Searching for "synchronous"

student engagement in online classes

per SCSU faculty request, please have compiled literature (books and peer-reviewed articles) on:

Here some names who are well regarded in the community of online learning as specialists in online discussions:

  1. Susan Ko
    https://mplus.mnpals.net/vufind/Record/007248228
  2. Palloff and Pratt:
    https://www.goodreads.com/author/show/159169.Keith_Pratt (not sure if you are a goodreads user, I am)
    https://mplus.mnpals.net/vufind/Record/007494813

the most recent peer-reviewed literature on keywords: “engag*” + “student*” + “online” = 13K+ titles for the period 2010-2016:

http://scsu.mn/1W6Y7wF

and about 20 articles from the link above with the general search:

Record: 1

A Digital Badging Dataset Focused on Performance, Engagement and Behavior-Related Variables from Observations in Web-Based University Courses By: McDaniel, Rudy; Fanfarelli, Joseph R.. British Journal of Educational Technology, v46 n5 p937-941 Sep 2015. (EJ1071635)

Database:

ERIC

Record: 2

A Student-Centered Guest Lecturing: A Constructivism Approach to Promote Student Engagement By: Li, Lei; Guo, Rong. Journal of Instructional Pedagogies, v15 Oct 2015. (EJ1060070)
Full Text from ERIC

Database:

ERIC

Record: 3

Creating Effective Student Engagement in Online Courses: What Do Students Find Engaging? By: Dixson, Marcia D.. Journal of the Scholarship of Teaching and Learning, v10 n2 p1-13 Jun 2010. (EJ890707)
Full Text from ERIC

Database:

ERIC

Record: 4

Effects From Student Engagement Online. ASHE Higher Education Report. Nov2014, Vol. 40 Issue 6, p67-73. 7p. DOI: 10.1002/aehe.20018.

Database:

EBSCO MegaFILE

Record: 5

Engaging Students in Online Courses By: Jacobs, Pearl. Research in Higher Education Journal, v26 Oct 2014. (EJ1055325)
Full Text from ERIC

Database:

ERIC

Record: 6

Engaging Students via Social Media: Is It Worth the Effort? By: Mostafa, Rania B.. Journal of Marketing Education, v37 n3 p144-159 Dec 2015. (EJ1080980)

Database:

ERIC

Record: 7

Engaging Students with Social Media By: Bal, Anjali S.; Grewal, Dhruv; Mills, Adam. Journal of Marketing Education, v37 n3 p190-203 Dec 2015. (EJ1081047)

Database:

ERIC

Record: 8

HOW TO BETTER ENGAGE ONLINE STUDENTS WITH ONLINE STRATEGIES. By: BRITT, DR. MARGARET. College Student Journal. Fall2015, Vol. 49 Issue 3, p399-404. 6p.

Database:

EBSCO MegaFILE

Record: 9

Instructor scaffolding for interaction and students’ academic engagement in online learning: Mediating role of perceived online class goal structures. By: Cho, Moon-Heum; Cho, YoonJung. Internet & Higher Education. Apr2014, Vol. 21, p25-30. 6p. DOI: 10.1016/j.iheduc.2013.10.008.

Database:

EBSCO MegaFILE

Record: 10

Measuring Student Engagement in an Online Program By: Bigatel, Paula; Williams, Vicki. Online Journal of Distance Learning Administration, v18 n2 Sum 2015. (EJ1065381)

Database:

ERIC

Record: 11

Measuring Student Engagement in the Online Course: The Online Student Engagement Scale (OSE) By: Dixson, Marcia D.. Online Learning, v19 n4 Sep 2015. (EJ1079585)
Full Text from ERIC

Database:

ERIC

Record: 12

On-Line Course Development: Engaging and Retaining Students By: Bruster, Benita G.. SRATE Journal, v24 n2 p1-7 Sum 2015. (EJ1083122)
Full Text from ERIC

Database:

ERIC

Record: 13

Promoting Online Students’ Engagement and Learning in Science and Sustainability Preservice Teacher Education By: Tomas, Louisa; Lasen, Michelle; Field, Ellen. Australian Journal of Teacher Education, v40 n11 Article 5 Nov 2015. (EJ1083370)
Full Text from ERIC

Database:

ERIC

Record: 14

Strengthening student engagement: what do students want in online courses? By: Chakraborty, Misha; Nafukho, Fredrick Muyia. European Journal of Training & Development. 2014, Vol. 38 Issue 9, p782-802. 21p. DOI: 10.1108/EJTD-11-2013-0123.

Database:

EBSCO MegaFILE

Record: 15

Student Engagement in Online Learning: What Works and Why. ASHE Higher Education Report. Nov2014, Vol. 40 Issue 6, p1-14. 14p. DOI: 10.1002/aehe.20018.

Database:

EBSCO MegaFILE

Record: 16

Student Perceptions of Twitters’ Effectiveness for Assessment in a Large Enrollment Online Course By: Rohr, Linda; Costello, Jane. Online Learning, v19 n4 Sep 2015. (EJ1079590)
Full Text from ERIC

Database:

ERIC

Record: 17

Techniques for Student Engagement Online. ASHE Higher Education Report. Nov2014, Vol. 40 Issue 6, p37-66. 30p. DOI: 10.1002/aehe.20018.

Database:

EBSCO MegaFILE

Record: 18

The civic-social media disconnect: exploring perceptions of social media for engagement in the daily life of college students. By: Mihailidis, Paul. Information, Communication & Society. Oct2014, Vol. 17 Issue 9, p1059-1071. 13p. DOI: 10.1080/1369118X.2013.877054.

Database:

EBSCO MegaFILE

Record: 19

The Online University Classroom: One Perspective for Effective Student Engagement and Teaching in an Online Environment By: Carr, Marsha. Journal of Effective Teaching, v14 n1 p99-110 2014. (EJ1060450)
Full Text from ERIC

Database:

ERIC

Record: 20

The Perils of a Lack of Student Engagement: Reflections of a “Lonely, Brave, and Rather Exposed” Online Instructor By: Stott, Philip. British Journal of Educational Technology, v47 n1 p51-64 Jan 2016. (EJ1086712)

Database:

ERIC

Record: 21

The VIRI (Virtual, Interactive, Real-Time, Instructor-Led) Classroom: The Impact of Blended Synchronous Online Courses on Student Performance, Engagement, and Satisfaction By: Francescucci, Anthony; Foster, Mary. Canadian Journal of Higher Education, v43 n3 p78-91 2013. (EJ1018277)
Full Text from ERIC

Database:

ERIC

======================================================

More on “Classroom Discussion and Students Participation” in this IMS blog entry:
https://blog.stcloudstate.edu/ims/2016/01/29/classroom-discussion-and-students-participation/

honors and shame

221 HONORS.
The Honor System:
A Comparison Between the U.S. South and the Mediterranean World

Plamen Miltenoff, MLIS, Ph.D.

Meeting Times & Places

5:00 pm – 7:30 pm Wednesdays Miller Center 206

  • Asynchronous interaction:
    • Most of the discussions will occur asynchronously in the D2L “Discussion” area.
    • Use of Web 2.0 tools such as blogs and wikis is strongly encouraged.
    • Use of Web 2.0 tools such as social networking sites (e.g., Facebook) only after consultation with the instructor

Contact Information

Back to Top

The best way to contact me is through email, but you can use any of the options below.

Email: pmiltenoff@stcloudstate.edu
Phone: 320-308-3072
Web Site: http://web.stcloudstate.edu/pmiltenoff/faculty
Office Location: Miller Center, 204-J

Course Description:

The Honor system is a phenomenon well known in many cultures across the globe and strongly presented in cultures since Ancient Greece and Rome. The concepts of honor and shame have long been associated with cultures in the Mediterranean region mostly because the first scholars to study the social impact of these concepts did so in Southern Europe. Honor has two fundamental components: birth and morality. People could gain or lose their honor by the morality of their conduct. Despite the scholarly emphasis on the Mediterranean, the concept of honor influenced social systems all over the world, and historians are beginning to detect its traces in places as different as China and Africa. The Southern Honor system can firmly be traced back in the European roots and determined to a great degree the American history of the 19th century.

This course will study the geography, history, sociology and religions, cultural and political systems of two worlds and learn to compare the findings. Based on those comparisons, lessons in gender, culture and politics will be drawn.

  1. What is Honor and Shame system and why is it so important to know about it and recognize it
  2. What is the connection between the Honor system in the Mediterranean and in the American South
  3. How does the knowledge of the Honor system aim our daily actions and our global perspective

Course Goals

Students in this course will

  • Practice research methods and ability to find and evaluate information as well as select reliable information technologies.
  • Explore applications and technologies for communication and creative collaboration.
  • Gain practical, hands-on experience with a wide variety of research and online communication tools.
  • Students will demonstrate ability to research and find academically reliable information from peer-reviewed sources in the online databases, which SCSU is subscribed. Students will demonstrate ability to find and evaluate information from the Internet.
  • Students will demonstrate competencies in creation of textual and multimedia narratives in individual and collaborative environment.
  • Students will demonstrate competencies in application of technology toward creation and dissemination of textual and multimedia materials.

Attendance/Discussion Requirements

  • Attendance is required. If you cannot attend class, it is required to alert the instructor in advance. If the reason for the absence is an emergency, it is expected to approach the instructor and provide an explanation thereafter about the character of the emergency.
  • Discussion are expected. If you are shy and are hesitant to participate in class, you must compensate with the use of other communication tools (e.g., D2L Discussion List).

Assignment Descriptions

  • Discussions. You are expected to contribute to each class session with your ideas and your responses to the ideas of your peers. Your comments are expected in class and in between class sessions (using, e.g., D2L discussion list). Your comments must go beyond “yes, I agree,” and “no, I disagree” and provide analysis and synthesis of your thoughts.
  • Readings – you will be expected to contribute to each class sessions with bibliographical findings on your own.
  • Written responses – you will be expected to deliver four written responses to peer-reviewed articles related to topics discussed in the class sessions.
  • Final project – you will be expected to write and present a final project. The written part of the project will be in the realm of 4-5000 words; will adhere to academic research and style; will include a bibliography with at least 2/3 of the sources being peer-reviewed and outside of the 5000 words. The presentation can be of any multimedia form, whereas it will be peer-evaluated, but my (instructor’s) preference will be given to advance multimedia presentations (beyond PPT and using e.g. Prezy, iMovie/Moviemaker movie and/or audio narration)

Course Policies

Back to Top

Late Assignment Policy

All assignments should be submitted by midnight of the date on which they are due. Ten percent of an assignment’s point value will be removed for each day an assignment is late. This policy will be adjusted on a case-by-case basis if emergencies prevent you from submitting an assignment on time. In these situations, contact me as soon as is reasonable to determine how this policy can be adjusted in a way that meets your needs and is still fair to other students.

Grading

Back to Top

The grade book in D2L will be used to show detailed information about grades in this course. The table below shows the value of each assignment and the total number of points available.

  Overall Grade
94% – 100% = A
90 % – 93.99% = A-
86% – 89.99% = B+
83% – 85.99% = B
80% – 82.99% = B-
70% – 79.99% = C
60% – 69.99% = D
59.99% or lower = F

 

Assignments Schedule

WEEK 1. August 28
Reading[s]:
Peruse through all articles in the D2L content area. Choose one article to your liking and be ready to reflect on it.Assignment[s]:
1. complete entry survey. 2. Prepare to present in coherent and concise manner your understanding of Honors and Shame and discuss the goals for this course. 3. Enter a short essay in the D2L discussion on how do you see applying the knowledge from this course in your future studies, research and work
Introduction.  Orientation, class parameters and familiarizing with the syllabus. Questions and issues. Course goals What is an/the Honor System? Entry Interview (D2L survey is completed and analyzed). Why explore this topic and these vastly different geographic entities (US South and the Mediterranean). Define interest in this class and interest for a project; how this class can help your studies? Your career? All over as a human being?
WEEK 2.Sept 4

Reading[s]:
BUSATTA, S. (2006). Honour and Shame in the Mediterranean. Antrocom, 2(2). 75-78. Retrieved March 19, 2013, from http://www.academia.edu/524890/Honour_and_Shame_in_the_Mediterranean
Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson.   http://tinyurl.com/qdvc499. (p. 24-26).
Osiek, C. (2008). Women, honor, and context in Mediterranean antiquity, 64(1), 323–337. doi:10.4102/hts.v64i1.2
Esmer, T. U. (n.d.). Honor in Ottoman and Contemporary Mediterranean Societies: Controversies, Continuities, and New Directions. conference announcement. Retrieved from http://www.h-net.org/announce/show.cgi?ID=196551

Assignment[s]: 1. Find an article on Honor and Shame. 2. Outline in two paragraphs the content of one of the three articles and in a third paragraph compare to your findings; use academic style to log your responses. If you have hesitation about your style, please check with the Write Place, your peers and me.

Why research? Work on the reading material for class

Find articles for the course.

What is academic research? What is a peer-review article? When and how research the Internet. How do I access and keep track of resources.
RefWorks versus Zotero and Mendeley
What is an academic paper. How do I write an academic paper. The Write place.
Making plans: final project
WEEK 3. Sept 11

Reading[s]:
Osiek, C. (2008). Women, honor, and context in Mediterranean antiquity, 64(1), 323–337. doi:10.4102/hts.v64i1.2
Smith, A. (2004). Murder in Jerba: Honour, Shame and Hospitality among Maltese in Ottoman Tunisia. History and Anthropology Routledge, 15(2), 107–132.
Harris, J. W. (2002). Honor, Grace, and War (But Not Slavery?) in Southern Culture. Reviews in American History, 30(1), 1–7. doi:10.2307/30031707

Assignment[s]:
Your first written response is due in the D2L   dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a historical perspective Do we have a robust theory/notion about the Honor/Shame system through the centuries? Do you think tracking that model through centuries helps in the 21st century? If yes, how and if no, why?
WEEK 4. Sept 18

Reading[s]: Fernand Braudel (http://en.wikipedia.org/wiki/Fernand_Braudel) and the Annales School
Santos, N. F. (2008). Family, Patronage, and Social Contests: Narrative Reversals in the Gospel of Mark. S&J, (2). (footnote p. 200).
Hall, J. L. (1907). Half-hours in southern history. B. F. Johnson publishing co.
Harrell, L. A. (2009, December 4). It’s an honorable choice: Rebellions Against Southern Honor in William Styron’s The Confessions of Nat Turner. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2614

Assignment[s]:
Your second written response is due in the D2L dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a geographic perspective Is there a “southern” connection (Mediterranean is the European South)? Can be Annale School be right (geography and relief determines history)? To what degree geography and geographical conditions determine such models (Honor/Shame)?
WEEK 5. Sept 25

Reading[s]: Crook, Z. (2009). Honor, Shame, and Social Status Revisited. Journal of Biblical Literature, 128(3), 591–611.
Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson. http://tinyurl.com/qdvc499 (p. 22)
Lever, A. (1986). Honour as a Red Herring. Critique of Anthropology, 6(3), 83–106. doi:10.1177/0308275X8600600305

Assignment[s]:
Your third written response is due in the D2L   dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a cultural perspective. Gender roles, Masculinity Does the Honor/Shame model help understand gender roles, social status, masculinity etc.?
WEEK 6. Oct 2

Reading[s]:
Crook, Z. (2009). Honor, Shame, and Social Status Revisited. Journal of Biblical Literature, 128(3), 591–611. (p. 593)
Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson. http://tinyurl.com/qdvc499. (p. 26-27; p. 30-33).
Cohen, D. (n.d.). Insult, Aggression, and the Southern Culture of Honor: An “Experimental Ethnography.” Journal of Personality and Social Psychology, 70(5), 945–960.
Harris, J. W. (2002). Honor, Grace, and War (But Not Slavery?) in Southern Culture. Reviews in American History, 30(1), 1–7. doi:10.2307/30031707

Assignment[s]:
Your forth written response is due in the D2L   dropbox. Your response must adhere to the requirements of an academic paper, including in-text citation and bibliography.

Honors and Shame from a political and social perspective Can Honor/Shame be connected with the current political situation in Egypt, Syria, Turkey? Did Honor/Shame system influence decision in American history?
WEEK 7. Wednesday Oct 9

Assignment[s]: final project details

Start working on the final project Present and discuss your final project: 1. Finalized title 2. Outline 3. Plan 4. Clear work distribution among group members 5. Clear way for peer assessment.
 WEEK 8. Wednesday Oct 16
Assignment[s]: details on final project
Final brainstorming and start working on the project Meeting as a whole: 1. Present group’s plan to class. 2. Share group’s ideas with class. 3. Share technology 4. Share sources 5. Share means for peer assessment
WEEK 9. Wednesday Oct 23

Assignment[s]: draft of bibliography

Class as a whole: peer review and brainstorming Meeting as a whole: 1. Are sources reliable? 2. Are sources of academic origin (peer-reviewed)? 3. Is the bibliography adhering correctly to the formats (APA, Chicago, ALA)
WEEK 10. Wednesday Oct 30

Assignment[s]: details on presentation

Work on the final project Meeting as a whole: 1. Presentation format 2. Share technology 3. Share ideas
WEEK 11. Wednesday Nov 6
Assignment[s]: paper draft due in D2L dropbox
Work on final project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 12. Wednesday Nov 13
Assignment[s]: paper draft and presentation
Work on project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 13. Wednesday Nov 20
Assignment[s]: paper draft due in D2L dropbox
Work on project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 13. Wednesday Nov 27
Work on project Meeting as a whole: share group’s progress and seek other group’s feedback
WEEK 13. Wednesday Dec 4
Assignment[s]: paper final draft due in D2L dropbox
presentations Class presentations of the final projects
WEEK 13. Wednesday Dec 11
presentations Class presentations of the final projects

 

BIBLIOGRAPHY:

Bertram Wyatt-Brown. (n.d.). Retrieved from http://personal.tcu.edu/swoodworth/Wyatt-Brown.htm

Brayford, S. A. (1999). TO SHAME OR NOT TO SHAME: SEXUALITY IN THE MEDITERRANEAN DIASPORA. Semeia, (87), 163.

BUSATTA, S. (2006). Honour and Shame in the Mediterranean. Antrocom, 2(2). 75-78. Retrieved March 19, 2013, from http://www.academia.edu/524890/Honour_and_Shame_in_the_Mediterranean

Cohen, D. (n.d.). Insult, Aggression, and the Southern Culture of Honor: An “Experimental Ethnography.” Journal of Personality and Social Psychology, 70(5), 945–960.

Crook, Z. (2009). Honor, Shame, and Social Status Revisited. Journal of Biblical Literature, 128(3), 591–611.

Culture of honor (Southern United States). (n.d.). Retrieved from http://en.wikipedia.org/wiki/Culture_of_honor_(Southern_United_States)

Dussere, E. (2001). The Debts of History: Southern Honor, Affirmative Action, and Faulkner’s Intruder in the Dust. Faulkner Journal, 17(1), 37–57.

Esmer, T. U. (n.d.). Honor in Ottoman and Contemporary Mediterranean Societies: Controversies, Continuities, and New Directions. conference announcement. Retrieved from http://www.h-net.org/announce/show.cgi?ID=196551

Family, Patronage, and Social Contests.pdf. (n.d.).

Hall, J. L. (1907). Half-hours in southern history. B. F. Johnson publishing co.

Harrell, L. A. (2009, December 4). It’s an honorable choice: Rebellions Against Southern Honor in William Styron’s The Confessions of Nat Turner. Retrieved from http://www.lib.ncsu.edu/resolver/1840.16/2614

Harris, J. W. (2002). Honor, Grace, and War (But Not Slavery?) in Southern Culture. Reviews in American History, 30(1), 1–7. doi:10.2307/30031707

Hellerman. (n.d.). Reconstructing Honor in Roman Philippi. Cambridge University Press.

Herzfeld, M. (1980). Honour and Shame: Problems in the Comparative Analysis of Moral Systems. Man, 15(2), 339–351. doi:10.2307/2801675

Honor, Shame, and Social Status.pdf. (n.d.).

honor-04-Antrocom_Honour and Shame in the Mediterranean_S.pdf. (n.d.).

Honors and Shame and the Unity of the Mediterranean. (n.d.). Retrieved from http://www.jstor.org/stable/3317790

Honour and shame (Anthropology). (n.d.). Retrieved from http://what-when-how.com/social-and-cultural-anthropology/honour-and-shame-anthropology/

Lever, A. (1986). Honour as a Red Herring. Critique of Anthropology, 6(3), 83–106. doi:10.1177/0308275X8600600305

Manly Honor Part V: Honor in the American South. (n.d.). The Art of Manliness. Retrieved August 15, 2013, from http://www.artofmanliness.com/2012/11/26/manly-honor-part-v-honor-in-the-american-south/

Moxnes, V. (1996). Honor and Shame. In R. L. Rohrbaugh (Ed.). The Social Sciences and New Testament Interpretation (pp. 19-40). Peabody, Mass.: Hendrickson. http://tinyurl.com/qdvc499

Murder in Jerba_ Honour, Shame and.pdf. (n.d.).

Osiek, C. (2008). Women, honor, and context in Mediterranean antiquity, 64(1), 323–337. doi:10.4102/hts.v64i1.2

Peoples and Cultures of the Mediterranean. (n.d.). Retrieved March 19, 2013, from http://www.academia.edu/2437701/Peoples_and_Cultures_of_the_Mediterranean

Rabichev, R. (n.d.). The Mediterranean concepts of honour and shame as seen in the depiction of the biblical women. Retrieved from http://prophetess.lstc.edu/~rklein/Doc6/renata.htm

Santos, N. F. (2008). Family, Patronage, and Social Contests: Narrative Reversals in the Gospel of Mark. S&J, (2).

Slavery and Southern Honor. (n.d.). StudyMode. Education. Retrieved from http://www.studymode.com/essays/Slavery-Southern-Honor-72644.html

Smith, A. (2004). Murder in Jerba: Honour, Shame and  Hospitality among Maltese in Ottoman  Tunisia. History and Anthropology Routledge, 15(2), 107–132.

Stewart,, Y. (n.d.). Mursi: A Study in Honor-Shame dynamics. CATEGORY ARCHIVES: HONOR-SHAME CULTURE. Retrieved from http://www.theaugeanstables.com/category/honor-shame-culture/

TO SHAME OR NOT TO SHAME_ SEXUALITY IN THE MEDITERRANEAN DIASPORA..pdf. (n.d.).

Weir, D. (n.d.). Honour and Shame. Islam Watch. Retrieved from http://www.islam-watch.org/Others/Honour-and-Shame-in-Islam.htm

Women, honor, and context in Mediterranean antiquity.pdf. (n.d.).

Wyatt-Brown, B. & Milbauer, Richard J. (2004). Honor, Shame, and Iraq in American Foreign Policy. In Note prepared for the Workshop on Humiliation and Violent Conflict, Columbia University,  New York, November 18-19, 2004. Presented at the Workshop on Humiliation and Violent Conflict, Columbia University,  New York,. Retrieved from http://www.humiliationstudies.org/documents/WyattBrownNY04meeting.pdf

 

 

 

digital literacy for EDAD

one-credit courses on digital literacy offered for the School of Education department for Educational Leadership

====================================================

EDAD 697Introduction to Educational Technology

1 credit, summer 2016

Technology forecast for education: https://blog.stcloudstate.edu/ims/2016/01/27/4710/

Course Description

This synchronous online course will introduce school administrators to the multitude and complexity of educational technology issues. Through group discussions and exercises, the course will focus on the development of knowledge, skills and depositions to effective professional practice in educational leadership. The goal of the course is to develop knowledge and understanding of appropriate application of technology in the teaching and learning process and in the management of educational programs.
Information and experience in the course will include review of the latest trends in technology. Familiarity to acquisition of expertise will be sought in understand and use of Web 2.0 and Web 3.0, as well as social media, multimedia and interactivity and how it affects school life as well as the role of the educational leader. Specific attention will be paid to the importance and ability to develop and maintain policies, which reflect the ever-changing world of technology. Auxiliary, but no less important issues such as legal issues, copyright issues, ethics and other forms of digital citizenship will be discussed.

Course Objectives:

Upon successful completion of this course the student will:

Course Objective Knowledge Skill Disposition Impact
1.      Demonstrate knowledge and the use of related technologies appropriate to the management of a school # o o
2.      Demonstrate knowledge and the use of related technologies appropriate to the instructional program of a school # o o
3.      Demonstrate knowledge and the use of various types of related technologies for supporting the instructional program of the school # o o
4.      Demonstrate knowledge of planning and management procedures and policies for the appropriate use of technological resources to serve the mission of the school # o o
5.      Demonstrate knowledge of common computer and related technological applications # o o
6.      Identify gender & diversity issues related to technology in education o o o
7.      Demonstrate knowledge of adaptive technology devices for individuals with special needs o o o o
8.      Demonstrate skill in the use of technology for materials preparation, presentations, record keeping, computation, communication, information / data collection and management, and the effective use of the Internet o o o
9.      Demonstrate an understanding of legal issues, including copyright issues, related to educational technology o o
10.  Demonstrate an understanding of the importance of ethical practice in the use of technology o o
11.  Demonstrate knowledge and understanding of administrative policies and procedures that promote appropriate utilization of technology by school personnel o o o
12.  Demonstrate familiarity with appropriate professional standards related to educational leadership and technology o o o o
13.  Demonstrate an understanding of the digital age learning culture, digital citizenship in particular o o

 

# http://ed.mnsu.edu/edleadership/docs/license_competencies/K-12_Principal_Competencies_revised_8_22_08.pdf

National Educational Technology Standards for Administrators.

http://www.iste.org/standards/ISTE-standards/standards-for-administrators

Demonstrate familiarity with appropriate professional standards related to educational leadership and technology
http://www.ccsso.org/Documents/2015/ProfessionalStandardsforEducationalLeaders2015forNPBEAFINAL.pdf

Resources On Line

IMS Technology blog: https://blog.stcloudstate.edu/ims/

Twitter: #edtech ; #edtechchat ; #edtechUK; @Edtech_K12

Facebook: #edtech ;  #edleadership

Pinterest #edtech; #edleadership ; #edtechleadership

Agency for Instructional Technology             http://www.ait.net

Center for Technology and Teacher Education            http://www.teacherlink.org

Center for Children and Technology            http://www.edc.org/CCT/

T.H.E. Journal (Technology Horizons in Education Online Journal)            http://www.thejournal.com

Cybertimes Navigator (New York Times) http://www.nytimes.com/navigator

International Society for Technology in Education (ISTE)            http://cnets.iste.org/

Technology Standards for School Administrators (TSSA)   http://cnets.iste.org/tssa

ISTE curriculum and Content Area Standards   http://Cnets.iste.org/currstands/

Preparing Tomorrow’s Teachers to use Technology (PT3)              http://www.pt3.org

Assistive Technology information:  http://www.abilityhub.com  http://www.enablemart.com

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

EDAD ??? Technology and Curriculum Design

1 credit, Summer 2016

Course Description

This course seeks hands-on experience in integration of educational technology into the classroom. Students will learn to select opportunities for application [or not] of technology in education. The course will provide a hands-on experience for educational leaders to understand the application of technology in the curriculum process. Topics of consideration include instructional design, media and formats, devices, telecommunications and social interactivity. The course will provide an opportunity to apply technology knowledge and experience in hands-on exercises for curriculum management as well as monitoring student achievement progress. Further discussions and practical approach will include modern, effective and efficient ways of communications among parents, students, faculty and administration. The course offered in synchronous online mode and F2F mode.

Objectives/Outcomes

Upon successful completion of this course the student will:

  1. Understand the impact of technology on the teaching and learning process.
  2. Understand the principles of the Universal Design for Learning (UDL) and National Educational Standards for Students (NETS*S) and their application in the curriculum process.
  3. Research and assess the opportunities for technology to be integrated in the classroom.

Universal Design for Learning (UDL)
http://www.udlcenter.org/aboutudl/whatisudl

The ISTE National Educational Technology Standards (NETS•T) and

Performance Indicators for Teachers

https://www.kent.edu/sites/default/files/file/ISTEstandards.pdf

 

EDAD ??? Technology as an Integral Part of Successful Educational Leadership

1 credit, Summer 2016

Course Description

Course Description

This class will support teacher leaders and school administrators in reviewing and systematizing the fast aspects of modern electronic technologies. Based on a foundational better understanding of how technologies work, future educational leaders will develop skills and practice the application of ideas, tactics and methods for better integration of technologies in the teaching and learning process as well as the creation of better policies and procedures.

The course is designed to bring research and analytical skills and build structure in the process of resolving technology issues, which educational leaders face in modern schools, including hardware and software problems, networks and computers, curriculum and teaching and learning methods.

The course will offer discussions as well as practical solutions such as social media (e.g. Twitter) for professional development, online tools for teacher evaluation, online tools for collaboration and creativity, immediate and future trends, which already impact education and educational leadership.
The course offered in synchronous online mode and F2F mode.

Objectives/Outcomes

  1. Students will be able to identify and update sources for information to keep current their technology knowledge
  2. Students will demonstrate knowledge and understanding of technology leadership standards.
  3. Student will demonstrate an understanding of how to create, promote, and sustain a dynamic, digital – age learning culture that provides a rigorous, relevant, and engaging education for all students.
  4. Students will demonstrate understanding of how to promote an environment of professional learning and innovation that empowers educators to enhance student learning through the infusion of contemporary technologies and digital resources.
  5. Students will demonstrate an understanding of how to provide digital – age leadership and management to continuously improve the organization through the effective use of information and technology resources.
  6. Students will understand and apply knowledge of how to model and facilitate understanding of social, ethical and legal issues and responsibilities related to an evolving digital culture.
  7. Students will demonstrate knowledge of technology as integral part of facilities and resource management
  8. Students will be able to describe and use budget planning and management procedures related to educational computing and technology.
  9. Students will be able to describe and maintain current information involving facilities planning issues related to computers and related technologies.
  10. Students will be able to design and develop policies and procedures concerning staffing, scheduling, and security for managing computers/technology in a variety of instructional and administrative school

IMS Instruction Sessions Spring 2016

IMS Instruction Sessions Spring 2016

Where is MC 205? Per campus map, Miller Center 205 is on the second floor, direction computer lab, right-handside, pass the counter with printers on both sides. Please use this virtual reality direction map to find the room (use Google Chrome and activate QuickTime plugin).

please have a link to a PDF copy print out instruction sessions spring 2016

Dreamweaver: 4 Mondays –  10-10:45AM . Jan 18, 25, Feb 1, 8 ; location MC 205.  attendees cap is 5

Keywords: web development, web design, Adobe Dreamweaver

Description: Adobe Dreamweaver CC is the default web development tool on campus. In four consecutive weeks, learn the basics of Dreamweaver, web development, web design and maintaining web pages on the Web. Site map and site structure. HTML and HTML5 basics, basics of CSS, page properties, text editing, hyperlinks and images, tables, forms.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Photoshop: 4 Tuesdays – –  10-10:45AM .  Jan 19, 26, Feb 2, 9 ; location MC 205.  attendees cap is 5

Keywords: image processing, image editing, visual literacy, Adobe Photoshop

Description: In four 45 min sessions, learn the basics of image editing.  A comprehensive understanding of Adobe Photoshop and its essential tools. Design and edit, adjusting images for the Internet and print outs. Learn image formats, compressions, layers. Retouching, repairing and correcting photos

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Social Media in Education 9:30-10:15 AM. Feb 3, 10, 17, 24. location MC 205.  attendees cap is 15

Keywords: social media, social media in education, social media and learning, social media and teaching, social media and communication, Facebook, Twitter, Instagram, LinkedIn, YouTube, Diigo, Delicious, Evernote, SideVibe, Pinterest, Vine, Snapchat, Google+, Zotero, Mendeley, blogs, wikis, podcasts, visuals, text
Description: In four 45 min sessions, structure your approach to social media and assess how to use in teaching and learning. What is social media and how to use it. How to discriminate between personal and professional use of social media. Amidst 180 most popular social media tools, acquire a robust structure to cluster them and orient yourself quick and easy, which tools fit best your teaching materials and methods to enable learning and communication with your students. Visuals versus text and how to combine them for effective communication and teaching. Policies, engagement of students. Expanding and improving research and organization of your research through social media and networking toward your research through social media.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Cheating: what, why and how to avoid: Jan 28, 10-10:45AM .  location MC 205.  attendees cap is 15

Keywords: cheating, academic dishonesty, academic integrity, plagiarism.

Description: in 45 minutes we can start a conversation about identification of cheating practices and determination of what plagiarism is, considering generational differences, the evolution of the Internet. Identifying of “cheating” can provide robust boundaries for understanding students’ behavior and identifying practices and methods to alleviate such behavior, including change of teaching methods and practices.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

10 basics steps to start social media. March 16, 11-11:45AM  location MC 205.  attendees cap is 15

Keywords: social media, social media in education, social media and learning, social media and teaching, social media and communication, Facebook, Twitter, Instagram, LinkedIn, YouTube, Diigo, Delicious, Evernote, SideVibe, Pinterest, Vine, Snapchat, Google+, Zotero, Mendeley, blogs, wikis, podcasts, visuals, text

Description: introduction to social media and its use for personal and professional purposes. Ideas and scenarios of using different social media tools in education. Hands-on exercises for using social media in teaching.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Games and Gamification in Education. Feb 24 2-2:45PM, March 25, 10-10:45AM, April 14, 2-2:45PM MC 205, attendees cap is 5

Keywords: play, games, serious games, game-based learning, gaming, gamification.

Description: Gaming and Gamification is one of the most pronounced trends in education as per the New Horizon Report. Besides the increase of participation and enthusiasm, it increases learning. Introduction to gaming and gamification by establishing definitions, learning to distinguish gaming and gamification and learning the basics of gaming and gamification in the teaching process. Hands-on exercises for introducing gaming practices in the teaching and learning process and gamifying the existing syllabi.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Teaching Online. Jan. 29. 10-10:45AM. Feb 18, 2-2:45PM,  March 30, 3-3:45 PM MC 205. attendees cap is 5.

Keywords: online teaching, mobile teaching, distance education, distributive learning, hybrid learning, hybrid teaching, blended learning

Description: this 45 min session is aimed to help you transition your F2F teaching to hybrid and online teaching. Learn about synchronous and asynchronous modes of teaching and communication to structure and organize your class materials and methods for better delivery. Hands-on exercises for improving content delivery, class discussions and communications among instructor and students.
Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Effective Presentations. Jan 28, 2-2:45PM.  MC 205. attendees cap is 10

Keywords: presentations, PowerPoint, alternatives to PowerPoint, presentation design, presentation essentials, Prezi, SlideShare, LodeStar, Zentation, Zoho, Powtoon, Zaption, Thinglink, Haiku, Kahoot, Storify, EdPuzzle, PollDaddy, Evernote, Mammoth, SideVibe, Paddlet, Remind, Death by PowerPoint, visual literacy, media literacy, digital literacy, visuals
Description: https://blog.stcloudstate.edu/ims/2016/01/07/effective-presentations/ . These four 45 minute sessions are aimed to introduce and orient faculty, staff and students to the opulence of alternatives to PowerPoint and revisit the basics of well-tailored presentation. Hands-on exercises for improving the structure and delivery of presentation as well as the choice of presentation tools.
Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Death by PowerPoint. Feb 26, 10-10:45PM. MC 205. attendees cap is 10

Keywords: presentations, PowerPoint, alternatives to PowerPoint, presentation design, presentation essentials, Death by PowerPoint, visual literacy, media literacy, digital literacy, visuals.
Description: https://blog.stcloudstate.edu/ims/2016/01/07/effective-presentations/ . This 45 minute session is aimed to introduce and orient faculty, staff and students to the basics of PowerPoint and revisit the basics of a well-tailored presentation. Hands-on exercises for improving the structure and delivery of presentation as well as the choice of presentation tools.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Contemplative Computing or Disconnect: How to Bring Balance in Your Life by Managing well Your Technology. Feb 17. 2-2:45PM.  MC 205. attendees cap is 10

Keywords: disconnect, Sherry Turkle, contemplative computing, mediation, contemplative practices, balance, technology stress

Description: this 45 min session introduces faculty, staff and students to the idea of regulating the use of technology in a meaningful way. Hands-on exercises and sharing good practices on balancing the use of technology in daily life.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Videos in the classroom: fast and easy. Jan 28, 10-10:45PM. MC 205. attendees cap is 5.
Keywords: video, video editing, video manipulation, visual literacy, digital literacy, MovieMaker, iMovie, Instagram, Vine, YouTube, Kaltura

Description: this 45 min session is an orientation to the resources available for delivery of visual materials in the classroom. Hands-on experience of different basics tools on different computer platforms.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Voice Over presentations: solutions. Feb 4, 10-10:45PM. MC 205. attendees cap is 5.

Keywords: PowerPoint, VoiceThread, LodeStar, MediaSpace (Kaltura), audio editing, narration

Description: https://blog.stcloudstate.edu/ims/2015/04/28/voice-over-presentation-solutions/ . This 45 min session is a short hands-on introduction to the tools available at MnSCU intuitions and free third-party applications for delivery of narrative attached to presentations.

Remote participation through desktopsharing at http://scsuconnect.stcloudstate.edu/ims upon registration and specific request

 

Infographics: make your projects, presentations and research credible through presentable data. Feb 10, 2-2:45PM.  March 29, 10-10:45AM, MC 205. attendees cap is 10

Keywords: Piktochart, Infogr, Visualy, statistics, visual literacy, digital literacy
Description: https://blog.stcloudstate.edu/ims/2014/04/09/infographics-how-to-create-them/. This 45 min session is an orientation to the world of infographics. Short introduction to the basics of statistics and their importance in presenting a research and idea. Hands-on exercise using one of the 3 popular infographic tools.

20 Digital Skills Every 21st Century Teacher should Have

The 20 Digital Skills Every 21st Century Teacher should Have

http://www.educatorstechnology.com/2012/06/33-digital-skills-every-21st-century.html

1- Create and edit  digital audio
2- Use Social bookmarking to share resources with and between learners
3- Use blogs and wikis to create online platforms for students
4- Exploit digital images for classroom use
5- Use video content to engage students
6- Use infographics to visually stimulate students
7- Use Social networking sites to connect with colleagues and grow professionally

8- Create and deliver asynchronous presentations and training sessions
9- Compile a digital e-portfolio for their own development
10- be able to detect plagiarized works in students assignments
11- Create screen capture videos and tutorials
12- Curate web content for classroom learning
13- Use and provide students with task management tools to organize their work and plan their learning
14- Use polling software to create a real-time survey in class
15- Understand issues related to copyright and fair use of online materials
16- Use digital assessment tools to create quizzesHere are some tools for teachers to develop this skill
17- Find and evaluate authentic web based content
18- Use digital tools for time management purposes
19- Use note taking tools to share interesting content with your students
20- Use of online sticky notes to capture interesting ideas

polls and surveys tools for education

Polls and surveys tools for education

SCSU faculty asked for help with Kahoot.it  Great tool. Especially the reward system, which most likely might engage students in the learning process. However, Kahoot is very “synchronous.” It assumes that the faculty is in a synchronous environment (F2F or online). At least the free version.

In 2012, six SCSU faculty members worked together and recommended “heavy duty” survey/polling options also known as Classroom Response Systems (CRS):
https://blog.stcloudstate.edu/ims/?s=clickers

Among the considered vendors were Turning Technologies, which have both hardware and completely online option and integrate with D2L (https://blog.stcloudstate.edu/ims/2013/09/10/crs-clickers-turning-technology-instructions/) and TopHatMonitor (https://blog.stcloudstate.edu/ims/2013/04/10/clickers-documentation/), which is completely online, no hardware solution.

Here are additional free resources, as recommended for use in education:

13 Great Free and Easy Survey / Polls Creation Tools for Teachers

http://www.educatorstechnology.com/2012/05/15-great-free-and-easy-survey-polls.html

1- Kwiqpoll (my note: seems out of business)
This is a simple poll making tool. It does not require any registration. Just visit the homepage and start creating  you poll right away. You have the choice to provide multiple choice answers. You will also be provided with a generated URL to use when sharing your polls.

2- Flisti

This is another great simple poll tool. It is very easy to use and resembles Kwiqpoll in that it does not call for any sign up. Just head over to its main page and start working on your poll. You can add as many answers as you want to your poll. Again , you can embed your polls in your blog, wiki or website

3- Urtak (my note: dead – server not found message)

This tool allows users to create polls using yes or no multiple questions.

4- Vorbeo (my note: seems out of business)
This is another free and simple to use poll tool. Teachers can use it to create their own polls and customize them the way they want by adding colours, adjusting width and many more before sharing them on their blogs or websites.

5- Polldaddy
This is another popular polling service that allows users to create free polls and surveys containing up to ten questions.

6- Micropoll
Micropoll allows users to instantly create a poll using a set of questions and answers then one email address. It also provides embed codes to share polls online.

8- Obsurvey

This is a great utility for creating instant surveys. It is dead simple, just visit its main page , type in your questions and answers using their text editor and there you go.

9- Kwik Surveys
This is another great polling service. It allows users to design their own surveys, form, polls and feedback forms. It is free but it does require a sign up.

10- Polleverywhere
This is a great polling tool.  It has different pricing plans and also has a free plan but very limited and allows for just 40 responses per poll.

12- Poll Junkie

This is a simple free service for creating instant polls. It lets users specify an expiry date for their polls and also opt for email notification to be notified each time there is an answer to the poll.

13- Yarp
This is another easy and simple poll creating tool. It basically allows users to create their own surveys or online invitations. It does not require any registration.

 

LMS and embedded librarianship

Tumbleson, B. E., & Burke, J. (. J. (2013). Embedding librarianship in learning management systems: A how-to-do-it manual for librarians. Neal-Schuman, an imprint of the American Library Association.

Embedding librarianship in learning management systems:

https://scsu.mplus.mnpals.net/vufind/Record/007650037

see also:

Kvenild, C., & Calkins, K. (2011). Embedded Librarians: Moving Beyond One-Shot Instruction – Books / Professional Development – Books for Academic Librarians – ALA Store. ACRL. Retrieved from http://www.alastore.ala.org/detail.aspx?ID=3413

p. 20 Embedding Academic and Research Libraries in the Curriculum: 2014-nmc-horizon-report-library-EN

xi. the authors are convinced that LMS embedded librarianship is becoming he primary and most productive method for connecting with college and university students, who are increasingly mobile.

xii. reference librarians engage the individual, listen, discover what is wanted and seek to point the stakeholder in profitable directions.
Instruction librarians, in contrast, step into the classroom and attempt to lead a group of students in new ways of searching wanted information.
Sometimes that instruction librarian even designs curriculum and teaches their own credit course to guide information seekers in the ways of finding, evaluating, and using information published in various formats.
Librarians also work in systems, emerging technologies, and digital initiatives in order to provide infrastructure or improve access to collections and services for tend users through the library website, discovery layers, etc. Although these arenas seemingly differ, librarians work as one.

xiii. working as an LMS embedded librarian is both a proactive approach to library instruction using available technologies and enabling a 24/7 presence.

1. Embeddedness involves more that just gaining perspective. It also allows the outsider to become part of the group through shared learning experiences and goals. 3. Embedded librarianship in the LMS is all about being as close as possible to where students are receiving their assignments and gaining instruction and advice from faculty members. p. 6 When embedded librarians provide ready access to scholarly electronic collections, research databases, and Web 2.0 tools and tutorials, the research experience becomes less frustrating and more focused for students. Undergraduate associate this familiar online environment with the academic world.

p. 7 describes embedding a reference librarian, which LRS reference librarians do, “partnership with the professor.” However, there is room for “Research Consultations” (p. 8). While “One-Shot Library Instruction Sessions” and “Information Literacy Credit Courses” are addressed (p. 809), the content of these sessions remains in the old-fashioned lecturing type of delivering the information.

p. 10-11. The manuscript points out clearly the weaknesses of using a Library Web site. The authors fail to see that the efforts of the academic librarians must go beyond Web page and seek how to easy the information access by integrating the power of social media with the static information residing on the library web page.

p. 12 what becomes disturbingly clear is that faculty focus on the mechanics of the research paper over the research process. Although students are using libraries, 70 % avoid librarians. Urging academic librarians to “take an active role and initiate the dialogue with faculty to close a divide that may be growing between them and faculty and between them and students.”
Four research context with which undergraduates struggle: big picture, language, situational context and information gathering.

p. 15 ACRL standards One and Three: librarians might engage students who rely on their smartphones, while keeping in mind that “[s]tudents who retrieve information on their smartphones may also have trouble understanding or evaluating how the information on their phone is ‘produced, organized, and disseminated’ (Standard One).
Standard One by its definition seems obsolete. If information is formatted for desktops, it will be confusing when on smart phones, And by that, it is not mean to adjust the screen size, but change the information delivery from old fashioned lecturing to more constructivist forms. e.ghttp://web.stcloudstate.edu/pmiltenoff/bi/

p. 15 As for Standard Two, which deals with effective search strategies, the LMS embedded librarian must go beyond Boolean operators and controlled vocabulary, since emerging technologies incorporate new means of searching. As unsuccessfully explained to me for about two years now at LRS: hashtag search, LinkedIn groups etc, QR codes, voice recognition etc.

p. 16. Standard Five. ethical and legal use of information.

p. 23 Person announced in 2011 OpenClass compete with BB, Moodle, Angel, D2L, WebCT, Sakai and other
p. 24 Common Features: content, email, discussion board, , synchronous chat and conferencing tools (Wimba and Elluminate for BB)

p. 31 information and resources which librarians could share via LMS
– post links to dbases and other resources within the course. LIB web site, LibGuides or other subject-related course guidelines
– information on research concepts can be placed in a similar fashion. brief explanation of key information literacy topics (e.g difference between scholarly and popular periodical articles, choosing or narrowing research topics, avoiding plagiarism, citing sources properly whining required citations style, understanding the merits of different types of sources (Articles book’s website etc)
– Pertinent advice the students on approaching the assignment and got to rheank needed information
– Tutorials on using databases or planning searches step-by-step screencast navigating in search and Candida bass video search of the library did you a tour of the library

p. 33 embedded librarian being copied on the blanked emails from instructor to students.
librarian monitors the discussion board

p. 35 examples: students place specific questions on the discussion board and are assured librarian to reply by a certain time
instead of F2F instruction, created a D2L module, which can be placed in any course. videos, docls, links to dbases, links to citation tools etc. Quiz, which faculty can use to asses the the students

p. 36 discussion forum just for the embedded librarian. for the students, but faculty are encouraged to monitor it and provide content- or assignment-specific input
video tutorials and searching tips
Contact information email phone active IM chat information on the library’s open hours

p. 37 questions to consider
what is the status of the embedded librarian: T2, grad assistant

p. 41 pilot program. small scale trial which is run to discover and correct potential problems before
One or two faculty members, with faculty from a single department
Pilot at Valdosta State U = a drop-in informatil session with the hope of serving the information literacy needs of distance and online students, whereas at George Washington U, librarian contacted a distance education faculty member to request embedding in his upcoming online Mater’s course
p. 43 when librarians sense that current public services are not being fully utilized, it may signal that a new approach is needed.
pilots permit tinkering. they are all about risk-taking to enhance delivery

p. 57 markeing LMS ebedded Librarianship

library collections, services and facilities because faculty may be uncertain how the service benefits their classroom teaching and learning outcomes.
my note per
“it is incumbent upon librarians to promote this new mode of information literacy instruction.” it is so passe. in the times when digital humanities is discussed and faculty across campus delves into digital humanities, which de facto absorbs digital literacy, it is shortsighted for academic librarians to still limit themselves into “information literacy,” considering that lip service is paid for for librarians being the leaders in the digital humanities movement. If academic librarians want to market themselves, they have to think broad and start with topics, which ARE of interest for the campus faculty (digital humanities included) and then “push” their agenda (information literacy). One of the reasons why academic libraries are sinking into oblivion is because they are sunk already in 1990-ish practices (information literacy) and miss the “hip” trends, which are of interest for faculty and students. The authors (also paying lip services to the 21st century necessities), remain imprisoned to archaic content. In the times, when multi (meta) literacies are discussed as the goal for library instruction, they push for more arduous marketing of limited content. Indeed, marketing is needed, but the best marketing is by delivering modern and user-sought content.
the stigma of “academic librarians keep doing what they know well, just do it better.” Lip-services to change, and life-long learning. But the truth is that the commitment to “information literacy” versus the necessity to provide multi (meta) literacites instruction (Reframing Information Literacy as a metaliteracy) is minimizing the entire idea of academic librarians reninventing themselves in the 21st century.
Here is more: NRNT-New Roles for New Times

p. 58 According to the Burke and Tumbleson national LMS embedded librarianship survey, 280 participants yielded the following data regarding embedded librarianship:

  • traditional F2F LMS courses – 69%
  • online courses – 70%
  • hybrid courses – 54%
  • undergraduate LMS courses 61%
  • graduate LMS courses 42%

of those respondents in 2011, 18% had the imitative started for four or more years, which place the program in 2007. Thus, SCSU is almost a decade behind.

p. 58 promotional methods:

  • word of mouth
  • personal invitation by librarians
  • email by librarians
  • library brochures
  • library blogs

four years later, the LRS reference librarians’ report https://magic.piktochart.com/output/5704744-libsmart-stats-1415 has no mentioning of online courses, less to say embedded librarianship

my note:
library blog
was offered numerous times to the LRS librarians and, consequently to the LRS dean, but it was brushed away, as were brushed away the proposals for modern institutional social media approach (social media at LRS does not favor proficiency in social media but rather sees social media as learning ground for novices, as per 11:45 AM visit to LRS social media meeting of May 6, 2015). The idea of the blog advantages to static HTML page was explained in length, but it was visible that the advantages are not understood, as it is not understood the difference of Web 2.0 tools (such as social media) and Web 1.0 tools (such as static web page). The consensus among LRS staff and faculty is to keep projecting Web 1.0 ideas on Web 2.0 tools (e.g. using Facebook as a replacement of Adobe Dreamweaver: instead of learning how to create static HTML pages to broadcast static information, use Facebook for fast and dirty announcement of static information). It is flabbergasting to be rejected offering a blog to replace Web 1.0 in times when the corporate world promotes live-streaming (http://www.socialmediaexaminer.com/live-streaming-video-for-business/) as a way to  promote services (academic librarians can deliver live their content)

p. 59 Marketing 2.0 in the information age is consumer-oriented. Marketing 3.0 in the values-driven era, which touches the human spirit (Kotler, Katajaya, and Setiawan 2010, 6).
The four Ps: products and services, place, price and promotion. Libraries should consider two more P’s: positioning and politics.

Mathews (2009) “library advertising should focus on the lifestyle of students. the academic library advertising to students today needs to be: “tangible, experiential, relatebale, measurable, sharable and surprising.” Leboff (2011, p. 400 agrees with Mathews: the battle in the marketplace is not longer for transaction, it is for attention. Formerly: billboards, magazines, newspapers, radio, tv, direct calls. Today: emphasize conversation, authenticity, values, establishing credibility and demonstrating expertise and knowledge by supplying good content, to enhance reputation (Leboff, 2011, 134). translated for the embedded librarians: Google goes that far; students want answers to their personal research dillemas and questions. Being a credentialed information specialist with years of experience is no longer enough to win over an admiring following. the embedded librarian must be seen as open and honest in his interaction with students.
p. 60  becoming attractive to end-users is the essential message in advertising LMS embedded librarianship. That attractivness relies upon two elements: being noticed and imparting values (Leboff, 2011, 99)

p. 61 connecting with faculty

p. 62 reaching students

  • attending a synchronous chat sessions
  • watching a digital tutorial
  • posting a question in a discussion board
  • using an instant messaging widget

be careful not to overload students with too much information. don’t make contact too frequently and be perceived as an annoyance and intruder.

p. 65. contemporary publicity and advertising is incorporating storytelling. testimonials differ from stories

p. 66 no-cost marketing. social media

low-cost marketing – print materials, fliers, bookmarks, posters, floor plans, newsletters, giveaways (pens, magnets, USB drives), events (orientations, workshops, contests, film viewings), campus media, digital media (lib web page, blogs, podcasts, social networking cites

p. 69 Instructional Content and Instructional Design
p. 70 ADDIE Model

ADDIE model ADDIE model

Analysis: the requirements for the given course, assignments.
Ask instructors expectations from students vis-a-vis research or information literacy activities
students knowledge about the library already related to their assignments
which are the essential resources for this course
is this a hybrid or online course and what are the options for the librarian to interact with the students.
due date for the research assignment. what is the timeline for completing the assignment
when research tips or any other librarian help can be inserted

copy of the syllabus or any other assignment document

p. 72 discuss the course with faculty member. Analyze the instructional needs of a course. Analyze students needs. Create list of goals. E.g.: how to find navigate and use the PschInfo dbase; how to create citations in APA format; be able to identify scholarly sources and differentiate them from popular sources; know other subject-related dbases to search; be able to create a bibliography and use in-text citations in APA format

p. 74 Design (Addie)
the embedded component is a course within a course. Add pre-developed IL components to the broader content of the course. multiple means of contact information for the librarians and /or other library staff. link to dbases. link to citation guidance and or tutorial on APA citations. information on how to distinguish scholarly and popular sources. links to other dbases. information and guidance on bibliographic and in-text citations n APA either through link, content written within the course a tutorial or combination. forum or a discussion board topic to take questions. f2f lib instruction session with students
p. 76 decide which resources to focus on and which skills to teach and reinforce. focus on key resources

p. 77 development (Addie).
-building content;the “landing” page at LRS is the subject guides page.  resources integrated into the assignment pages. video tutorials and screencasts

-finding existing content; google search of e.g.: “library handout narrowing topic” or “library quiz evaluating sources,” “avoiding plagiarism,” scholarly vs popular periodicals etc

-writing narrative content. p. 85

p. 87 Evaluation (Addie)

formative: to change what the embedded librarian offers to improve h/er services to students for the reminder of the course
summative at the end of the course:

p. 89  Online, F2F and Hybrid Courses

p. 97 assessment impact of embedded librarian.
what is the purpose of the assessment; who is the audience; what will focus on; what resources are available
p. 98 surveys of faculty; of students; analysis of student research assignments; focus groups of students and faculty

p. 100 assessment methods: p. 103/4 survey template
https://www.ets.org/iskills/about
https://www.projectsails.org/ (paid)
http://www.trails-9.org/
http://www.library.ualberta.ca/augustana/infolit/wassail/
p. 106 gathering LMS stats. Usability testing
examples: p. 108-9, UofFL : pre-survey and post-survey of studs perceptions of library skills, discussion forum analysis and interview with the instructor

p. 122 create an LMS module for reuse (standardized template)
p. 123 subject and course LibGuides, digital tutorials, PPTs,
research mind maps, charts, logs, or rubrics
http://creately.com/blog/wp-content/uploads/2012/12/Research-Proposal-mind-map-example.png
http://www.library.arizona.edu/help/tutorials/mindMap/sample.php  (excellent)
or paper-based if needed: Concept Map Worksheet
Productivity Tools for Graduate Students: MindMapping http://libguides.gatech.edu/c.php

rubrics:
http://www.cornellcollege.edu/LIBRARY/faculty/focusing-on-assignments/tools-for-assessment/research-paper-rubric.shtml
http://gvsu.edu/library/instruction/research-guidance-rubric-for-assignment-design-4.htm
Creating Effective Information Literacy Assignments http://www.lib.jmu.edu/instruction/assignments.aspx

course handouts
guides on research concepts http://library.olivet.edu/subject-guides/english/college-writing-ii/research-concepts/
http://louisville.libguides.com/c.php
Popular versus scholar http://www.library.arizona.edu/help/tutorials/scholarly/guide.html

list of frequently asked q/s:
blog posts
banks of reference q/s

p. 124. Resistance or Receptivity

p. 133 getting admin access to LMS for the librarians.

p. 136 mobile students, dominance of born-digital resources

 

 

 

———————-

Summey T, Valenti S. But we don’t have an instructional designer: Designing online library instruction using isd techniques. Journal Of Library & Information Services In Distance Learning [serial online]. January 1, 2013;Available from: Scopus®, Ipswich, MA. Accessed May 11, 2015.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-84869866367%26site%3deds-live%26scope%3dsite

instructional designer library instruction using ISD techniques

Shank, J. (2006). The blended librarian: A job announcement analysis of the newly emerging position of instructional design librarian. College And Research Libraries, 67(6), 515-524.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-33845291135%26site%3deds-live%26scope%3dsite

The Blended Librarian_ A Job Announcement Analysis of the Newly Emerging Position of Instructional Design Librarian

Macklin, A. (2003). Theory into practice: Applying David Jonassen’s work in instructional design to instruction programs in academic libraries. College And Research Libraries, 64(6), 494-500.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-7044266019%26site%3deds-live%26scope%3dsite

Theory into Practice_ Applying David Jonassen_s Work in Instructional Design to Instruction Programs in Academic Libraries

Walster, D. (1995). Using Instructional Design Theories in Library and Information Science Education. Journal of Education for Library and Information Science, (3). 239.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedsjsr%26AN%3dedsjsr.10.2307.40323743%26site%3deds-live%26scope%3dsite

Using Instructional Design Theories in Library and Information Science Education

Mackey, T. )., & Jacobson, T. ). (2011). Reframing information literacy as a metaliteracy. College And Research Libraries, 72(1), 62-78.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-79955018169%26site%3deds-live%26scope%3dsite

Reframing Information Literacy as a metaliteracy

Nichols, J. (2009). The 3 directions: Situated information literacy. College And Research Libraries, 70(6), 515-530.
http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dedselc%26AN%3dedselc.2-52.0-73949087581%26site%3deds-live%26scope%3dsite

The 3 Directions_ Situated literacy

 

—————

Journal of Library & Information Services in Distance Learning (J Libr Inform Serv Dist Learn)

https://www.researchgate.net/journal/1533-290X_Journal_of_Library_Information_Services_in_Distance_Learning

http://conference.acrl.org/

http://www.loex.org/conferences.php

http://www.ala.org/lita/about/igs/distance/lit-igdl

————

https://magic.piktochart.com/output/5704744-libsmart-stats-1415

Voice over presentation: solutions

Voice over presentation

Faculty request to lay voice over a presentation with pictures. Solutions:

  • PowerPoint:

Windows / PC

ppt voice over

ppt voice over

Apple/Mac

voice over PPT on Apple

voice over PPT on Apple

advantages:

– unfortunately, faculty are way too familiar with PPT. Familiar to the point that they don’t want to try something better.
– FERPA complient

disadvantages:

– too old. PPT is pre-Internet. It does not matter how much Microsoft is trying to adapt it, the concept is old. There is a myriad of cloud-based solutions, which do better job: https://blog.stcloudstate.edu/ims/2013/09/30/the-5-best-free-slideshow-presentation-and-creation-tools-for-teachers/
– too many files, too many variations
– PPT posted in D2L displays in the D2L Viewer. The visuals are there, but the voice is not. In order to hear the voice, students must download the presentation. Faculty must reflect this in the syllabus.
– faculty need to know how to upload on their web space and figure out URL, if PPT is not place in LMS (D2L)- if faculty places PPT in LMS (D2L), then it is behind password; nearly impossible to share (can share only with SCSU and/or MnSCU members.
– faculty must remember to indicate in the syllabus and/or D2L / Content that “in order to hear the voice over, user must download presentation.”

  • SlideShare

slideshare

slideshare

advantages:

– it is a “social” app, like LinkedIn and Twitter. Tagged correctly, the presentation is a platform for “same-minded” people to discuss mutual interests.
– excellent for sharing: conferences, MOOCs etc.
– it has discussion group in LinkedIn.

disadvantages:

– voice over presentation: way to cumbersome compared to PPT. Watch their presentation
– by FERPA regulations, if the presentation contains personal data about students, it cannot be shared on SlideShare

Creating Narrated Presentations with SlideShare (narrated) from Carolyn Kraut
mybrainshaark

mybrainshaark

advantages:

– it is a “social” app, like LinkedIn and Twitter. Tagged correctly, the presentation is a platform for “same-minded” people to discuss mutual interests.
– excellent for sharing: conferences, MOOCs etc.
– like PPT, very easy upload of pix and voice over. Better the PPT, since it is online and easy to distribute.
– easy to upload PPT and easy to voice over each slide

disadvantages:

– does not embed in D2L (it is D2L issue, not the app), but works perfectly as a link
– faculty must remember to indicate in the syllabus and/or D2L / Content that when clicking on the URL to the PPT, user must simultaneously press “Ctrl” key to open PPT in a separate browser window or tab
– by FERPA regulations, if the presentation contains personal data about students, it cannot be shared on SlideShare

voicethread

voicethread

advantages:

– consistently voted through last 5 years by K12 educators as great interactive tool.
– video, images, audio and text.
– “constructivist” premiss: teacher and students can exchange asynchronously ideas by using images, video, text and audio.

disadvantages:

– free option has limited features.
– by FERPA regulations, if the presentation contains personal data about students, it cannot be shared on on this site.

mediasite

mediasite


advantages
:

– crude screen capture: faculty can run the PPT manually and narrate over it.
– dirty but fast
– easily shared online (URL ready)
– FERPA compliant

disadvantages:

– students cannot comment (compared to VoiceThread)

  • LodeStar

lodestar
lodestar

advantages:

– free: http://lodestarlearning.com/downloads/lodeStar7.2/en/LodeStar-7.0.exe
– easy to use
– FERPA compliant; endorsed by MnSCU

disadvantages:

– voice over too complex (very much the same as with SlideShare)

  • SoftChalk

advantages:
– FERPA compliant; endorsed by MnSCU

disadvantages:

  • others

I have not included TechSmit’s Jing https://www.techsmith.com/jing.html, because their video output (Flash file) is obsolete and impossible to convert for free. While it still can be played, shall faculty want to upload the video file on Youtube or similar social media, it will be impossible.

———————————-

Related IMS blog entries:

https://blog.stcloudstate.edu/ims/2014/06/01/social-media-and-presentations-free-image-sources/

https://blog.stcloudstate.edu/ims/2013/09/30/the-5-best-free-slideshow-presentation-and-creation-tools-for-teachers/

IPython notebook

Library Juice Academy

course_intro

I also encourage students to download and install Python on their own systems. Python is a
mature and robust language with a great many third party distributions and versions, such as Ipython.
One I recommend is Active State Python. Active State produces refined and well supported
distributions with easy to use installers. Their basic, individual distribution is free. You can find it at
http://www.activestate.com/activepython/downloads
https://host.lja-computing.net:8888/notebooks/profile_intro_programming_p1/Intro_Programming_Lesson1_pmiltenoff.ipynb
  • Integers: A signed or unsigned whole number running from -32,768 to 32,768 or from 0 to 65,535 if not signed. Integers are used anytime something needs to be counted.
  • Long Integer: Any whole number outside the above range. Python doesn’t distinguish between the two though many languages do. Practically, Python’s integers range from −2,147,483,648 to 2,147,483,648 or 0 to 0 to 4,294,967,295. Most of us will be very happy with this many whole numbers to choose from.
  • Real and Floating Point Numbers: Real numbers are signed or unsigned numbers including decimals. The numbers 2,3,4 are Integers and Real Numbers. The numbers 2.1, 2.9,3.9 are Real Numbers, but not Integers. Real Numbers can include representations of irrational numbers such as pi. Real numbers must be rational, that is a decimal number that terminates after a finite number of decimals. You will sometimes encounter the term Floating Point Numbers. This is a technical term referring to the way that large Real Numbers are represented in a computer. Python hides this detail from you so Real and Floating Point are used intercangeably in this language.
  • Binary Numbers: And Octal and Hexadecimal. These are numbers used internally by computers. You will run into these values fairly often. For instance, when you see color values in HTML such as “FFFFFF” or “0000FF”,
Hexadecimal and Octal are used because humans can read them without too much trouble and they are compromise between what computers process and what we can read. Any time you see something in Octal or Hexadecimal, you are looking at something that interfaces with the lower levels of a computer. You will most commonly use Hexadecimal numbers when dealing with Unicode character encodings. Python will interpret any number which begins with a leading zero as binary unless formatting commands have been used.
Numbers such as 7i are referred to as complex. They have a real part, the 7, and an imaginary part, i. Chance are you won’t use complex numbers unless you’re working with scientific data.
A String consists of a sequence of characters. The term String refers to how this data type is represented internally. You store text in Strings. Text can by anything, letters, words, sentences, paragraphs, numbers, just about anything.
Lists are close cousins to Strings, though you may never need to think of them that way. A list is just that, a list of things. Lists may contain any number of numbers or any number of strings. List may even contain any number of other lists. Lists are compared to arrays, but they are not the same thing. In most uses, the function the same so the difference, for our purposes, is moot. Strings are like lists in that, internally, the computer works with strings in an identical manner to lists. This is why the operations on Strings are so different from numbers.
The last main data type in the Python programming language is the dictionary. Dictionaries are map types, known in other languages as hashes, and in computer science as Associative Arrays. The best way to think of what the dictionary does is to consider a Library of Congress Call Number(something this audience is familiar with). The call number is what’s called a Key. It connects to a record which contains information about a book. The combination of keys and records, called values, comprises a dictionary. A single key will connect to a discrete group of values such as the items in this record. Dictionaries will be touched on in the next lesson in some detail in the next course. These are fairly advanced data structures and require a solid understanding a programming fundamentals in order to be used properly.

Statements, an Overview

Programs consist of statements. A statement is a unit of executable code. Think of a statement like a sentence. In a nutshell, statements are how you do things in a program. Writing a program consists of breaking down a problem you want to solve into smaller pieces that you can represent as mathematical propositions and then solve. The statement is where this process gets played out. Statements themselves consist of some number of expressions involving data. Let’s see how this works.

An expression would be something like 2+2=4. This expression, however is not a complete statements. Ask Python to evaluate it and you will get the error “SyntaxError: can’t assign to operator”. What’s going on here? Basically we didn’t provide a complete statement. If we want to see the sum of 2+2 we have to write a complete statement that tells the interpreter what to do and what to do it with. The verb here is ‘print’ and the object is ‘2+2’. Ask Python to evaluate ‘print 2+2’ and it will show ‘4’. We could also throw in subject and do something a bit more detailed: ‘Sum=2+2’. In this case we are assigning the value of 2+2 to the variable, Sum. We can then do all sorts of things with Sum. We can print it. We can add other numbers to it, hand it off to a function and so on. For instance, might want to know the root of Sum. In which case we might write something like ‘print sqrt(sum)’ which will display ‘2’.

A shell is essentially a user interface that provides you access to a system’s features. Normally, this means access to an Operating System. In cases like this, the shell provides you access to the Python programming environment.

Anything preceed by a “#” is not interpreted or executed by the programming shell. Comments are used widely to document programs. One school of programming holds that code should be so clear that comments are uncessary.

Operations on Numbers

Expressions are discrete statements in programming that do something. They typically occupy one line of code, though programmers will sometimes squeeze more in. This is generally bad form and can really make your program a mess. Expressions consist of operations and data or rather data and operations on them. So, what can you do with numbers? Here is a concise list of the basic operations for integers and real numbers of all types:

Arithemetic:

  • Addition: z= x + y
  • Subtraction: z = x – y
  • Multiplication: z = x * y. Here the asterisk serves as the ‘X’ multiplication symbol from grade school.
  • Division: z = x/y. Division.
  • Exponents: z = x ** y or xy, x to the y power.

Operations have an order of precedence which follows the algebraic order of precedence. The order can be remembered by the old Algebra mnenomic, Please Excuse My Dear Aunt Sally which is remeinds you that the order of operations is:

  1. Parentheses
  2. Exponents
  3. Multiplication
  4. Division
  5. Addition
  6. Subtraction

Operations on Strings

Strings are strange creatures as I’ve noted before. They have their own operations and the arithmetic operations you saw earlier don’t behave the same way with strings.

Putting Expressions Together to Make Statements

As I noted earlier, all computer languages, and natural languages, possess pragmatics, larger scale structures which reduce ambiguity by providing context. This is a fancy way of saying just as sentences posses rules of syntax to make able to be comprehended, larger documents have similar rules. Computer Programs are no different. Here’s a break down of the structure of programs in Python, in a general sense.

  1. Programs consist of one or more modules.
  2. Modules consist of one or more statements.
  3. Statements consist of one or more expressions.
  4. Expressions create and/or manipulate objects(and variables of all kinds).

Modules and Programs are for the next class in the series, though we will survey these larger structures next lesson. For now, we’ll focus on statements and expressions. Actually, we’ve already started with expressions above. In Python, statements can do three things.

  • Assign a variable
  • Change a variable
  • Take an action

Variable Names and Reserved Words

Now that we’ve seen some variable assignments, let’s talk about best practices. First off, aside from reserved words, variable names can be almost any combination of letters, numbers and punctuation marks. You, however, should never ever, use the following punctuation marks in variable names:

      • +
      • !
      • @
      • ^
      • %
      • (
      • )
      • .
      • ?
      • /
      • :
      • ;

*

These punctuation marks tends to be operators and characters that have special meanings in most computer languages. The other issue is reserved words. What are “reserved words”? They are words that Python interprets as commands. Pythons reservers the following words.:

  • True: A special value set aside for boolean values
  • False: The other special value set aside for boolean vaules
  • None: The logical equivalent of 0
  • and: a way of combining logical conditions
  • as: describes how modules are imported
  • assert: a way of forcing something to take on a certain value. Used in debugging of large programs
  • break: breaks out of a loop and goes on with the rest of the program
  • class: declares a class for object oriented design. For now, just remember not to use this variable name
  • continue: returns to the top of the loop and keeps on going again
  • def: declares functions which allow you to modularize your code.
  • elif: else if, a cotnrol structure we’ll see next lesson
  • else: as above
  • except: another control structure
  • finally: a loop control structure
  • for: a loop control structure
  • from: used to import modules
  • global: a scoping statement
  • if: a control structure/li>
  • in: used in for each loops
  • is: a logical operator
  • lamda: like def, but weird. It defines a function in a single line. I will not teach this becuase it is icky. If you ever learn Perl you will see this sort of thing a lot and you will hate it, but that’s just my personal opinion.
  • nonlocal: a scoping command
  • not: a logical operator
  • or: another logical operator
  • pass: does nothing. Used as placeholder
  • raise: raises an error. This is used to write custom error messages. Your programs may have conditions which would be considered invalid based on our business situation. The interpreter may not consider them errors, but you might not want your user to do something so you ‘raise’ an exception and stop the program.
  • return: tells a function to return a value
  • try: this is part of an error testing statement
  • while: starts a while loop
  • with: a context manager. This will be covered in the course after the next one in this series
  • yield: works like return
Variable names should be meaningful. Let’s say I have to track a person’s driver license number. explanatory names like ‘driverLicenseNumber’.

  • Use case to make your variable names readable. Python is case sensitive, meaning a variable named ‘cat’ is different from named ‘Cat’. If you use more than one word to name variable, start of lower case the change case on the second word. For instance “bigCats = [‘Tiger’,’Lion’,’Cougar’, ‘Desmond’]”. The common practice used by programmers in many settings is that variables start with lowercase and functions(methods and so on) start with upper case. This is called “Camel Case” for its lumpy, the humpy appearance. Now, as it happens, there is something of a religious debate over this. Many Python programmers prefer to keep everything lower case and join words in a name by underscores such as “big_cats”. Use whichever is easiest or looks the nicest to you.
  • Variable names should be unique. Do not reuse names. This will cause confusion later on.
  • Python conventions. Python, as with any other programming language, has culture built up around it. That means there are some conventions surrounding variable naming. Two leading underscores, __X, denote system variables which have special meaning to the interpreter. So avoid using this for your own variables. There may be a time and place, but that’s for an advanced prorgramming course. A single underscore _X indicates to other programmers that this a fundamental variable and that they mess with it at their own peril.
  • Avoid starting variable names with a number. This may or may not return an error. It can also mislead anyone reading your program.
  • “A foolish consistency is the hobgoblin of little minds”. But not to programming minds. Consistency helps the readability of code a great deal. Once you start a system, stick with it.

Statement Syntax

Putting together valid statements can be a little hard at first. There’s a grammar to them. Thus far, we’ve mainly been workign with expressions such as “x = x+1”. You can think of expression as nouns. We’ve clearly defined x, but how do we look inside? For that we need to give it a verb, the print command. We would then write “print x”. However we can skip the middle statement and print an expression such as “print x + 1”. The interpreter evaluates this per the order of operations I laid out earlier. However, once that expression is evaluated, it then applies the verb, “print”, to that expression.

Print is a function that comes with the Python distribution. There are many more and you can create your own. We’ll cover that a bit in next lesson. Let’s look at little more at the grammar of a statement. Consider:

x = sin(b)

Assume that b has been defined elsewhere. x is the subject, b is the object and sin is the verb. Python will go to the right side of the equal sign first. It will then go to the inside of the function and evaluate what’s there first. It then evaluates the value of the function and finishes by setting x to that value. What about something like this?

x=sin(x+3/y)

Python evaluates from the inside out according to the rules of operation. Very complex statements can be built up this way.

x = sin(log((x + 3)/(e**2)))
Regardless of what this expression evaluates to (I don’t actually know), Python starts with the innermost parentheses, then works through the value of e squared then adds 3 to x and divides the result by e squared. With that worked out, it takes the logarithm of the result and takessthe sine of that before setting x to the final result.What you cannot do is execute more than one statement on a line. No more than one verb on a line. In this context, a verb is an assignment, or a command acting on an expression
markdown cell
code cell

Call up your copy of Think Python or go to the website at http://www.greenteapress.com/thinkpython/html/. Read Chapter 2. This will reiterate much of what I’ve presnted here, but this will help cement the content into you minds. Skip section 2.6 because IPython treats everything as script mode. IPyton provides you with the illusion of interactive, but everything happens asynchronously. This means that any action you type in will not instantaneously resolve as it would if you were running Python interactively on your computer. You will have to use print statements to see the results of your work.

Your assignment consists of the following:

  • Exercise 1 from Chapter 2 of Think Python. If you type an integer with a leading zero, you might get a confusing error:
    <<< zipcode = 02492

    SyntaxError: invalid token
    Other numbers seem to work, but the results are bizarre:
    <<< zipcode = 02132
    <<< zipcode
    1114
    Can you figure out what is going on? Hint: display the values 01, 010, 0100 and 01000.

  • Exercise 3 from Chapter 2 of Think Python.Assume that we execute the following assignment statements:
    width = 17
    height = 12.0
    delimiter = ‘.’
    For each of the following expressions, write the value of the expression and the type (of the value of the expression).

    width/2
    width/2.0
    height/3
    1 + 2 5
    delimiter
    5

  • Exercise 4 from Capter 2 of Think Python. Practice using the Python interpreter as a calculator:
    1. The volume of a sphere with radius r is 4/3 π r3. What is the volume of a sphere with radius 5? Hint: 392.7 is wrong!
    2. Suppose the cover price of a book is $24.95, but bookstores get a 40% discount. Shipping costs $3 for the first copy and 75 cents for each additional copy. What is the total wholesale cost for 60 copies?
    3/ If I leave my house at 6:52 am and run 1 mile at an easy pace (8:15 per mile), then 3 miles at tempo (7:12 per mile) and 1 mile at easy pace again, what time do I get home for breakfast?

In your IPython notebook Create a markdown cell and write up your exercise in there. Just copy it from the textbook or from the above write up. Next ceate a code cell and do your work in there. Please, comment your work thoroughly. You cannot provide too many comments. Use print statements to see the outcome of your work.

MakerSpace in the library

Library Makerspaces: From Dream to Reality

Instructor: Melissa Robinson

Dates: April 6 to May 1st, 2015

Credits: 1.5 CEUs

Price: $175

http://libraryjuiceacademy.com/114-makerspaces.php

Designing a makerspace for your library is an ambitious project that requires significant staff time and energy. The economic, educational and inspirational rewards for your community and your library, however, will make it all worthwhile. This class will make the task of starting a makerspace less daunting by taking librarians step by step through the planning process. Using readings, online resources, discussions and hands-on exercises, participants will create a plan to bring a makerspace or maker activities to their libraries. Topics covered will include tools, programs, space, funding, partnerships and community outreach. This is a unique opportunity to learn in depth about one public library’s experience creating a fully-functioning makerspace, while also exploring other models for engaging libraries in the maker movement.

Melissa S. Robinson is the Senior Branch Librarian at the Peabody Institute Library’s West Branch in Peabody, Massachusetts. Melissa has over twelve years of experience in public libraries. She has a BA in political science from Merrimack College, a graduate certificate in Women in Politics and Public Policy from the University of Massachusetts Boston and a MLIS from Southern Connecticut State University. She is the co-author of Transforming Libraries, Building Communities (Scarecrow Press, 2013).

Read an interview with Melissa about this class:

http://libraryjuiceacademy.com/news/?p=733

Course Structure

This is an online class that is taught asynchronously, meaning that participants do the work on their own time as their schedules allow. The class does not meet together at any particular times, although the instructor may set up optional sychronous chat sessions. Instruction includes readings and assignments in one-week segments. Class participation is in an online forum environment.

Payment Info

You can register in this course through the first week of instruction. The “Register” button on the website goes to our credit card payment gateway, which may be used with personal or institutional credit cards. (Be sure to use the appropriate billing address). If your institution wants to pay using a purchase order, please contact us to make arrangements.

==============================

Making, Collaboration, and Community: fostering lifelong learning and innovation in a library makerspace
Tuesday, April 7, 2015 10AM-11:30AM PDT
Registration link: http://www.cla-net.org/?855

Travis Good will share insights garnered from having visited different makerspaces and Maker Faires across the country. He will explain why “making” is fundamentally important, what its affecting and why libraries are natural place to house makerspaces. Uyen Tran will discuss how without funding, she was able to turn a study room with two 3D printers into a simple makerspace that is funded and supported by the community. She will also provide strategies for working with community partners to provide free and innovative maker programs and creating a low cost/no cost library maker environment. Resources and programming ideas will also be provided for libraries with varying budgets and staffing. Upon completing this webinar, every attendee should be able to start implementing “maker” programs at their library.

1 5 6 7 8