In this fictional scenario, Trent Batson examines a typical department's struggle to redesign its Web presence, posing questions like: "We can't help but notice that social sites like YouTube and Facebook are awfully easy to use -- why can't our academic site be more like them?"
Risk assessment doesn't cut much weight in the world of public opinion. In the aftermath of highly publicized violent incidents like those at Virginia Tech and Northern Illinois University, higher education has come under increased scrutiny. In particular, students, their parents, and the general public want to know about the emergency notification procedures that campuses have deployed.
E-mail is the ordinal form of this age. But in the collective conscience of higher education, the reference form when talking about writing is still the essay. Should e-mail writing instruction replace the teaching of essay writing?
The term "Nomadic" has been used to describe current college students' culture of wireless and mobile connectedness in the sense that they are not "rooted" but incredibility flexible and fluid when it comes to their social connections and their virtual life culture. This refers not only to their uses of social networking tools but also to the reality that they are connected wirelessly in any situation and for any reason. They are essentially nomads when it comes to their life "space."
Trent Batson urges social Web site developers to offer options for managing use for academic purposes.
The question about ePortfolios is no longer "What is it?" Now, it's "How can we do it?" A Web-based ePortfolio provides the answer.
The Department of Homeland Security has issued the regulations that will govern the Real ID Act that sets standards for drivers' licenses across the country. How will it impact you and your campus?
Campuses are starting to outsource e-mail services to popular Web 2.0 mail services such as Hotmail, gMail, Yahoo Mail, or others. Will various office functions also be outsourced? How far will outsourcing to the Web go?
Since you've encrypted the data on your laptop, it's safe even if your laptop is stolen, right? Wrong. Researchers at Princeton have demonstrated ways to hack your encrypted data using your own DRAMs against you.
In Web 2.0, the proliferation of Web services that create spaces and sites for learning continues to grow and add value.