Just another OpenETC Wordpress site

Category: edcl (Page 1 of 2)

EDCI 335 BLOG #4

In this post, I’ll share how I plan to use a YouTube video titled “What Is Cyber Security | How It Works? | Cyber Security In 7 Minutes |” from Simplilearn in my cyber security course. I’ll address several key aspects to demonstrate how this video can effectively engage students and enhance their learning.

1. What kind of interaction would the video require from your students? Does it force them to respond in some way (inherent)?

The video requires students to actively listen and understand key concepts in cyber security, such as different types of cyber attacks and security practices. This initial interaction sets the stage for deeper engagement.

2. In what way are they likely to respond to the video on their own, e.g., make notes, do an activity, or think about the topic (learner-generated)?

Students might take notes, highlight important points, or pause and reflect on the concepts presented. This active note-taking and reflection helps them internalize the material.

3. What activity could you suggest that they do after they have watched the video (designed)? What type of knowledge or skill would that activity help develop? What medium or technology would students use to do the activity?

After watching the video, I would ask students to participate in a group discussion or forum where they can identify and analyze a recent cyber attack from the news using the concepts learned from the video. This activity promotes critical thinking and application of theoretical knowledge. An online discussion board or a collaborative platform like Google Docs would be ideal for this activity.

4. How would students get feedback on the activity that you set? What medium or technology would they and/or you use for getting and giving feedback on their activity?

Students would receive feedback through peer reviews and instructor comments on the discussion board or collaborative document. This approach allows for diverse perspectives and constructive criticism. The chosen technology for feedback would support detailed annotations and threaded comments.

5. How much work for you would that activity cause? Would the work be both manageable and worthwhile? Could the activity be scaled for larger numbers of students?

The workload for managing this activity is moderate but valuable, as it provides insights into students’ understanding. For larger classes, forming smaller discussion groups or assigning peer reviewers can help maintain a manageable workload while ensuring comprehensive feedback for everyone.

6. How could the video have been designed to generate more or better activity from viewers or students?

The video could be more engaging by incorporating interactive elements such as embedded quizzes or prompts that pause the video and ask students to reflect on key points before proceeding. This would encourage active participation and reinforce learning.

7. How will you address any potential barriers for your learners in the use of this video to ensure an inclusive design?

To ensure inclusivity, I would provide transcripts and closed captions for the video, accommodating students with hearing impairments. Additionally, offering supplementary text materials and ensuring the video content is accessible in multiple languages would support non-native English speakers.

EDCI 335 BLOG #3

Ensuring Inclusivity in Interactive Learning Resources

Meeting the Needs of All Learners

To ensure that the needs of all learners are met, my interactive learning resource will integrate Universal Design for Learning (UDL) principles, focusing on multiple means of representation, action, expression, and engagement.

There’s a great video on YouTube that covers a lot of this.

  1. Multiple Means of Representation:
    • Textual Information: Clear, concise text explanations for foundational concepts.
    • Visual Aids: Diagrams, charts, and videos to illustrate complex ideas visually.
    • Audio Support: Audio recordings of lessons and explanations for auditory learners.
    • Interactive Simulations: Hands-on activities and simulations to allow learners to experiment with and apply concepts.
  2. Multiple Means of Action and Expression:
    • Varied Assessment Methods: Options for learners to choose how they demonstrate their understanding, such as through written essays, video presentations, or practical projects.
    • Interactive Projects: Group work and individual projects that allow learners to engage deeply with the material in a way that suits their learning style.
  3. Multiple Means of Engagement:
    • Gamification: Incorporating game-like elements to make learning more engaging and fun.
    • Real-World Applications: Tasks that connect learning to real-world scenarios to enhance relevance and motivation.
    • Collaborative Learning: Online discussion forums and group activities to foster peer interaction and support.

By incorporating these elements, the learning resource will cater to different learning styles and needs, ensuring that every learner has an opportunity to succeed.

Adapting to Unexpected Events

In the event of unexpected disruptions, such as a pandemic requiring a shift to remote learning, my planned learning activities can be adapted to maintain continuity and effectiveness.

  1. Online Accessibility:
    • Platform: Use a robust, user-friendly online learning platform that supports all types of content (text, video, audio, and interactive simulations).
    • Accessibility Features: Ensure the platform complies with accessibility standards (e.g., WCAG) to support learners with disabilities.
  2. Flexible Content Delivery:
    • Recorded Sessions: Record live sessions and make them available for learners to access at any time, ensuring flexibility for those with varying schedules or time zones.
    • Transcriptions: Provide transcriptions of video and audio content for learners who prefer or require text-based materials.
  3. Support and Training:
    • Technical Training: Offer initial training sessions on how to use the online platform and access resources. Provide ongoing technical support to address any issues learners might face.
    • Digital Literacy: Include tutorials on digital literacy and online learning strategies to help learners adjust to the remote learning environment.
  4. Engagement and Interaction:
    • Virtual Office Hours: Schedule regular virtual office hours for learners to ask questions and receive support.
    • Online Discussions: Create discussion forums and virtual study groups to facilitate peer interaction and collaboration.
  5. Assessment Adaptations:
    • Flexible Submission Options: Allow for various formats of assignment submissions (e.g., digital presentations, written reports, recorded videos).
    • Continuous Feedback: Provide timely and constructive feedback through the online platform to keep learners engaged and informed about their progress.

By implementing these adaptations, the learning experience can remain dynamic, supportive, and effective, even in the face of unforeseen challenges. This approach ensures that learners can continue to achieve their educational goals regardless of the learning environment.

Learning Blueprint Assignment

Part 1: Introduction

Description

In today’s information society, network security can be seen as the practice of protecting computers, servers, mobile devices, electronic systems, networks, and data away from malicious attacks. According to our research, network security addresses several key components and processes necessary to maintain the security and integrity of information systems(Pfleeger, C. P., & Pfleeger, S. L. 2012).There are few steps in cyber security: Firstly, threat identification, which focusing on identifying potential sources of cyber threats(Stallings, W., & Brown, L. 2018). The second is vulnerability management, which emphasizes the identification and mitigation of vulnerabilities within the system to prevent exploitation by malicious actors. At the same time, incident response is a more critical step including the steps to respond to and recover from a network incident to ensure minimal impact and a quick return to normal operations(NIST. 2018). In addition, user’s education and training are fundamental and necessary to cybersecurity, as they ensure that all users are aware of best practices, and they can serve as the first line of defense against cyber threats. Therefore, there’s significant reason to believe that an effective cybersecurity program is multi-layered, and we combine these elements to create a strong defense against a variety of potential attacks.

Misconceptions

A common misconception many people have about cybersecurity is that its just about preventing hackers. In fact, cybersecurity encompasses a wide range of activities: including preventing malware, phishing attacks, social engineering, and ensuring data integrity privacy. Not only protecting against hackers is an important aspect, but also just a part of broader security measures aimed at protecting systems and data from various network threats.

Another common misconception is that most people thinks that cybersecurity is just an IT issue. However, effective cybersecurity requires a holistic approach and involves everyone in the organization and related from top management to every employee. Therefore, cyber security is not just the responsibility of the IT department; Instead, due to the reason that human error is often a weak link in security defenses, so everyone should understand cyber security and contribute to maintaining a secure environment.

Rationale

As cyber threats become increasingly prevalent, it is imperative that everyone has a basic understanding of cybersecurity, regardless of professional background. Understanding these potential threats and protection strategies is critical to reducing cybersecurity risks, and ensuring the security of the digital environment.

Moreover, understanding cybersecurity can not only help individuals protect their personal information, but also contribute a safer environment in their workplace. From individual’s side, understanding cybersecurity principles can help protect sensitive data from malicious attacks. Additionally, being proficient in cybersecurity can enhance one’s ability to reinforce security practices within their organization, protect assets and foster a culture of security awareness.

Part 2: Big Ideas and Learning Outcomes

Big Ideas

Understanding of Cyber Threats: Learners should grasp various cyber threats. Including malware, ransomware, phishing, and DDoS attacks; and learn their impacts on systems and data.

Protecting Against to Cyber Threats: Learners should explore basic cybersecurity measures and tools. Such as antivirus software, firewalls, and social engineering awareness.

Learning Outcomes

Define the Key Concepts: Learners will understand the main idea of cybersecurity and able to describe different types of cyber threats.

Implement Protective Measures: Learners will identify vulnerabilities and apply basic cybersecurity measures.  Such as managing anti-virus programs and firewalls.

Individual Role in Cybersecurity: Learners should understand the importance of their actions in maintaining cybersecurity and should learn how to contribute to a secure environment.

Part 3: Activities and Assessment

Activities

Learners will engage in few tasks that designed to enhance their understanding of cybersecurity. (As shown in following)

  • Participant in video lectures that covering the basics of cybersecurity knowledge.
  • Participate in some real-world case study, and then start in a hands-on simulation using a virtual environment. 
  • Learner could join in an online discussion that they can communicate with other leaners and share their experiences with the course material.

Assessment Plan

We designed a group work project,

3-5 members in a group and choose one of the following formats for your project:

  • White board animation (5-10 minutes)
  • Research essay
  • Poster presentation

Project Components should pick from the following topics:

  1. Cybersecurity’s Overview:
  2. Provide a brief history and definition of cybersecurity (may include the timeline of the development of cybersecurity).
  • Types of Cyber Threats:
  • Describe various cyber threats (e.g., malware, phishing, ransomware, DDoS attacks).
  • You also need to use real-world examples and their impacts for this topic.
  • Case study:
  • Choose a notable cyber attack (e.g., Target data breach).
  • Analyze the attack, its impact, and its preventative measures.
  • Protective Measures:
  • Briefly explain in and give examples of basic network security measures (for example, anti-virus software, configuring firewalls)

Submission Requirements:

Your project must INCLUDE at least 4 references, including at least one scholarly article and a mix of books, credible websites, and professional resources.

Assessment Criteria:

  • Content Accuracy (40%)
  • Creativity and Engagement (35%)
  • Research Quality (15%)
  • Reflection (10%)

Note:

This assignment aims to enhance learners’ collaborative skills and cybersecurity knowledge. Choose a format that can best present your group’s strengths and creativity.

Part 4: Resources

  • scholarly articles (accessible through the UVic library)
  • Textbook:   Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Pearson.
  • ‘grey literature’ (professional resources, blogs, videos, etc)
  • Cyber Security Tools (2024 Guide) | BrainStation®

 (https://brainstation.io/career-guides/what-tools-do-cybersecurity-analysts-use)

  • Daniel Miessler

(https://danielmiessler.com/)

  • Graham Cluley

(https://grahamcluley.com/)

Note:

Here is 13 Best Cybersecurity Software that may could used

  1. SiteLock
  2. SolarWinds Security Event Manager
  3. Heimdal Security
  4. Wireshark
  5. Nagios
  6. Nessus Professional
  7. Acunetix
  8. Snort
  9. Teramind
  10. AxCrypt
  11. Bitdefender Total Security
  12. TotalAV Cyber Security
  13. Norton LifeLock

Part 5: Project Plan

Team Roles and Responsibilities

Bruce Mao: Oversees project management, coordinates team activities, and ensures that all members perform their roles efficiently.

Rui Ning: Leads the research efforts, providing expertise on the primary topic, and ensures the accuracy and depth of information.

Long Le: Generates innovative ideas, refines strategies, and collaborates on iterating the project plan.

Conclusion

In conclusion, in today’s information world, understanding cybersecurity is a critical issue. By exploring the nature and scope of cyber threats, implementing basic protection measures, learners can effectively protect personal and organizational personal data.

This course aims to provide learners with practical knowledge and skills in cybersecurity through course lectures, case studies, hands-on simulations and collaborative projects. By engaging in real-world cases and utilizing a variety of resources, learners will be better equipped to respond to cyber threats, thereby contributing to the digital environment.

Reference:

Pfleeger, C. P., & Pfleeger, S. L. (2012). Analyzing computer security: A

threat/vulnerability/countermeasure approach (1st ed.). Prentice Hall.

Stallings, W., & Brown, L. (2018). Computer security: Principles and practice. Pearson.

Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework.(2018). In Secure IT Systems (Vol. 11252). Springer International Publishing AG.

EDCI 335 Blog #2

Experiential Learning and Open Pedagogies in Learning Design

As we delve into the theoretical foundations for teaching and learning, it’s crucial to consider how these theories apply to designing effective learning environments. For this post, I will focus on experiential learning and open pedagogies, exploring their characteristics and discussing how they align with my chosen topic for developing a learning resource.

Experiential Learning

Experiential learning is a learner-centered approach that emphasizes learning through experience and reflection.

Characteristics of Experiential Learning:

  1. Active Participation: Learners engage in hands-on activities that require active involvement.
  2. Reflection: Learners reflect on their experiences to gain insights and understanding.
  3. Real-World Context: Learning activities are often set in real-world contexts, making them relevant and meaningful.
  4. Iterative Process: The learning process is cyclical, involving continuous experimentation, observation, and reflection.

Application to My Topic: In my learning resource, I plan to incorporate experiential learning by designing activities that allow learners to engage directly with the content. For instance, if the topic is related to environmental science, learners might participate in field studies, collecting data from local ecosystems and reflecting on their findings. This approach not only makes the learning process engaging but also helps learners develop critical thinking and problem-solving skills.

Open Pedagogies

Open pedagogies leverage the principles of open education to foster a collaborative and flexible learning environment. This approach encourages sharing, collaboration, and the use of open educational resources (OER).

Characteristics of Open Pedagogies:

  1. Collaboration: Learners and instructors collaborate on creating and sharing knowledge.
  2. Accessibility: Learning materials are freely accessible to anyone, promoting inclusivity.
  3. Adaptability: Resources and activities can be adapted to fit various learning contexts and needs.
  4. Empowerment: Learners are empowered to take control of their learning process, often contributing to the creation of learning materials.

Application to My Topic: Incorporating open pedagogies into my learning resource involves using and creating OER that learners can access and adapt. For example, I might design an open textbook that learners can edit and expand upon, or a collaborative project where learners create a shared digital resource on a given topic. This approach not only democratizes access to education but also fosters a sense of ownership and empowerment among learners.

Comparison and Alignment

Experiential learning aligns well with topics that benefit from hands-on, practical experiences. It is particularly effective in fields that require practical application, such as the sciences, engineering, and arts. Open pedagogies, on the other hand, are versatile and can be applied to various subjects, promoting inclusivity and collaboration.

When comparing these approaches to traditional methods like direct instruction or inquiry-based learning, experiential learning and open pedagogies stand out for their emphasis on active engagement and learner empowerment. Traditional methods often rely on passive learning and standardized assessments, which may not fully capture the depth of understanding that experiential and open approaches can foster.

In my learning pod, we will discuss the merits of each approach researched by our group members. Given the collaborative nature of both experiential learning and open pedagogies, I believe these methods will align well with our topic and enhance the learning experience by making it more interactive, inclusive, and learner-centered.

I came across an insightful blog post by my friend Kale on experiential learning. Kale eloquently discusses how experiential learning engages students through active participation and real-world applications. His perspective on how this approach enhances motivation by making learning more relevant and hands-on is particularly inspiring. You can read Kale’s full post https://kale.opened.ca/blog-post-2/ .


By focusing on experiential learning and open pedagogies, we can create a dynamic and engaging learning environment that not only conveys knowledge but also fosters critical thinking, collaboration, and a deep sense of ownership in the learning process.

EDCI 335 Blog #1

Assessment Strategies and Learning Theories: Analysis and Comparison

In this week’s readings, we explored various assessment strategies and how they align with different learning theories. This post will analyze the assessment strategies used in this course, those not used, their relation to learning theories, and compare them with other courses I have taken.

Assessment Strategies Used in This Course

  1. Formative Assessment: This course frequently employs formative assessments such as class discussions, draft feedback on assignments, and peer assessments in group projects. These strategies aim to help students continually improve during the learning process by providing timely feedback. This approach aligns closely with constructivist learning theory, which emphasizes students constructing their knowledge through practice and feedback.
  2. Summative Assessment: Project reports are examples of summative assessments in this course. These methods aim to comprehensively evaluate students’ learning outcomes over the entire course, ensuring they have grasped key concepts and skills. This strategy relates to behaviorist learning theory, which focuses on evaluating final outcomes and performance, using reinforcement and feedback to influence learning behavior.
  3. Self-Assessment and Reflection: The course encourages students to engage in self-assessment and reflection through blog posts and learning journals. This strategy is associated with cognitivist learning theory as it encourages students to reflect on their thought processes and learning strategies, enhancing metacognitive abilities.

Assessment Strategies Not Used in This Course

  1. Adaptive Assessment: Although the course provides personalized feedback, it does not employ highly adaptive assessment tools like Computer Adaptive Testing (CAT), which dynamically adjust difficulty based on student performance.
  2. Gamified Assessment: The course does not use gamified assessment methods, such as points, badges, or leaderboards, which can increase student motivation and engagement. This strategy is linked to motivation theory, particularly Self-Determination Theory (SDT).

Connection to Learning Theories

  • Behaviorism: As mentioned, summative assessments align with behaviorist learning theory, reinforcing correct behavior and knowledge through final evaluations.
  • Cognitivism: Self-assessment and reflection activities help students understand and optimize their learning processes, aligning with cognitivist learning theory.
  • Constructivism: Formative assessments, such as peer feedback and group projects, closely relate to constructivist learning theory, emphasizing knowledge construction through interaction and practical application.

Comparison with Other Courses

In other courses I’ve taken, the use of assessment strategies varies. For instance, in a computer science course, assessments heavily relied on programming assignments and automated testing tools. This method emphasizes immediate feedback and multiple attempts, similar to the formative assessments in this course but lacking reflective and self-assessment components.

In contrast, a social science course relied more on essays and final exams, similar to the summative assessments in this course. However, it lacked sufficient formative assessment opportunities, making it harder for students to receive timely feedback and suggestions for improvement.

Conclusion

Analyzing the assessment strategies in this course shows that it incorporates multiple learning theories to comprehensively support student learning. Compared to other courses I have taken, this course excels in formative assessment and self-reflection, providing students with more opportunities for growth and improvement. This integrated assessment approach not only helps students master content but also develops critical thinking and self-regulation skills.

Final Group Project

Team Members:

Benjamin Hu V00932011

Gavin (Changheng) Ge V00972488

Tim(Lihua) Yang V00900718

Ruining Feng V00993180

Rodney(Yutong) Zhu V00963557

  1. Describe the key characteristics of any discussed social media platforms. (Benjamin)

There are several social media platforms we have discussed throughout the courses, some of them we think are useful and functional that we like to share and discuss. One is Zoom and the other one is Twitter. Zoom is a very useful PLN social media platform that most of us are familiar with during the Covid-19 pandemic. The Covid-19 pandemic temporarily changed our lifestyle. For example, instructors tend to give lectures through Zoom meetings, they think it is an alternative way to interact with their students. Since Zoom provides remote video chatting, students and instructors are able to see each other face to face so that they can get the realistic experience as if they were studying at school. Zoom also has the function of recording, so instructors can pre-record the lecture material a day before or give recordings to students who missed their lectures. The convenient learning style provides both students and instructors convenience, efficiency, and quality.

In addition, Twitter is one of the most frequently used social media platforms. Compared to Zoom, Twitter is relatively like social media because people can comment and share their thoughts and daily activities on their phones. Twitter is a social media platform where users can share their thoughts on the internet. Politicians and public figures prefer to speak their voices on Twitter, and the instant news will catch their follower’s attention. Twitter also has functions like Like, Quote tweet, and Retweet. The “Like” function gives users an expression pathway to show their interest and passion when they feel the contents are comfortable and interesting. “Quote tweet” and “Retweet” share a similar function that users are able to reply to or forward the content they feel interesting, or they mutually agree with.

  1. What features & characteristics of existing media technologies make them effective for personal learning? (Benjamin)

 Like the characteristic we mention above, the social media platforms examples as Zoom and Twitter share some similar features. They both provide convenient content delivery, so people can easily get access to their profile and build their PLN. Zoom provides the visual chatting function where people can remotely meet through their electronic devices, and instructors are able to teach their subjects via recording or live streaming. Twitter is a social media where people can share and comment on their real thoughts. There are multiple features, and users can use them to build their PLN and deliver the desired learning network.

  1. How does technology allow you to enhance/develop your digital identity/reputation? (Tim)

We can know what kind of content we should promote in public to attract more audience and popularity on social media by using the right technology to analyze the big data behind social media and knowing your audience group. Another technology is artificial intelligence (AI), which analyses popular topics and audience preferences. 

  1. What are social considerations that should be accounted for? (Tim)

When posting on the internet, there are numerous social considerations to be made. Gender bias, cultural background, and racism are just a few examples. Because people think and react differently, public social media posts about social considerations can go viral around the world. Several sensitive topics relating to social consideration became trending topics on every social media and news platform at the start of the year. The most well-known is Black Lives Matter, in which a white man kills a black person during an arrest while the victim screams, “I can’t breathe!” As a result, gender and cultural equity should be considered for both personal learning networks and social media.

  1. What are the ways the technology tracks and uses your data – how can this be used to benefit a PLN? (Yutong)

For instance, Twitter, a microblogging and social networking service, excels at tracking, analyzing, and making good use of its users’ data. Visitors to websites with Twitter content or products integrated into them may have their IP addresses, browser types, operating systems, and cookie information sent to Twitter. Twitter uses this data to enhance its services, such as ad targeting and recommendation algorithms. Still, Twitter is one of the best tools for building one’s PLN.  It is incredibly beneficial for instructors and academics (Carpenter & Morrison, 2018). As described earlier, this social networking service permits users to send and receive messages. The comments are referred to as “tweets,” and when a person sends a tweet, all of his/her followers see it.

  1. Provide examples of individuals who have used a PLN to become leaders in a field of interest, and discuss their presence on the platform? (Gavin)

In a generation where networking has been transferred onto online media platforms providing convenience in communication and self-promotion, many leaders in society have successfully utilized the benefits of a PLN to elevate their presence on media platforms and in society. An example could reference back several years when talk show host Conan O’Brien further expanded his influence past the generic platforms that most individuals in the entertainment industry use such as Twitter, Instagram, and Youtube. Instead, he aimed to reach audiences on a more professional spectrum on the Linkedin platform which could further promote him to a wider group of individuals that might primarily focus on the professional aspects of his industry. With the collaboration of all platforms of his, he is able to successfully market himself to audiences in various aspects whether it be social or professional circumstances.

  1. How do [notable individuals] use social media platforms to build their reputation/presence? (Gavin)

While most individuals understand how they personalize social media portfolios to their advantage on various spectrums, there are still distinct differences between individuals of the general population and notable individuals in terms of media reputation and presence. The most significant contrast between the two is undoubtedly the sizable effects of their social media presence, as leaders and notable individuals have a larger reach in terms of audience size and public impact. Simple contributions and interactions made by these individuals can oftentimes create immediate results prompting positive or negative discussions; most of which are strategically worded and framed to aggrandize that individual’s reputation in their respective industry and in the eyes of the public. As social media platforms have seen exponential growth in terms of their impact on one’s reputation and overall influence, how these leaders and individuals strategically arrange their social media portfolios can either propel them towards success or negatively impact their career and image. 

  1. How do use social media platforms to build their reputation/presence? (Ruining)

A reputation is an opinion, idea, or concept that people form about an institution, brand, company, or person based on their experience. It is important to realize that reputation is not under the absolute control of the subject or organization. In addition to the image projected by the brand or the individual themselves, reputation also includes news, comments, and opinions expressed by third parties on social networks, forums, blogs, review portals, and online media. You can maintain a strong reputation by having well-positioned content visible, being transparent, having a solid and loyal customer base, and listening carefully to what people are saying about you or your company, brand, and products. Therefore, it is very important to manage and monitor your internet space. Reputation management can be defined as the conscious control and influence over the reputation of companies, organizations, and individuals. Therefore, reputation management includes planning, controlling, establishing, monitoring, and ultimately maintaining a good reputation. Don’t wait until you encounter bad reviews or hear negative reviews to start improving your reputation. Build a sustainable reputation strategy and implement it gradually. Pay attention to every detail on the web, every single one of those details is very important so that there are no flukes, but a reaction to a predetermined strategy. From a business perspective, make sure that both official social media accounts and employee accounts contribute to a positive brand image. Work together and communicate the values ​​of the brand, thereby helping to create a valuable reputation. Respond positively to comments, whether they are good or bad, should respond, feedback fosters a connection between you and the public.

  1.  How will you know that your PLN is a success? (Ruining)

Regarding the success of the PLN, we need to understand what the purpose of your PLN is. PLN is a personal network for learning created by networking tools such as blogs, wikis, microblogging, Facebook, etc. Using this personal network can help us learn as part of a global community and strengthen our relationships with others. exchange, expand our learning space and opportunities, and enhance our reflection. In your PLN you can explore your interests, needs, and passions. Plan your career development. Learn and connect the way you like. Stay up-to-date with the latest research and news from around the world. Finally, enjoy a comfortable and happy environment in PLN. If these can be achieved, then there is no doubt that this is a successful PLN.

References

Bariso, Justin. “What You Can Learn from the Linkedin Profiles of 5 Super Successful People.” Business Insider, Business Insider, 7 Dec. 2015, https://www.businessinsider.com/linkedin-profiles-of-5-successful-people-2015-12#1-conan-obrien-1.

Boutin, ByDavid, et al. “The Five Awesome Twitter Features You Should Use Now.” Social Media & Influencer Marketing Speaker, Consultant & Author, 19 Jan. 2022, https://nealschaffer.com/5-awesome-twitter-features/.

Carpenter, J. P., & Morrison, S. A. (2018). Enhancing teacher education… with Twitter?. Phi Delta Kappan100(1), 25-28.

“Why Use Twitter? What Are the Main Features?” Minerva Visuals Blog, 19 Nov. 2021, https://blog.minervavisuals.co/why-use-twitter-features/.

Blog #5 PLN & Education

Step 7: Making Time To Build Your PLN – Courses & PD

Community communications go beyond blogs and social media shares, how does a PLN help and hinder the development of thoughts and ideas in education discourse?

PLN contributes to the development of ideas and concepts in discourse by building a network of communities from around the world. While providing a forum for discussion and debate among different stakeholders to help develop ideas and ideas in educational discourse, PLN hinders the development of ideas and concepts in educational discourse by creating echo chambers where only certain voices can be heard. While the lack of diversity in discourse and the narrower range of viewpoints represented have led to extreme or hateful Internet resources. However, in a continuously developing PLN environment, the community will be more inclusive and friendly.

How do educators create discourse?

Educators are professionally trained so they have better ways to educate students. Educators use discourse to create opportunities for students to share their ideas and develop their study skills. Educators provide students with different syllabuses based on their learning experience and knowledge. Diversity in learning can provide better learning outcomes. Additionally, social media can be used for education in a number of ways. It can be used as a research tool (searching for necessary materials), communication between teachers and students, and a tool for sharing resources and ideas.

What is the role of social media in education?

The use of social media in education can help make education more accessible by helping students, teachers and parents get more useful information, connect with study groups and other education systems.Social networking tools offer students and institutions multiple opportunities to improve their learning methods. Through these networks, you can integrate social media plugins that support sharing and interaction. Valuable knowledge such as analysis and insights on various topics or issues can be obtained through social media for use in learning.

What are some problems with social media communications in education settings?

Cyberbullying or other online conflict. Rapid and widespread spread of crisis-related rumours or other false information. Trigger a crisis, increase perceptions of threat and fear, or create the potential for crisis contagion. The potential for overuse or as a consistent substitute for face-to-face socialization may contribute to social media depression. Time consuming for educators, parents, and other caregivers to learn and monitor.

Which social media platforms are beneficial in education?

There are plenty of authentic social media on the app store and the internet, neither good nor bad. Students should follow their own preferences. For example: social media platforms such as Google, Microsoft, Adobe, Zoom, Brightspace and Apple.

When working with the vulnerable sector, how does social media fit into professionalism and regulations?

Social media should pay attention to the special needs of vulnerable groups. The platform should provide more humanized services for special groups. Social media should demonstrate equality and diversity, and should not spread words that are harmful to others. Regulate the network environment to protect the rights of others.

Public PLN – Balancing PLN, Media Literacy, & Public Discourse

从媒介素养到算法素养:年轻人究竟做得怎么样?_用户

How do notable individuals use social media?

Well-known people are usually movie stars, entrepreneurs, politicians and rich people. They get people’s attention on a daily basis, and if you have a Facebook, Twitter, Tumblr, Instagram or Vine account, chances are you follow at least some of your favorite celebrities. Successful celebrities are well versed in the art of using social media tools to build brands and keep their names up to date. One of the biggest ways celebrities use social media to build their brands is to bring their fans closer. Since people love to “talk” to their favorite stars, it’s more of an attraction to celebrity adoration for them. Social media is ideal for self-promotion, and it doesn’t take a lot. Daily tweets, status updates or photos keep celebrities in the public eye. Likewise, many celebrities have found social media helpful in rebuilding their brands. Celebrities who have committed some kind of wrong in the public eye often apologize on their social media accounts, explain themselves, or otherwise atone for their actions. It doesn’t always work, but when it does, it works fine. Celebrities themselves are brands. Whether they’re making music, starring in movies and TV shows, or writing books, celebrities aren’t just people. They also tend to have outside interests that also make money for them.

What are the benefits of being in the public eye and having a PLN?

Personal Learning Networks are a way of describing the groups of people you connect with to understand their thoughts, their problems, their reflections and their references. Your PLN is not limited to online interactions, but the online, global interaction part really sets it apart. Find quality resources, lesson plans and conferences. Share your resources and ideas. Follow great people and their blogs. Get support when you need it. Find 24/7 inspiration. Learn about the latest trends in society.

Building community with online tools provided by the employer can be limiting, what are the perceived restrictions and benefits?

Community platforms are provided by employers, so there are some limitations to diversity. The platform serves people inside the company, and the information they get is limited to internal company affairs. There are many benefits of establishing a community platform. Employees can easily log in to their accounts to handle work content, resources are systematically classified for easy grasp, and investors can clearly understand corporate culture, etc.

Delivering information in a connected society requires verifiable resources, how do build a PLN to rely on?

Constructing a PLN means that you agree to release your information on the Internet and the public. It’s important to connect with people you know who are always reliable and not just giving you lies and incorrect information. Reputation and loyalty are important factors, in order for your own PLN to be reliable and verifiable, you must build a good reputation by connecting with other reliable and verifiable people.

How do those, who are veteran storytellers, minimize the risk of sharing misinformation?

Veteran storytellers have many fans. Their work brings people into it. When sharing things online, always pay attention to the source of the information. As a result, their work is often original, positive, and socially appropriate. Minimizing the risk of sharing misinformation has to do with the idea of having reliable and verifiable resources in your PLN. A lot of bad social impact is caused by wrong speech and poor explanation.

What is media literacy?

Media literacy is an expanded conceptualization of literacy that includes the ability to access and analyze media information and to create, reflect, and take action, harnessing the power of information and communication to change the world.

Why is it important?

When used properly, media can entertain and inform our children in a positive way. However, because most children are not taught to use the media thoughtfully, many media messages can lead to public health problems such as obesity, bullying and aggression, low self-esteem, depression, negative body image, risky sexual behaviors and substance abuse. .

Why should you aim for varied views but the factual consensus in your PLN?

In PLN, we share our thoughts and opinions with you, which will attract people with all kinds of opinions on the network. People exchange ideas with each other in PLN, and each exchange of a different perspective is an opportunity to learn. Tolerance and acceptance of various viewpoints can make PLN more diverse and promote better PLN development.

Consider what the risks for a public figure or person in a position of trust (educator, lawyer, government official) may be?

Public figures must maintain their credibility at all times. Their choices affect the entire community, and their followers may have different voices. For example, the battle between the two parties in the United States, they cannot meet everyone’s needs and have no guarantees to their supporters about future policies. Differing viewpoints let them take sides.

Include in your blog, how to best address negative replies and critiques reflective of your personal values and employer’s social media policy?

Social media is an invaluable tool to help you connect with others. However, when others provide negative feedback online, it also has the ability to affect your reputation in significant ways. Addressing public criticism on social media requires caution. Always take responsibility, even if you disagree with the author of the comment. Respect is the key! Always remember that the way you communicate is a direct reflection of your personal image. Social media is important – it’s the most important thing to remember. All comments on social media, no matter how negative or outlandish, must be taken seriously. All responses should be carefully crafted to convey an understanding of why these comments were made. It’s a blessing when negative feedback is fact-based and focused on revealing what’s really wrong, because it gives us an opportunity to learn and improve a product or service. That’s why we need to be grateful for any such feedback, have the courage to admit our mistakes, and show how we’ll fix them.

Consider in your writing how open dialogues about media literacy and factual information can create conflict, why does this happen?

On the internet, freedom of speech allows everyone to express their opinions, but that doesn’t mean you can offend others or appear offensive at will. Controversial topics often generate multiple opposing viewpoints, which is fine in benign situations, but media literacy is often overlooked. They do not consider media information, but blindly judge facts based on the influence of the Internet. This will lead to bad conflicts and even cause great psychological harm to the parties involved.

Blog#3 Equity, Diversity & Inclusion

See the source image

Social inclusion is the tendency to give people at risk of poverty or social exclusion the opportunity to participate fully in social life so that they can enjoy an adequate standard of living. Social inclusion means access to education and health systems, job opportunities, the possibility of having decent housing, civic safety, etc. In short, social inclusion seeks to enable all citizens, regardless of origin or status, to fully enjoy their rights, realize their individual potential, and make the most of their well-being in life. An inclusive environment helps enhance collaboration between project teams, companies and communities, enriching our ideas while addressing the challenges that arise in design.

How does social media engage in communications?
Without engagement, social media is just media. Social media has increased the relationship between people, and people’s communication has become more convenient and free. Share, push and post what interests you. Don’t try to make people want you to look like you, and don’t try to make everything perfect. The most important thing is your own thoughts. Post something that really interests you and your community. The main goal of social media is to build relationships and increase value. It’s really about talking to people, really getting involved, responding to comments, joining the community, sharing your perspective.

How does social media challenge communications?
Social media has created countless ways to interact and communicate with new friends, as well as keep in touch with old ones. On the social front, social media has given people more freedom to connect with family and friends, as well as to meet new people. In addition, social media can largely contribute to social change. In a sense, social media pulls people together while also taking them away from each other. This is because more and more users are becoming introverted – they have become comfortable and social media dependent, so they are afraid of change. There are also those who believe that with the growth and prominence of social media, users lack the independence to focus properly. The cyberspace built by social media also sometimes presents a barrier that isolates users, making it difficult for users to have very close friends because people don’t have enough time to spend on every relationship. Even some people become overly dependent on the comfortable virtual world and deviate from real life. So, some people often feel that regardless of whether our social devices are in use, without them, we feel isolated. All in all, these social platforms are impacting the way people live their daily lives, ushering in a new era of people becoming more and more addicted to them. So we must use these social media reasonably and ensure that we are not divorced from real life.

Is it inclusive?
In general, it is inclusive, in a closed and safe internet environment where your friends and family will support and help you. Sharing your life experiences and reading other people’s experiences are all about building closer relationships. As they mentioned in the video, they are satisfied and happy with the current internet community. This is a good development.

Does your PLN amplify the views of others?
Everyone influences others, and whether your opinion is correct or not is changing others more or less. We draw the right perspective from it.

What are the benefits of a diverse and inclusive PLN in social media sharing that understands where you are coming from with messaging that impacts the community?
Diversity and inclusion make sharing on social media diverse. Social media has become indispensable in today’s society. While providing convenience, it also opens up people’s minds. Everyone can express their opinions and suggestions. Right or wrong, it is a platform to express yourself to the outside world. Everyone has this right!

« Older posts

© 2024 RuiningのBlog

Theme by Anders NorenUp ↑