with unlimited data available at 2G speeds if usage exceeds that amount). Students can keep their device up to four years while they are in high school no cost, according to initiative site. Additionally, devices are equipped with filters to block adult content that cannot be disabled and are Free Children’s Internet Protection Act (CIPA) compliant.

++++++++++++++
more about mobile devices in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=mobile+devices

archive video tapes

Videotapes Are Becoming Unwatchable As Archivists Work To Save Them

Scott Greenstone

Kidd and the others are archivists and preservationists, and they’re part of a group called XFR Collective (pronounced Transfer Collective). Most work professionally, but they volunteer their free time to do this.

That’s because research suggests that tapes like this aren’t going to live beyond 15 to 20 years. Some call this the “magnetic media crisis,” and archivists, preservationists, and librarians like the ones in the XFR Collective are trying to reverse it.

Some are old videos of police brutality; others are just weddings or old public access TV that isn’t saved anywhere else. All tapes are from people who want their content to be publicly available, and after the tapes are transferred, they’re stored on the nonprofit Internet Archive. To date, they’ve transferred 155 tapes—67 hours in total.

Of course, this doesn’t guarantee that they will be saved forever. Digital has its own problems, and Lukk says that some film preservationists argue we should be looking back to before magnetic media for stable preservation — many Hollywood films, for instance, are often stored on film in salt mines, where they can last 100 years.

 

 

IoT

Survey: IoT Overtakes Mobile as Security Threat

By Rhea Kelly 06/05/17

https://campustechnology.com/articles/2017/06/05/survey-iot-overtakes-mobile-as-security-threat.aspx

a report from ISACA, a nonprofit association focused on knowledge and practices for information systems. The 2017 State of Cyber Security Study surveyed IT security leaders around the globe on security issues, the emerging threat landscape, workforce challenges and more.

  • 53 percent of survey respondents reported a year-over-year increase in cyber attacks;
  • 62 percent experienced ransomware in 2016, but only 53 percent have a formal process in place to address a ransomware attack;
  • 78 percent reported malicious attacks aimed at impairing an organization’s operations or user data;
  • Only 31 percent said they routinely test their security controls, while 13 percent never test them; and
  • 16 percent do not have an incident response plan.
  • 65 percent of organizations now employ a chief information security officers, up from 50 percent in 2016, yet still struggle to fill open cyber security positions;
  • 48 percent of respondents don’t feel comfortable with their staff’s ability to address complex cyber security issues;
  • More than half say cyber security professionals “lack an ability to understand the business”;
  • One in four organizations allot less than $1,000 per cyber security team member for training; and
  • About half of the organizations surveyed will see an increase in their cyber security budget, down from 61 percent in 2016.

++++++++++++++++++++++++++

IoT to Represent More Than Half of Connected Device Landscape by 2021

By Sri Ravipati 06/09/17

https://campustechnology.com/articles/2017/06/09/iot-to-represent-more-than-half-of-connected-device-landscape-by-2021.aspx

20121 prediction for data in North America

analysis comes from Cisco’s recent Visual Networking Index for the 2016-2021 forecast period.

  • IP video traffic will increase from 73 percent of all internet consumer traffic in 2016 to 82 percent in 2021 (with live streaming accounting for 13 percent);
  • Virtual and augmented reality traffic is expected to increase 20-fold during the forecast period at a compound annual growth rate of 82 percent; and
  • Internet video surveillance traffic is anticipated to grow during the forecast period, comprising 3.4 percent of all internet traffic.

To learn more, view the full report.

+++++++++++++++++++++++++++

https://www.ecampusnews.com/campus-administration/internet-things-higher-ed/

By Danielle R. June 14th, 2017
 1. Labeling and Finding
 campus’ buildings were able to transmit interactive map data to a student finding their way around for the first time
2. Booking and Availability
3. Preparation
4. Intervention
As FitBit and other personal wearables become better at tracking various health markers, these markers can be put to use tracking individual patterns in the student body.
 The University of Southern California is currently researching the impact that analyzing IoT-gathered data can have on student performance, but the IoT can be used to prevent more than just academic difficulties.
the privacy concerns such use might raise; as universities implement systems that integrate wearables, they will encounter this hurdle and have to implement policies to address it.
5. Research
Laboratories are often required to be completely controlled spaces with considerations made for climate, light, and sometimes even biometric data inside the lab.

+++++++++++++++++++++
https://blog.stcloudstate.edu/ims?s=internet+of+things
https://blog.stcloudstate.edu/ims?s=iot 

Social Media Etiquette Ethics

Social Media Etiquette & Ethics: A Guide for Personal, Professional & Brand Use.

Published on , Marketing Professor & Researcher

https://www.linkedin.com/pulse/social-media-etiquette-ethics-guide-personal-brand-use-quesenberry

definition:

Etiquette is the proper way to behave and Ethics studies ideas about good and bad behavior. Both combine into Professionalism, which is the skill, good judgment, and polite behavior expected from a person trained to do a job such as social media marketing. Because social media blurs the lines between our personal and professional lives it is useful to look at actions in social media from three perspectives: Personal (as an individual), Professional (as an employee or perspective employee) and Brand (as an organization). To simplify the discussion I have created questions for each category in the Social Media Etiquette and Ethics Guide below. Click here to download.

Before you post or comment in a personal capacity consider:

  1. Is it all about me? No one likes someone who only talks about themselves. The same applies in social media. Balance boasting with complimenting.
  2. Am I stalking someone? It is good to be driven and persistent but be careful not to cross the line into creepy. Don’t be too aggressive in outreach.
  3. Am I spamming them? Not everything or even the majority of what you post should ask for something. Don’t make everything self-serving.
  4. Am I venting or ranting? Venting and ranting may feel good, but research says it doesn’t help and no matter how justified you feel, it never presents you in a positive light. Do not post negative comments or gossip.
  5. Did I ask before I tagged? You had a great time and want to share those memories, but your friends, family or employer may have different standards than a friends. Check before you tag people in posts.
  6. Did I read before commenting or sharing? Don’t make yourself look foolish by not fully reviewing something you are commenting on or sharing with others. Don’t jump to conclusions.
  7. Am I grateful and respectful? Don’t take people for granted. Respond and thank those who engage with you.
  8. Is this the right medium for the message? Not everything should be said in social media. Consider the feelings of the other person. Some messages should be given in person, by phone or email.
  9. Am I logged into the right account? There are too many corporate examples of embarrassing posts meant for personal jokes that went out on official brand accounts. Always double check which account you are on. Don’t post personal information on brand accounts.

Before you post or comment as a professional consider:

  1. Does it meet the Social Media Policy? Most organizations have official social media policies that you probably received when hired. Don’t assume you know what the policy says. Many employees have been fired for not following company social media regulations. Make sure you know and follow employer or client requirements.
  2. Does it hurt my company’s reputation? No matter how many disclaimers you put on your accounts such as “views are my own” certain content and behavior will negatively impact your employer. If your bio states where you work, your personal account represents your employer.
  3. Does it help my company’s marketing? Employee advocacy is an important strategy. Have a positive impact on your company’s image and when you can advocate for your brand in social.
  4. Would my boss/client be happy to see it? You may not have “friended” your boss or client but a co-worker may have and your post is only a share or screen grab away. Even private accounts are never fully private.
  5. Am I being open about who I work for? It is good to post positive content about your employer and it is nice to receive gifts, but if you are trying to pass it off as unbiased opinion that is wrong. Be transparent about your financial connections.
  6. Am I being fair and accurate? Everyone is entitled to their person opinion, but if your opinion tends to always be unfounded and seems to have an agenda it will reflect negatively upon you. Criticism is welcome when it is constructive and opinion is backed by evidence.
  7. Am I being respectful and not malicious? People can get very insensitive, judgmental and angry in social media posts. That does not convey a professional image. Don’t post what you wouldn’t say in person. Even an outburst in person fades in memory, but a malicious post is there forever.
  8. Does it respect intellectual property? Not everything on the Internet is free. Check for or get permission to post company or client brand assets and content.
  9. Is this confidential information? As an employee or contractor you are granted access to privileged and confidential information. Don’t assume it is fine to share. Do not disclose non-public company or client information.

Before posting or commenting as a brand on a social account consider:

  1. Does it speak to my target market? Social media is unique from traditional marketing and requires a different perspective to be effective. Be sure to focus on your target’s wants and needs not yours.
  2. Does it add value? Social media only works if people view and share it. Make your content educational, insightful or entertaining to grab interest and draw engagement.
  3. Does it fit the social channel? Don’t post content ideal for Twitter on Instagram or Reddit. Each channel has its own culture and community. Make sure each post fits the channel’s environment, mission and policies or standards.
  4. Is it authentic and transparent? Trying to trick people into clicking a link or making a purchase will get you nowhere. Don’t hide or exclude any relevant information.
  5. Is it real and unique? Bots can automate tasks and be a great time saver, but use them for the right actions. Don’t use auto responses and create anything that could be perceived as spam.
  6. Is it positive and respectful? It may be fine to talk trash about competitors or complain about customers in the office, but not in social media. Don’t badmouth the competition or customers.
  7. Does it meet codes of conduct? As professionals we are part of trade associations that set standards of conduct. Be sure you are meeting these ethical standards such as the Word of Mouth Marketing Association’s Code of Ethics.
  8. Does it meet all laws and regulations? Government has been catching up with social media and have issued regulations and laws you must follow. See guides on requirements like the FTC social media endorsement guidelines.
  9. Does it meet the Social Media Policy? Most likely your brand or a client’s brand has a social media policy. Ensure you follow your own company standards.

 

++++++++++++++
more on social media netiquette in this IMS blog
https://blog.stcloudstate.edu/ims?s=social+media+netiquette

writing first draft

http://becomeawritertoday.com/writing-the-first-draft/

  • I go to a quiet room, office, library or coffee shop.
  • Depending on where I am, I brew/order a cup of coffee.
  • I disconnect my computer from the internet.
  • I put my phone in airplane mode.
  • I open up Scrivener.
  • I arrange the outline for the chapter in question.
  • I set a timer for 30 minutes.
  • I write, keep my fingers moving and avoid stopping to edit myself (this is harder than it sounds).
  • When the buzzer sounds, I stand up and take a two-minute break.
  • After this break, I review my outline and notes.

+++++++++++++++++++++

25 Things About Writing

by Justin McLachlan  http://www.justinmclachlan.com/1670/25-things-writing/

also in: http://pin.it/HwXSc4n

  • Real writing is actually a lot of rewriting.
  • Your friends won’t be as impressed the second time around. Don’t let it stop you.
  • Grammar, punctuation, spelling — it’s okay if all these things come last.
  • First drafts universally suck.
  • Avoid the advice of those who tell you otherwise of #5.
  • Trying to edit while writing is like trying to chop down a tree while you’re climbing it
  • Writing can be lonely. Very, very lonely.
  • Inspiration will never strike when you need it to. Just write. Do the work.
  • Complex construction doesn’t equal complex though. Simplify.
  • Deadlines. Goals. Set them, and stick to them.

++++++++++++++++++++
more on proofreading in this IMS blog
https://blog.stcloudstate.edu/ims?s=proofreading
more proofreading techniques for the EDAD doctoral cohort on Pinterest
https://www.pinterest.com/aidedza/doctoral-cohort/

cybersecurity and students

You’ve Been Hacked! Explaining Cybersecurity to Students in an Interconnected Era

By Jacob Batchelor 06/01/17

https://thejournal.com/articles/2017/06/01/youve-been-hacked-explaining-cybersecurity-to-students-in-an-interconnected-era.aspx

Here’s an easy way to explain IoT hacks to students:

  • A hacker accesses a device, like a webcam, through its internet connection. Devices with weak security or easy-to-guess passwords make easy targets.
  • The hacker can then infect the device with malware, a type of computer virus that takes control of a device.
  • The hacker now has a number of options. He or she can use the device to spy, infect other devices or attack a target like the servers (centralized computers that store network data) targeted in the October 2016 attack.
  • Research the manufacturer. Are they reputable? Have they previously been hacked? Big, established companies based in developed countries are usually the safest.
  • Read up on security features. Is the device password-protected? Can you set your own password? If so, make it a strong password that uses numbers, letters and symbols — avoid common words or phrases.
  • Regularly check for updates. Good companies will regularly update the software on their devices to protect against vulnerabilities.
  • Ask yourself — do you need it? Make sure internet-connectivity is something you really need on the device you’re using. In many cases, internet-connectivity is not necessary for the device to function properly.

a few tips that students can use to protect their privacy while using smartphones:

  • Research apps before signing up for them. Is it from a reputable developer? Has it had security issues in the past? Use the same approach as when researching IoT devices.
  • Look over the terms of service. What information does it require? Does it track or store your data? Can the developer sell your information? All of these questions are important to consider.
  • Be careful when linking apps to your social media accounts. Giving apps access to your social media accounts makes them vulnerable to hacking. Is there a good reason for the accounts to be linked? Can you sign up without linking to a social media account?
  • Use two-factor authentication. Two-factor authentication requires authorization beyond a password when using unrecognized devices such as entering a code sent to your cellphone. As apps allow, be sure to use two-factor authentication which will make it more difficult for hackers to access the information stored in your apps.

++++++++++++++
more on hackers in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

tablets library

Bornett, C. C. (2016). Leseförderung digital genial: WieTablets die Bibliothekspädagogik verändern / Tipps nicht nur für Bilderbuch-Apps. (German). Bub: Forum Bibliothek Und Information, 68(10), 606-608.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d118913547%26site%3dehost-live%26scope%3dsite 

Šorgo, A., Bartol, T., Dolničar, D., & Podgornik, B. B. (2017). Attributes of digital natives as predictors of information literacy in higher education. British Journal Of Educational Technology, 48(3), 749-767. doi:10.1111/bjet.12451   http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d122273174%26site%3dehost-live%26scope%3dsite
(PDF available through ILL)
Biology, IT faculty Maribor, Slovenia. None of them is a librarian

Correlation and regression analysis based on survey data revealed that the attributes of digital natives are poor predictors of IL. information and communication technologies (ICT) experiences expressed as the sum of the use of different applications do not necessarily contribute to IL; some applications have a positive and some a negative effect; personal ownership of smartphones, portable computers and desktop computers has no direct effect on IL, while ownership of a tablet computer is actually a negative predictor; personal ownership of ICT devices has an impact on ICT experiences and Internet confidence, and, therefore, an indirect impact on IL; and ICT-rich university courses (if not designed to cultivate IL) have only a marginal impact on IL, although they may have some impact on ICT experiences and Internet confidence. The overall conclusion is that digital natives are not necessarily information literate, and that IL should be promoted with hands-on and minds-on courses based on IL standards.

Sharman, A. (2014). Roving Librarian: The Suitability of Tablets in Providing Personalized Help Outside of the Traditional Library. New Review Of Academic Librarianship, 20(2), 185-203. doi:10.1080/13614533.2014.914959

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d96764510%26site%3dehost-live%26scope%3dsite

McRae, L. l. (2015). TEACHING IN AN AGE OF UBIQUITOUS COMPUTING: A DECELERATED CURRICULUM. Digital Culture & Education, 7131-145.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dllf%26AN%3d110123216%26site%3dehost-live%26scope%3dsite

 

+++++++++++++++++
more on mobile devices in the library in this IMS blog
https://blog.stcloudstate.edu/ims?s=mobile+devices+library

digital assessment literacy

Eyal, L. (2012). Digital Assessment Literacy — the Core Role of the Teacher in a Digital Environment. Journal Of Educational Technology & Society, 15(2), 37-49.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d76559253%26site%3dehost-live%26scope%3dsite

Common to all is a view of the level of literacy as a measure of the quality of human capital of a society or a particular area. Literacy develops in interaction with the environment (Vygotsky, 1987).

digital assessment literacy refers to the role of the teacher as an assessor in a technology-rich environment.

Learning Management Systems (LMS) benefits and limitations

Measurement allows quantitative description of a particular characterization of an individual, expressed in numbers.

the combination of assessment and measurement provides a thorough and accurate picture, based upon which practical conclusions can be drawn (Wagner, 1997). A test is a systematic process in which an aspect of student behavior is quantitatively evaluated (Suen & Parkes, 2002).

For several decades this system of assessment has been criticized for a variety of reasons, including the separation between the teaching-learning process and the evaluation process, the relatively low level of thinking required, and the quantitative reporting of results, which does not contribute to students’ progress. In the last decade, the central argument against the tests system is that their predictability is limited to the field and context in which the students are tested, and that they do not predict student problem solving ability, teamwork, good work habits and honesty.

teachers mistakenly believe that repeating lessons will improve students’ achievements.

To evaluate how well the goals were achieved, objective measurement methods are employed (Black, et al., 2004).

Eshet- Alkalai (2004) offered a detailed conceptual framework for the term ‘digital literacy’ that includes: photo-visual thinking; reproduction thinking; branching thinking; information thinking; and socio-emotional thinking.

Eshet-Alkalai, Y. (2004). Digital literacy: A conceptual framework for survival skills in the digital era. Journal of Educational Multimedia and Hypermedia, 13(1), 93–106.

Eshet-Alkalai, Y., & Chajut, E. (2009). Changes Over Time in Digital Literacy. Cyberpsychology & Behavior, 12(6), 713-715. doi:10.1089/cpb.2008.0264

two major patterns of change over time: (a) closing the gap between younger and older participants in the tasks that emphasize profi- ciency and technical control and (b) widening the gap between younger and older participants in tasks that emphasize creativity and critical thinking. Based on the comparison with the matched control groups, we suggest that experience with technology, and not age, accounts for the observed lifelong changes in digital literacy skills

Eshet-Alkalai, Y., & Soffer, O. (2012). Guest Editorial – Navigating in the Digital Era: Digital Literacy: Socio-Cultural and Educational Aspects. Journal Of Educational Technology & Society, 15(2), 1.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d76559228%26site%3dehost-live%26scope%3dsite

a wide range of technological, cognitive and social competences—collectively termed “Digital Literacy.” Users thus must become “digitally literate” in order to cope effectively with the complex sociological, cognitive and pedagogical challenges these technologies pose. These skills include, for example, the ability to operate computers and navigate the net effectively, to cope with large volumes of information, to evaluate the reliability of information, and to critically assess what seem to be natural (and not ideologically biased) technological tools. In a different way from the spirit of modern print, learners construct and consume knowledge in non-linear environments. They need to learn, collaborate and solve problems effectively in virtual (non face-to-face) learning environments, and to communicate effectively in technology-mediated social participation environments.

It is important to note: digital literacy, then, is not limited simply to computer and Internet operation and orientation. It also relates to a variety of epistemological and ethical issues arise due to the unique characteristics of digital technologies and that are often overlapped with trends related to the post-modern and post-structural era. These include questions regarding the authority of knowledge, intellectual property and ownership, copyright, authenticity and plagiarism. Furthermore, issues such as self-representation, virtual group dynamics, and on-line addiction also arise.

 

++++++++++++++++++
more on digital literacy in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+assessment+literacy

student privacy

Report: Tech Companies Are Spying on Children Through Devices and Software Used in Classroom

By Richard Chang 04/17/17

https://thejournal.com/articles/2017/04/17/report-tech-companies-are-spying-on-children-through-devices-and-software-used-in-classroom.aspx

according to a new report from the nonprofit Electronic Frontier Foundation (EFF), “Spying on Students: School-Issued Devices and Student Privacy

shows that state and federal laws, as well as industry self-regulation, have failed to keep up with a growing education technology industry.

One-third of all K–12 students in the United States use school-issued devices running software and apps that collect far more information on kids than is necessary.

Resource-poor school districts can receive these tools at deeply discounted prices or for free, as tech companies seek a slice of the $8 billion ed tech industry. But there’s a real, devastating cost — the tracking, cataloging and exploitation of data about children as young as 5 years old.

Our report shows that the surveillance culture begins in grade school, which threatens to normalize the next generation to a digital world in which users hand over data without question in return for free services

EFF surveyed more than 1,000 stakeholders across the country, including students, parents, teachers and school administrators, and reviewed 152 ed tech privacy policies.

“Spying on Students” provides comprehensive recommendations for parents, teachers, school administrators and tech companies to improve the protection of student privacy. Asking the right questions, negotiating for contracts that limit or ban data collection, offering families the right to opt out, and making digital literacy and privacy part of the school curriculum are just a few of the 70-plus recommendations for protecting student privacy contained in the report.

+++++++++++++++++++++++++
more on students and privacy
https://blog.stcloudstate.edu/ims?s=student+privacy
https://blog.stcloudstate.edu/ims?s=privacy+government

https://www.privateinternetaccess.com/blog/2017/03/us-senate-votes-50-48-away-broadband-privacy-rules-let-isps-telecoms-sell-internet-history/

https://www.washingtonpost.com/news/the-switch/wp/2017/03/28/the-house-just-voted-to-wipe-out-the-fccs-landmark-internet-privacy-protections/?utm_term=.34ed3dce7494

 

Digital Storytelling for EDAD 652

Community Relations for Administrators EDAD 652

Instructor Kay Worner

A discussion with Kay’s class of school administrators about the use of digital storytelling as a tool for community relations.

discussion based on LIB 490/590
http://web.stcloudstate.edu/pmiltenoff/lib490/

  • Introduction (5-10 min)
    Plamen: http://web.stcloudstate.edu/pmiltenoff/faculty/
    students: interests and related information
  • Group assignment (5-10 min)
    Effective communication strategies. List 3-5 and discuss the pros and cons (what makes them effective and are there any impediments, limitations)
  • Class discussion on effective communication strategies: based on the group work findings, how do you think digital storytelling may be [can it be] an effective communication tool

What is Storytelling? How does it differ from Digital Storytelling?

https://en.wikipedia.org/wiki/Digital_storytelling

Rossiter & Garcia (2010)  consider “digital stories are short vignettes that combine the art of telling stories with multimedia objects including images, audio, and video” (p. 37)

Is Digital Storytelling more then just storytelling on technology steroids?

What is Digital Storytelling (DS) for school leadership? A bibliographic research reveals a plenitude of research on DS in the classroom, for educators, but not much for educational leaders.
Guajardo, Oliver, Rodrigez, Valcez, Cantu, & Guajardo (2011) view digital storytelling for emerging educational leaders as “as a process for data creation, analysis, and synthesis.”

There is information for corporate leaders or community leaders and DS, but not much for ed leaders.

Let’s create our own understanding of digital storytelling for educational leaders.

Basic definitions, concepts and processes.

  • Learn about Web 1.0 versus Web 2.0; the Cloud; transliteracy and multiliteracy

Multimodal Literacy refers to meaning-making that occurs through the reading, viewing, understanding, responding to and producing and interacting with multimedia and digital texts. It may include oral and gestural modes of talking, listening and dramatising as well as writing, designing and producing such texts. The processing of modes, such as image, words, sound and movement within texts can occur simultaneously and is often cohesive and synchronous. Sometimes specific modes may dominate.

http://guides.library.stonybrook.edu/digital-storytelling

  • Social Media and digital storytelling
    which social media tools would you employ to ensure a digital story happening?

When you hear the term, Digital Storytelling, do you immediately consider Social Media?

IT’S A MINDSET – NOT A SKILL
http://turndog.co/2015/06/16/how-to-use-social-media-in-your-digital-storytelling/

Share Your Brand’s (School?) Story
https://www.postplanner.com/digital-storytelling-techniques-secret-sauce-social-media/

  • group work (15-20) min
    split in groups of 3: an ed leader, a media specialist (or teacher with technology background) and a teacher (to represent a school committee on community relations)
    you have 5 min to research (Internet, access to school resources) and 5-10 min to come up with a strategy for use of digital storytelling for expanding and improving community relationship
    Base your strategy on existing examples.
    E.g.:
    Do the following electronic resources regarding this particular educational institution relay digital story:
    http://strideacademy.org/
    https://www.facebook.com/StrideAcademy/
    https://twitter.com/search?q=Stride%20Academy%20Charter%20School&src=tyah
    https://youtu.be/eekIUqMQ4v0
    What do you like?
    What would you do differently?
  • Digital Storytelling for building, expanding, improving community relations – final thoughts

**********************
literature:
Rossiter, M., & Garcia, P. A. (2010). Digital storytelling: A new player on the narrative field.
New Directions For Adult & Continuing Education, 2010(126), 37-48.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.
com%2flogin.aspx%3fdirect%3dtrue%26db%3daph%26AN%3d51532202%26
site%3dehost-live%26scope%3dsite

Guajardo, M., Oliver, J. A., Rodriguez, G., Valadez, M. M., Cantu, Y., & Guajardo, F. (2011). Reframing the Praxis of School Leadership Preparation through Digital Storytelling. Journal Of Research On Leadership Education, 6(5), 145-161.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ958883%26site%3dehost-live%26scope%3dsite

+++++++++++++++++++
more on digital storytelling in this IMS blog
https://blog.stcloudstate.edu/ims?s=digital+storytelling

1 20 21 22 23 24 36