Helping Hands are Teachers' Workshop

I don't have to do it all myself! Technology enables me to get help with my teaching from professorial colleagues, former students, college alumni, students at other universities, foreign journalists, parents and spouses, community leaders, and people with "real" jobs off campus. Call it "collaborative teaching" or "the use of adjunct instructors" or "getting others to do my job." It's working for me and my students!
There are many ways to gain from extra minds and hands. To enrich content, a professorial colleague might speak to her specialty or a library consultant might be the class’s bibliographic consultant. To build interest through controversy, students could be put in touch with an expert who disagrees with the conventional wisdom.
Or, you might prefer to reinforce your credibility by involving a second confirming opinion from a highly credentialed expert. For example, students often invest greater confidence in opinions coming from practitioners who are "meeting a payroll in the real world." In any case, the contrasting pace provided by an occasional guest lecturer adds interest and variety to a course.
It seems there is never enough time. Your main motive for using adjuncts may be to lessen your own time commitment or to save student time by making study more efficient and convenient. A former student or alum may be able to give caring time and attention to a small group of students, the type of attention that you cannot give to every member of a large class. An adjunct may bring to a relationship a skill set—for example, the use of metaphors from a hobby he has in common with a student, or experience working with learning disabled students—that allow the instruction to be customized to the interests and capacities of an individual student.
Your primary motive for involving adjuncts may be to build networks for contacts that will help graduates get first jobs and advance in their careers. Or, you may decide that the best way to publicize your activities is to get opinion leaders involved, to move your course toward celebrity status. Closely related could be the desire to cultivate opinion leaders who might give special access to your students or contribute dollars and time to your program.
A less noble but often essential need is to ask adjuncts to cover a class that would otherwise have to be cancelled because of a conflict in your own schedule.
Having determined why adjuncts are to be involved, the next step is to consider whom to involve. The key here will be to match your objectives with availability, to think about who you know who would be willing to help out. Even without paying them, I have found professorial colleagues, former students, and alums surprisingly willing.
Deciding how to involve adjuncts is the next step. My business school colleague, Gordon McCray, has shifted his basic lectures to cyberspace so that class time may be freed for guest lecturers. My English department colleague, Olga Valbuena, schedules fortnightly two-way videoconferences between her class and the scholars at the Shakespearean Globe Theatre in London. Another English department colleague, Anne Boyle, has her students exchange comments on their freshman essays with a comparable class at Acadia University in Canada.
Clearly, involving many hands requires time to organize and time to nurture. The returns, in both time saved and especially enhanced learning, can be immense. Let me know at [email protected] how you are using adjuncts!

About the Author

David Brown ([email protected]) is vice president and dean of the International Center for Computer Enhanced Learning at Wake Forest University.

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • magnifying glass revealing the letters AI

    New Tool Tracks Unauthorized AI Usage Across Organizations

    DevOps platform provider JFrog is taking aim at a growing challenge for enterprises: users deploying AI tools without IT approval.