Art of Cyberdribble is a blog written by adult learners at the Regis University College for Professional Studies (CPS). The purpose of the blog is to examine the intersection of communication and cyberspace.
Can Twitter and Facebook replace the nightly news?
Is social media a more current news source?
Perhaps one of the best examples of how information from social networking sites can be sourced in order to provide information is the website Ushahidi which uses crowd sourcing technology to map social networking activity. Ushahidi, which means “testimony” in Swahili, was founded in Kenya in response to the social unrest following the 2008 presidential election. The mission of Ushahidi is to use the crowd sourcing data in order to provide live updates on events that have an impact on social issues ranging from natural disasters to political uprisings. The website’s unique ability to map reports of violence using data from social networking sites (submitted via the web and mobile phones) made it one of the most reliable news sources for tracking violence in Kenya. The site has since expanded into a sophisticated source for real-time information on social issues occurring around the world. In fact, the real time data mapping provided by Ushahidi is being used by humanitarian organizations conducting relief efforts because of the website’s ability to “flag up danger around the world within seconds, enabling the organization to offer help to people around the globe” (Akhtar, 2011). Humanitarian organizations are able to use Ushahidi to gather real-time data on people in need thanks to a mapping analysis of social media users’ updates to their accounts. In this regard, the news source has become the very people experiencing an event as opposed to more traditional news reporters who are sent to a location to report on an event.
A Closer Look at Social Networking for Disaster Relief
A case study by Huang et. al describes the application of internet social networking among large web-users during a major natural disaster in Taiwan and how “Web 2.0” was used to “establish an integrated internet-based emergency response system… [which] empowered the public to share experience and information during emergency and disaster response activities” (Huang et al., 2010). When the Morakot typhoon hit Taiwan, the night of August 8 2009 causing massive damage to Southern Taiwan, web users immediately began reporting the real-time situation on the forum PTT, one of the most popular internet social networks in Taiwan, and by the morning a sophisticated online relief network was established. “On August 9th, an unofficial Morakot Online Disaster Report Center was established by a group of internet users from the Association of Digital Culture Taiwan They advised fellow Internet users living near areas battered by the storms to gather information, such as sustained damage or assistance needed on popular social networking websites, including Twitter… Twitter users also sent messages to help rescuers acquire accurate position for their family and friends who live in affected areas” (Huang et. al, 2010). In contrast to the disaster response through social networking sites, the official response operations were not coordinated efficiently. “During the most crucial first few hours after the catastrophe, the Central Response Center underestimated the early scope and gravity of the disaster due to the lack of information and communication from affected areas. Official government communication early in the crisis failed, causing people to turn to [the Web]” (Huang et al., 2010).
Ushahidi and the Morakot typhoon response are just two examples of how “Web 2.0” is becoming an increasingly trustworthy news source. Social networking platforms have the unique ability to provide real-time data from people experiencing a newsworthy event. Social networking sites can provide a vital two-way information channel that can help those in need get assistance and provide the rest of the world with real-time personal accounts of what is happening on the ground.
--Phil
Resources:
1) Akhtar, Tanzeel “The Charitable Face of Data Use” Accessed on December 9, 2011 via: http://www.marketingweek.co.uk/disciplines/data-strategy/the-charitable-face-of-data-use/3032554.article
2) Huang, Cheng-Min, Edward Chan and Adnan A Hyder “Web 2.0 and Internet Social Networking: A new tool for Disaster Management? – Lessons from Taiwan” BMC Medial Informatics and Decision Making 2010, 10:57.
Twitter and education, really? Really!
Twitter and education, really? Really!
Twitter and Education
Personally, I’m not sure how useful knowing that Ashton Kutcher ate a grapefruit for breakfast is to society, and keeping up with our favorite celebrities seems to be about the only thing that Twitter is good for. However, unbelievably, that is not entirely correct. Twitter can also be used in many applications to benefit educators and students. Don’t believe me? Well, I didn’t believe it at first either, but read on to be convinced!
I have so many followers!
Twitter is a micro blogging site that allows people to post messages, and these posts are delivered to the "followers" of the poster by text message. As an
student or facilitator, this service can come in very handy when one needs to get a message to the entire class without waiting for people to log on to the class site.
Due to the format of online classes, most students are only able to log on once per day to check updates and emails on their class site. "Such a service could be useful for teachers or students who want to send a text message to the whole class"(Moody, 2010).Imagine a scenario where your professor has changed the due date of a large assignment to the next night, instead of tonight. If this facilitator has utilized Twitter, he or she could easily "tweet"an update and the whole class would know instantly (and an extra day to complete an assignment is something most students want to know instantly!)
I participated in the class discussion and didn't have to say anything!
Twitter is not only a way to update one's students or fellow classmates to changes in the course; it can also be a way to keep everyone involved. Imagine
participating in class discussions at any time. Imagine having a brilliant idea at 9pm on a Tuesday and being able to "tweet" to your fellow classmates and professor
despite the late hour. This prevents trying to remember the brilliant thought, and allows for feedback from everyone even outside the classroom. "Parry uses Twitter
to enhance his classes and as a means of keeping students engaged in course content beyond the classroom walls. He has them create Twitter profiles and "follow," or
track, his updates along with those of friends and others outside the university. Many of his students go one step further and use the site to alert their classmates
to world events or issues that are relevant to the course" (Miners, 2010). Twitter also allows students to keep up with current events in real time, since many events
happening in the world today are "tweeted" about before they are reported by the professional news sources.
It’s hard to hear with all this "tweeting" going on
Twitter is not just for stalking your favorite celebrities anymore! By utilizing Twitter in the classroom, teachers and students can both benefit, 140 characters at a time. By keeping class discussions open 24 hours a day, 7 days a week, facilitators and students can benefit from larger, and deeper discussions. Twitter also allows for instant communication between students and professors when time is of the essence.
Samantha J
References
Miners, Z. (2009). Twitter Takes a Trip to College. U.S. News & World Report,146(8), 56-57.
Moody, M. (2010). Teaching Twitter and Beyond: Tips for Incorporating Social Media in Traditional Courses. Journal Of Magazine & New Media Research, 11(2), 1-9.
Twitter. (2011). Retrieved from http://twitter.com/.
Electronic Medical Record
Incentives
The United States congress has been encouraging the use of electronic health records by offering monetary incentives to those who are willing to participate and follow the designed criteria (Alder-Milstein, Bates, & Jha, 2011). The problem with this is how to incorporate the flow of information amongst other groups, such as between clinics, laboratories, or other health providers (Gunningberg, 2011). According to Gunningberg, et al., (2011) the use of regional health information organizations (RHIO), could help eliminate this problem through one single connection. The big questions are how many RHIO are there, how do they support the data exchange, how many providers are participating, and how many RHIO are economically visible (Gunningberg, et al., 2011)? Even though this sounds like an excellent idea there is limited data on how the RHIO are doing and whether they are helping the health care providers meet the needed criteria (Gunningberg, 2011).
Benefits of Electronic Medical Records
According to Vogel, (2011) some of the benefits of this type electronic information is the patient’s ability to schedule their appointments online, be able to refill prescriptions and view parts of their chart via web anytime of the day. The electronic medical records allows quicker access to test results, the ability to share information with other medical providers with fewer chances of hand writing based errors or duplicating tests. The patient can review what was talked about during a visit and receive a legible print out that is easy to read on regarding the conversation (Vogel, 2011).
Perceived Problems
A few perceived problems in regards to electronic health data exchange has to do with confidentiality and security (Zwaanswijk, 2011). The system would need to have security system that could protect the patient’s medical data, and few ways in which this could be obtained is by allowing only certain members of the health care team to be allowed to access patient information and monitoring the log in’s into these areas (Zwaanswijk, 2011). The electronic health record has the possibility to be a very valuable tool in auditing information on quality of care provided (Gunningberg, Fogelberg-Dahm & Ehrenberg, 2008). Of course, the only problem with this electronic information highway is keeping the patient information private (Vogel, 2011).
Donna S
Reference
Alder-Milstein, J, Bates, D, & Jha, A, (2011), A survey of health information exchange organizations in the United States: implications for meaningful use, American College of Physicians, 154, pp. 666-671, www.annals.org.
Gunningberg, L, Fogelberg, M, & Ehrenberg, A, (2008), Improved quality and comprehensiveness in nursing documentation of pressure ulcers after implementing an electronic health record in hospital care, Journal of Clinical Nursing, 18, pp. 1557-1564, DOI:10.1111/j.1365-2702.2008.02647.x.
Vogel, J, (2011), Electronic records mandate strains rural hospitals, MPRNEWS, www.minnesota.publicradio.org/display/web/2011/06/20/ground-level-rural-health-care-electronic-medical-records/
Zwaanswijk, M, Verheij, R, Wiesman, F, and Friele, R, (2011), Benefits and problems of electronic information exchange as perceived by health care professionals: an interview study, BMC Health Services Research, 11, 256, pp. 1-10, www.biomedcentral.com
Is Open Communication Possible Online?
The manner in which we express ourselves online goes beyond caring what others think about our opinions. When we present our opinions online we can truly express our real thoughts, but some people will still try to present only non confrontational points of view. This is not constructive in truly discussing a subject. It is quite possible to present your real views while being diplomatic about those views and respecting and allowing for others to do the same. A strong opinion that does not take into consideration respect for others might obstruct classmate’s desire to participate in a forum because of the fear of being attacked by the other participants. Liu & Fahmy (2010) explain, “The spiral of silence theory proposes that the likelihood an individual will express their opinions in public are based on the positive monitoring of the opinion climate and the comparison of their own opinions with the perceived current and future public opinions. If individuals perceive that their opinions are on the majority or on the rise, they might be willing to speak out. However, if they judge that their opinions are on the minority side or are on the decline, they might decide to keep silent or conform to the majority” (Page 46).
My personal experience in an online environment is that it is perfectly fine disagreeing on a topic, and one should stand up for ones point of view, but there is no need to hurt others to get your point across. Opinions and views are fine to present, however any opinion should be backed up with some informative facts or data, instead of ending a conversation by saying “because I say so.” Everyone has an opinion, but it is not constructive to present opinions without showing why those opinions exist by using data and supportive information. My husband once told me: “If we all agree that we disagree, there will be fewer conflicts in this world.”
Integrity in an Online Environment
When interacting in an online environment, we do not see faces or hearts, just words; therefore, the way we express ourselves on the internet can define who we are in the eyes of someone else. But are we who we say we are to others? Or do we project a huge shield to protect ourselves from others? Or do we not take online communication seriously at all? Maybe I should rephrase my question: Are we honest with ourselves? The answer to those questions is for each one of us to answer. Suler (2004) explains, “It’s well known that people say and do things in cyberspace that they wouldn't ordinarily say or do in the face-to-face world. They loosen up, feel more uninhibited, and express themselves more openly. Researchers call this the "disinhibition effect." It's a double-edged sword. Sometimes people share very personal things about themselves. They reveal secret emotions, fears, wishes. Or they show unusual acts of kindness and generosity. We may call this benign disinhibition. On the other hand, the disinhibition effect may not be so benign [because] out spills rude language, harsh criticisms, anger, hatred,[and] even threats; we might call this toxic disinhibition” (Para.1). There is something interesting that happens to personalities when taking online classes. We see many times people extremely introverted in a face to face environment, but in an online environment they are willing to speak out and share personal experiences.
According to Suler (2004), “While online people may feel they have more opportunities to present themselves as they would like to present themselves, particularly in the carefully composed text of asynchronous communication. They may have more chances to convey thoughts and emotions that go "deeper" than the seemingly superficial persona of everyday living. These opportunities are very valuable aspects of cyberspace, but not necessarily evidence of a more true self. What we reveal about ourselves spontaneously, often right on the surface for others to see but without our being consciously awareness of it, may be just as real and true” (para.26). The truth is that we do not know who we are talking to on the other side of our screen. It is a normal reaction to the unknown to keep things at a distance, but sometimes it is necessary to step in to break the ice between online classmates. In most online environments I think it is smart to keep things at a more professional level, but when it comes to classmates, it is more enjoyable sharing experiences that we might learn from one another.
Self -Disclosure versus Privacy
Expressing one’s opinion or feelings is one thing, and disclosing personal information that can jeopardize our identity is a different topic. According to Joinson & Paine (2005), “In a legal context, privacy is largely synonymous with a ‘right to be let alone’. However, others have argued that privacy is only the right to prevent the disclosure of personal information” (Pg. 14)
Let us not confuse being honest with ourselves and the way with express our feelings or thoughts in our online classroom; versus being totally trusted to any unsecure chat room or blog and provide our address or social number to others.
According to Joinson & Paine (2005), “Self-disclosure is the telling of the previously unknown so that it becomes shared knowledge, the “process of making the self known to others” (Pg. 2). It is a normal attitude not to be willing to disclose ones feelings or thoughts at first in an online environment, because all our classmates will know who said what since posts are not anonymous. Another reason people might not express themselves is they might feel more vulnerable to others and fear to express their honest opinions.
Joinson & Paine (2005) explain that “self-disclosure can be categorized into either peripheral, intermediate, and core layers. The peripheral layer is concerned with biographic data (e.g. age), the intermediate layer with attitudes, values, and opinions and the core layer with personal beliefs, needs, fears, and values” (Pg.3). In my experience with online classes the peripheral and intermediate layers are the ones best expressed among classmates and myself. Only a few classes I have seen require one to develop the core layers and defend ones personal beliefs and values.
The best part of being oneself in an online environment is to build good relationships and new friends as well as to explore new parts of ourselves which help us to grow intellectually and internally.
Carol H.
References
Joinson, A. and Paine, C.(2005). Self-disclosure, Privacy and the Internet. Retrieve from
http://www.york.ac.uk/res/e-society/projects/15/PRISD_report2.pdf
Liu, X. & Fahmy,S.(2010). Exploring the spiral of silence in the virtual world: lndividuals'Willingness to express personal opinions in online versus offline settings. Journal of Media and Communication Studies Vol. 3(2), pp. 45-57. Retrieve from
http://www.academicjournals.org/jmcs/PDF/pdf2011/Feb/Liu%20and%20Fahmy.pdf
Suler, J. (2004). The Online Disinhibition Effect. Retrieved from
http://users.rider.edu/~suler/psycyber/disinhibit.html#trueself
Cyber Voting
"Hanging chads" of the 2000 presidential race, many election officials looked to technology to come to their rescue” (Walton, 2003). The electronic voting technology has features such as touch screens and added features the older punch card voting systems doesn’t. Most argue that it is efficient, secure and cost effective. However, a congressional research service concluded that the system may be vulnerable to attacks and other faults that could prevent its functionality.
Security/functionality:
“The popularity of DREs, particularly the touchscreen variety, has been growing,
and many expect that growth to continue” (Fischer, 2004). Many voters perhaps may like the opportunity to avoid long lines to perform a quick secure vote, The congressional research service has concluded that electronic voting systems accurately records a voter’s choice and reduces the likely hood of submitting the wrong choice. The machines are multicultural where each can display ballots in different languages depending on voters’ needs. (Fischer, 2004). but what good is the transaction if it is hard to understand and subjected to attack via the internet?
Problems:
The machines are said to be standalone machines so the hacking and data compromise is not possible. However, telephone connections are increasingly internet based. This provides the possibility of interception with voting data. The machines use modems to communicate over telephone lines. These transmissions in the past that traveled only over copper lines are now being routed over the internet. So, the chances of compromise are equal to any networkable communication devices. Another issue is the changes of votes without detection. According to Everett, “Entire races can be added or Removed from ballots and voter’s candidate selections can be flipped and the majority of users do not notice” (Everett, 2007). So are we ready for the electronic voting? The concept is growing and the concerns of how to vote in cyberspace has members in our government and private sector searching for solutions. One thing is certain is that E-voting is going to expand when the security flaws has been removed.
Rowe K
References:
Walton, M. (2003) Electronic Voting no magic bullet. Retrieved from http://articles.cnn.com/2003-12-11/politics/elec04.nist.evoting_1_electronic-voting-rebecca-mercuri-new-voting-technology?_s=PM:ALLPOLITICS
http://www.election-america.com/?gclid=COHdo_6x-awCFacZQgod7D7SRw
Fischer, E. (2004) Electronic Voting Systems (DREs): Legislation in the 108th Congress retrieved from:
http://votingmachines.procon.org/sourcefiles/Electronic%20Voting%20Systems%20Legislation%20in%20the%20108th%20Congress.pdf
Ways To Recycle Your computer and it's unseen importance
According to greenhome.com, approximately 10 billion computers are dumped in landfills each year, and according to National Safety Society only 11 percent of computers are actually recycled. There is a big concern when landfills accumulate such huge amounts of old computers. The concerns are the toxic harm that these computers contain. Heavy metals such as cadmium, chromium, mercury are just only a few that are hazardous to health and the environment. The computer monitor screens contain cathode tubes, which contain lead that can after destroyed can melt or drain away in the environment causing hazardous health problems.
Ways to recycle your old computer correctly would be to contact your computers manufacturer to see if they take back old or obsolete computers.
Hewlett-Packard takes back its old printers as does Apple. Contacting a proper computer recycling center is also helpful as they melt down the precious metals and properly dispose of the computer parts in a safe and manageable manner. Another good idea would be to donate your old computers to schools or non-profit organizations for use.
Proper methods can be taken to properly dispose of computers so that the environment and health can be preserved. Responsibility goes a long way, and being responsible can save time, money, and lives in some cases.
References:
Home, G. (n.d.). What to do with tech trash?. Retrieved from http://www.greenhome.com/info/articles/your_community/56/
Turner, L. (2010, May 20). [Web log message]. Retrieved from http://www.livestrong.com/article/127692-computer-recycling-important/
Importance of Computer Recycling
When the time comes to finally buy that shiny new computer you've been eying, you may find yourself wondering what to do with the old one. Many electronics retailers and computer manufacturers advertise trade-in programs, and many states have even prohibited computers from being dumped in landfills.
Types
Computers can be recycled in a couple of ways, depending on the state of the machine. Giving old, working computers to friends and family members or donating them to nonprofit organizations not only keeps the computer entirely out of the waste stream, but it presents computer access to someone who might not otherwise be able to afford it. Non-working computers can be sent to recycling centers where they are dismantled and valuable components are recovered.
Considerations
Donating a working computer can be a tax write-off, so if you've got a functional computer on your hands, there is an added monetary benefit to donation. However, if the computer really is at its end of life, it might be more trouble than it's worth to a charity organization, which would then just have to seek a means of disposal. The Environmental Protection Agency suggests computers five years old or less and in working condition be donated; others should be recycled.
Misconceptions
When your computer goes off for recycling, it doesn't necessarily mean the world becomes a cleaner place. Some less responsible collection programs actually end up with computers being shipped off to developing nations where they become an even bigger health hazard. In some small provinces of China, locals pick through mountains of e-waste to recover valuable materials without proper protection, reports the Basel Action Network, a global watchdog organization that recently launched its own global e-waste recycler certification to recognize responsible recyclers.
Warnings
Whatever method of recycling you've chosen for your computer, you'll want to make sure your personal information has been wiped clean from its hard drive. Whether donated to another user or sent to a recycler for scrap, the data on your hard drive can be retrieved, and personal information such as financial records or social security numbers can be dangerous in the wrong hands.
Potential
Nearly 70 million computers were sitting in storage in 2007, according to the EPA. If even half were usable, nearly 35 million people or organizations could reap the benefit of a working computer. If the rest were recycled rather than being sent to landfill, the reduction in greenhouse gas emissions would be staggering--the EPA calculates that recycling just 1 million computers prevents the release of greenhouse gases equivalent to the emissions of 16,000 cars.Read more: http://www.livestrong.com/article/127692-computer-recycling-important/#ixzz1fFerc95k
todd w
Using microblogging for more than celebrity gossip
One of the great benefits of these technologies is that they are able to share the information publicly. For this reason it has been considered an ideal technology for the dissemination of information about natural disasters.While it does not rank in the top 10 Nielsen websites for August 2011, Twitter has grown substantially since it's 1.2 million visitors a month in April of 2008 (Johnson, 2009). One of the more practical uses of Twitter (and Facebook and similar sites) is quick dissemination of information during a natural disaster. Freeman analyzed the use of twitter during 3 Australian disasters: the Victorian wildfires of early 2009, flooding in Queensland in late 2010-early 2011, and tropical cyclone Yasi in early 2011. In the wildfires Twitter was used primarily by news outlets to spread information about the fires well beyond Australia. However, by late 2010 the Queensland Police Service and the local power company were prepared to spread warnings and pertinent information to locals about the floods and cyclone. In all three disasters, citizens themselves were, of course, a major source of information.
Unlike traditional news channels, Twitter does not fact-check or filter information. The unreliability of crowd-sourced news is indeed one of the biggest problems in a disaster situation. One could certainly imagine bad information about safe evacuation routes causing people to get stranded or worse. Freeman notes that National ICT Australia is working on methods to coordinate government usage of electronic communications. Having up-to-the-minute official information in a disaster is likely to be more useful, or at least make people feel better.
So the next time you see someone checking their twitter obsessively, don't immediately pass them off as a Beiber fan. They just might see the tornado warning that saves your life.
-Evan W.
Freeman, M. (2011). Fire, wind and water: social networks in natural disasters. Journal of Cases on Information Technology, 13(2), 69+. Retrieved from http://go.galegroup.com.dml.regis.edu/ps/i.do?id=GALE%7CA273280029&v=2.1&u=regis&it=r&p=CDB&sw=w
Johnson, S. (2009). How Twitter Will Change The Way We Live (in 140 characters or less). (Cover story). Time, 173(23), 32-37.
Ensuring Internet communication success.
The Transformation of Socialization with the onset of Mobile Phones
Is blended learning the future classroom?
Understanding the demand for blended learning
Blended Learning: The Convergence of Online and Face-to-Face Education by John Watson provides an excellent overview of why schools are taking to implement blended learning in K-12 education. According to Watson, high student demand for online learning options is driving rapid growth of online courses available to schools. He states, “Thirty states and more than half of the school districts in the United States offer online courses and services, and online learning is growing rapidly, at 30% annually. This growth is meeting demand among students, as more than 40% of high school and middle school students have expressed interest in taking an online course.” In addition to pure student demand, many schools are also motivated to explore blended learning options because of the potential cost savings. Given the flattening of, and even reductions to, education funding (Roza, Lozier and Sepe, 2010) schools do need to identify means to reduce costs and blended learning offers the possibility of reduced costs while still offering personalized instruction for students. A handful of states (AL, FL, MI and UT) have even go so far as to require online learning as a state high school graduation requirement because they attest that online learning establishes a practice for life-long learning. Although this may sound surprising to some people, initiatives like Digital Learning Now, founded and led by former Governors George Bush and Bob Wise, encourage more states to make online learning a priority so there may be more than four states with online learning graduation requirements in the not-to-distant future.
Understanding the potential
Wherever a single blended learning practice falls on the pedagogical spectrum, Watson asserts that the goal of blended learning is to “combine the best elements of online and face-to-face learning.” Watson goes on to say that the blended learning approach will “emerge as the predominant model of the future — and to become far more common than either [online or traditional face-to-face instruction] alone.” If Watson is correct and blended learning is the future of education then it is important to better understand the potential benefits that I mentioned briefly at the beginning of this blog. First, blended learning models offer possible per-pupil cost savings. Rocketship Education, located in Palo Alto, is perhaps one of the best know examples of how a blended learning model has resulted in cost savings that Rocketship is then able to reinvest into their schools (i.e.: facilities, professional development) and to scale the model. A basic overview of their cost savings demonstrates $515K in annual savings on salaries and classroom costs versus a typical K-5 school model. Rocketship is just one example but it does demonstrate a significant amount of savings within a single year.
The second potential outcome for blending learning is the possibility of further personalizing a student’s learning experience. Technology has the capacity to increase a teachers’ effectiveness by providing students with online modules that will challenge students at the appropriate level – whether that means revisiting concepts that the teacher has already covered but the student didn’t fully grasp or offering more challenging opportunities to a more advanced student. The results of students’ online work can then be shared with the classroom teacher and that will inform the teachers’ instruction because the teacher will know more about the student – such as what gaps persist in their understanding of a concept.
It is important to note here that technology for cost savings or to promote personalization is a means to an end; technology is not a panacea for improving student achievement. Technology, in this case applied through blended learning, has unbelievable potential but it is important to apply technology through a student-centered approach. Technology can support a student but it is not the be-all-end-all.
Resources:
1) Michigan Department of Education, Michigan Merit Curriculum: Graduation Requirements FAQ (2007) www.michigan.gov/documents/mde/faq19_178611_7.pdf
2) Roza, Marguerite, Chris Lozier and Christina Sepe K–12 Job Trends Amidst Stimulus Funds: Early Findings. Accessed on November 24, 2011 from http://www.crpe.org/cs/crpe/view/csr_pubs/332
3) Staker, Heather et al. The Rise of K-12 Blended Learning: Profiles of emerging models (2011) Accessed on November 30, 2001 from http://www.innosightinstitute.org/innosight/wp-content/uploads/2011/05/The-Rise-of-K-12-Blended-Learning.pdf
4) Watson, John Blended Learning: The Convergence of Online and Face-to-Face Education (2008).
--Phil
Social Media – Where Old School Marketing Meets Technology
Politics and Facebook
Politics and Facebook
Facebook has changed the face of politics. The 2008 presidential election is proof of that. In 2008, both the Democratic candidate, Barak Obama, and the Republican candidate, John McCain, utilized Facebook as a means to reach the younger and more internet savvy population. Not only did both parties have pages, they were both wildly popular. “… in the 2008 presidential election, all Democratic and Republican candidates established Facebook and MySpace profiles, and hundreds of thousands of social network sites (SNSs) users added them as ‘‘friends’’ (Fernandes, Giurcanu, Bowers, & Neely, 2010, p. 654). This new development has caused many political campaigners to change their plans and include a social media profile in their campaigning process.
Facebook Politics in the Future
This development had a major impact on the Presidential elections in 2008. “In fact, the use of Facebook for political purposes was so significant that it caused major news organizations like CNN to pose the question, ‘Will the 2008 presidential election be won on Facebook?’” (Woolley, Limperos, & Oliver, 2010, p.632). The use of Facebook can allow for mobilization of supporters, advertising products, and promoting debates. This new brand of campaigning also allows supporters to connect with one another, and even organize events on their own. “…as political candidates design their campaigns, the implementation of SNSs as a campaign strategy should take center stage to reach and communicate with these young voters” (Fernandes et al., 2010, p. 672). With its ease of use and amazingly far reach, Facebook campaigning is definitely something we will see in the future.
Samantha J.
References
Fernandes, J., Giurcanu, M., Bowers, K. W., & Neely, J. C. (2010). The Writing on the Wall: A Content Analysis of College Students' Facebook Groups for the 2008 Presidential Election. Mass Communication &Society, 13(5), 653-675. doi:10.1080/15205436.2010.516865
Woolley, J. K., Limperos, A. M., & Oliver, M. (2010). The 2008 Presidential Election, 2.0: A Content Analysis of User-Generated Political Facebook Groups. Mass Communication & Society, 13(5), 631-652. doi:10.1080/15205436.2010.516864
Ethical Issues Involved With Blogging
Blogging is a communication phenomenon that has really taken off for many companies as way of advertising new products for their business. Many people like to read the reviews about the products and use this information as a tool to whether or not to buy the product. Some big businesses allow their employees to set up blogs either using the corporate website while others might set up outside the companies firewall because of fear of disciplinary or legal actions of a particular topic.
Principles
“What are the principal legal and ethical issues related to anti-employer blogging” (Markel, 2009)? Some companies have incorporated a special confidentiality contract that they have employees sign to protect their interest and are included as a written policy in the employee handbook. Here are a few examples of the most common ideas from the handbook that are used in regards to blogging; act in professional manner, be aware of the law, cite your sources, and talk over any new ideas with your boss.Making Changes
My husband enjoys writing editorials for our local paper, but sometimes he notices some of information has been left out. According to Tallant, (2009) the big question for most bloggers is who owns the information and should someone other than the blogger be able to edit the information? A newspaper in Spokane, Washington has been working on trying to critic the code ethics for their company (Tallant, 2009). The plan was to have everyone’s input regarding the code, which included holding lunch meetings to help gather the information for task force that has been assigned (Tallant, 2009). The staff worked very hard on gathering information to help create a code with appropriate language to cover other issues that may arise (Tallant, 2009). One way to help prevent these kinds of problems are for companies to encourage and allow input from their employees in regards to these blogging policies (Markel, 2009). Blogging is a way for individuals to give opinion about a subject matter. We all have the responsibility to post accurate factual information when blogging. The information we set out to blog about if not accurate could affect others livelihood.Donna S
Reference
Markel, M, (2009), Anti-employer blogging; overview of legal and ethical issues, Journal of Technical Writing and Communication, 39, 2, pp. 123-139.
Tallant, B, (2006), Newspaper works to include blogging in the code ethics, Quill, pp. 27.
Communication In CyberSpace
My definition of cyberspace started from chatting place in late 90s and now is a place I can get any information including movie, music, and picture along with massive data.
While was reading Rheingold’s article, I found the term telepresence. According to wiki, telepresence allows the person who is using the system to act from a distance, which interestingly is used to operate even activities in outer space. Terms like telepresence were big in the early 90s, along with virtual reality, but have not received the same popular attention over the past decade or so.
I started to notice there are many words actually start with cyber. One of the words interest me is CyberPlace. CyberPlace refers to CyberNetworks that include anything ranging from a virtual office, school to electronic versions of actual locations. I subconsciously take part in each one of those listed above-- work conference website, blackboard for school, and Google map. However, actually thinking about it reminds of what might possibly happen if this technology keeps expanding. I am wondering if the computers and CyberNetwork will replace human interaction. In my opinion, these substitutes will actually take over just like in the movies.
--Kwon
Reference
Rheingold, Howard (2000). The virtual community - Chapter Two: Daily Life in Cyberspace. MIT Press. Retrieved from http://www.rheingold.com/vc/book/2.html
Cultivating a Sense of Community in Virtual Environments
We know that the traditional classroom gives students the ability to practice working out the mathematics, and various math packages can display plots, some even in 3-D. But only Virtual Reality (VR) can let the student walk around on that math surface, climbing the peaks and valleys to see how the variables inter-relate. (p.106) So, we will explore whether these virtual environments can create the same level of community typically cultivated in a classroom as well as challenges that should be considered when educating in virtual environments.
The advance of technology has created an expectation that acquiring information must be fast paced, highly accessible and easy to find. Formal learning is no exception. As learning professional on a quest to find solutions to blasé webinars and online tutorials I have considered VR the ticket to overcoming boredom and increasing knowledge transfer. Studies support my thoughts that this highly interactive, multi-sensory option increases engagement and test scores as well. However, I have learned that while cultivating a sense of community in virtual environments can foster learner engagement (p. 104) it doesn’t come without challenges. Virtual Learning includes gathering online at a specific site simulating life like locations and environments. Each participant has the ability to creating an avatar (graphic representations of the user) that will then interact in the online environment much like they would in a real life setting.
Before dropping everything to sink my resources into developing an avatar based VR class environment I considered the challenges Stewart et al outlined in this article that are likely to arise. The greatest, time followed by software and programming issues, implementation glitches, conveying objectives and ongoing student support were all challenges that seemed a bit daunting. I was assured that adopting the guidelines below when embarking on VR development will result in a course that is well thought out, well developed and most of all well received by students.
1. Consider starting your project with needs based analysis that encompasses the software, technical capabilities and challenges of using VR as well as who your audience is the learning environment and the outcomes of learning expected.
2. Adopt a project management process to increase communication between all parties participating in the development of the course.
3. Ensure the adequate number of staff is secured for the project duration. Look for individuals who are up for a challenge that can make the time to work on a special project like this for it’s lifespan.
4. Create student resources to help you effectively test the VR modules such as training materials and available technical support.
5. Assessment and measurement of the project throughout the design and development phase helps eliminate problems that might creep up along the way. Think about creating a short electronic survey as participants log out to capture feedback.
With the flashy appeal and game like technology and interactivity it is hard to resist from taking the plunge into VR design without much thought. Instead, investment the time to create a design plan that includes collecting, creating and sustaining virtual communities of learners who in the end experience both social and personal gains for participating in your VR classrooms. In the end, everyone wins!
Reference: Stewart, B., Hutchins, H. M., Ezell, S., De Martino, D., & Bobba, A. (2010). Mitigating challenges of using virtual reality in online courses: a case study. Innovations in Education & Teaching International, 47(1), 103-113.
Angela A.
Online Learner
Online learning became the most quality education throughout the nation. As the world changed in time, technology became a major part of everyday life. The new technology gave business a leading edge that it also created an online education opportunity for schools to teach their education through long distance. The online learning got the same quality of the traditional learning.
First of all, the population chose to complete their degree in an online learning environment. For example, many adults chose online education for their convenient time, so they could have time for their family and work. The online education became so popular when many people recognized what online education was about. It wasn’t a joke that it actually worked in the real world. According to the survey of the national Post-secondary Education Cooperative reported, the online learning was increased dramatically by 61% between 2006 and 2007 (Huang. E.Y, Lin S.W, Huang T.K, 2001). Consequently, the online degree was a good choice for those busy adults, and it really worked in the real world.
Secondly, the online learning provided the quality online education software as same quality as the traditional learning had. For example, when we lived in the new advance technology world, technology became secondary nature. Schools provided their E-learning environment software, so everyone could gather there to participate “Online participation includes spend reading online materials and their use of online functions.” (Huang E.Y, Lin S.W, Huang T.K, 2011).
The instructors usually got their software that they could be able to track their students trail such as Microsoft words, Excel, Access, Outlook, and etc. Also, there were schools’ software that it allowed instructors to track on their student; therefore, when their students participated more, they would understand more about their class objective. Consequently, the online learning got the same tradition learning quality.
Third, students and instructors developed a close relationship that they were their students’ motivation tools. For example, when online learners were unfamiliar with these new online tools, the instructors would guide them with the new E-learning environments. Also, instructors helped them to develop their strategies how to overcome their learning throughout online “instructors can help students to understand and master e-learning strategies during class time.” (Huang E.Y, Lin S. W, Huang T.K 2011). Consequently, the online learning could also develop a good relationship between students and instructors. Especially, when it was long distance, students needed extra help for their homework.
In conclusion, the online education became the popular icon that the majority of the population used it to complete their degrees for their convenient. The online education quality was similar to traditional education. It increased more than 61 percent of online students to complete their degree. Next, the student used the basic software tools such as Microsoft Office Suites, and schools got their own software to communicate and track their student progress. Lastly, students and instructors develop a good relationship that they assisted their students to overcome their challenges’ courses. At the end, they got the most quality education ever, so it was similar to the traditional education.
Vincent Tu
Reference:
Huang E.Y, Lin S. W, Huang T.K (2011). What type of learning style leads to online participation in the mixed-mode e-learning environment? A study of software usage instruction. Establish: 10-11-2011.
Internet usage in Congo
My sister in law sent me her family picture on July through my e-mail. She asked me for my picture too. A few days later, I sent her a picture of my family too. We kept in touch over the phone. Recently she asked me to send her some pictures of my kids. I had already sent some of them last July she did not check her email yet. I bought a laptop for my brother; I thought it would help us communicate regularly instead of buying phone cards that only allow 18 minutes. After sending to him many messages without answer, I called him to figure out why he is not responding. He told me that he hadn’t responded for a variety of reasons. Half the time, their electricity was off. He also mentioned that he couldn’t pay for internet service. I can imagine his laptop is sitting there like a decoration, never in use in the house.” Having a computer, internet service, and electricity at the same time is challenging”.
Thus, the development of the internet usage is not the same around the world. In some parts of the world internet usage is growing very fast and creating a new culture while in another part of the world, the internet increase is very slow. Will that growth be the same around the world one day? Yes there is hope for everyone who is still alive.
References
Articles: Democratic Republic of Congo telecommunications market over view report
www.internetworldstats.com
Clarisse Kizinga