In the first installment this two-part series, we looked at chat as an instructional tool in general terms. Now we take a look at some of the major concepts in using chat effectively in the process of moving the thinking process forward: building ideas, constructing media, and establishing which elements are critical to making the environment dynamic and relevant to the student.
The idea of using chat as a communication tool with students is widely accepted in education. Using the same tool to progress critical thinking is not often discussed. That is, the question might be asked, "Why use an online tool when I can discuss with my students face to face?"
The intrusion last month into Vice Presidential candidate Sarah Palin's e-mail highlighted the frailty of some types of data security measures. What are the lessons for the rest of us?
Electronic procurement can impact much more than simple transactions and individual business functions. John Mayes examines how institutions can gain competitive edge with an effective procurement strategy.
Blogging can be an effective tool for learning, but its benefits shouldn't be taken for granted. It takes careful planning and skillful management to make it work in an educational setting. Here are five of the most common mistakes for instructors to avoid when incorporating blogs into instruction.
8 best practices for providing the help online faculty need-- when they need it.
One month after our previous "Cheapskate's Guide" to essential security tools, "free" is still alive and well. Security experts have weighed in with additional open source and free software packages they find particularly useful, which we now share with you.
Free is an attractive price. Read which packages were deemed "most useful" by a handful of experts.
For more than twenty years, we educational technologists have talked about "integrating information technology into higher education." The implication was that education would stay the same and information technology would benignly slip in and cause no ruckus at all. This rhetoric no longer applies, if it ever did, and does a disservice to us as we work through the intricacies of this age.
The hackneyed advice from IT consultants and columnists is that security is all about risk management. But do our traditional measurements of risk reflect reality?