Viewpoint


Should Educators Be Concerned About Web 3.0?

Even Web 2.0 is a confusing mass of capabilities, yet already people are talking about Web 3.0. Where are we in all of this? What's important for educators to know?

This is the President's Office Calling....

Caller-ID spoofing is an easy hack that endangers institutional data through "social engineering." Are your faculty and staff aware of this threat?

The Portfolio Enigma in a Time of Ephemera

An old adage that evolved from the establishment of static print media is, "If it's in print, it must be true." And we collected literally tons of the stuff. The digital realm has turned that thinking on its ear, and ePortfolios may help make sense out of our new process of collecting "tons" of bits--not static, but shifting bits.

Ownership of Learning: The Siren Song of IT

The word "ownership," when linked to technology, usually conjures up images of lawyers and of the most feared and revered 2 letters in higher education: IP. But this little story is not about intellectual property per se and is most definitely not about lawyers. It's about students' perception of ownership in higher education's geography.

USB Device Nightmare Becomes Reality

One campus found that one in six USB devices was loaded with malware that could infect computers. What should your campus be doing?



Communities of Learners Redefined: Customized Networks That Impact Learning

Those educators among us who are familiar with constructivist and constructionist models of learning understand the impact that social learning theory has had on the field. Likewise those of us who are familiar with the application of new technology in learning understand that customization (or "the user") is what drives every structure, every program, and every software function.

6 Ways Not To Become Rote Using Instructional Technology

There are, in my experience, six strategies to consider with any use of technology that will guard against rote use of technology and facilitate critical analysis of teaching and learning effectiveness. In this article, I'll share with you the checklist I work with and encourage others to work with in learning about and using new technology.

Smart Phone Security: New Challenges for Road Warriors

Hopefully by now we have educated our faculty and staff to the dangers of traveling with a laptop containing sensitive information--say Social Security numbers or a faculty member's latest patentable research. But have we been educating them about the security risks of smart phones?

Microblogging and Relevancy

Microblogging redefines synchronous communication in learning. While conventional distance education has explored the uses of chat tools in this regard for several years and particularly the benefits of synchronous communication over asynchronous communication in support of specific learning goals, this level of immediacy is faster-paced and more direct.

Designing a Working Space for Chat

In the first installment this two-part series, we looked at chat as an instructional tool in general terms. Now we take a look at some of the major concepts in using chat effectively in the process of moving the thinking process forward: building ideas, constructing media, and establishing which elements are critical to making the environment dynamic and relevant to the student.