By Marvin LeNoue, Tom Hall,
Myron A. Eighmy
Marvin LeNoue is an ABD doctoral
candidate in Occupational and Adult
Education at North Dakota State
University, Fargo, ND. He is currently
serving as an instructor at the University
of Oregon American English Institute,
Eugene, OR. His research interests
include technology-enhanced education
delivery and the use of educational
social software.
(Email: [email protected])
Tom Hall has an Ed. D. in Adult and
Higher Education from the University
of South Dakota. He is currently
serving as an Assistant Professor in the
Educational Leadership Program at
North Dakota State University, Fargo,
ND. His research interests include
adult education in the 21st Century, the
impact of different generational cohorts
in today's workplace, and community
education in rural America.
(Email: thomas.e. [email protected] edu)
Myron A. Eighmy is a professor and
program coordinator for the Education
Doctoral Program at North Dakota State
University. Research interests include
alternative delivery modes, learning
communities, and graduate student
self-efficacy.
(Email: [email protected])
Adult Education and the
Social Media Revolution
The advent of Web 2.0 and the spread of social software tools havecreated new and exciting opportunities for designers of digitally-medi-
ated education programs for adults. Whether working in fully online, blended,
or face-to-face learning contexts, instructors may now access technologies that
allow students and faculty to engage in cooperative and collaborative learning
despite being separated in space and time. By supporting the use of interactive
methods and multi-media materials, social software offers educators more ways
to engage learners than any preceding educational technology. Social software
also empowers curriculum designers to more effectively accommodate many
of the core principles of adult learning than was possible with earlier e-learning
technologies. This article offers a basic introduction to some new possibilities
in the design and delivery of digitally-mediated education, and an overview of
the compatibility between the capabilities of social software and the principles
of adult education.
Digitally Mediated Learning
Self-directed learning is largely unconstrained in terms of time and
location and has traditionally been a primary affordance of distance education
(Holmberg, 1995). From its inception, distance education has been marketed
as a solution for adults whose occupational, social, and/or family commitments
limit their ability to pursue educational goals (Holmberg). In the decades since
the 1970s, demand for distance programs has increased as the globalization
of national economies creates a competitive atmosphere that drives people to
become life-long learners in order to be successful in the workplace (Merriam,
Caffarella, & Baumgartner, 2007).
For many people, the term distance education now conjures up images of
computers, the Internet, and online learnin.
Read the article Adult Education and the Social Media Revolution,.docxmakdul
Read the article “Adult Education and the Social Media Revolution,” available in the eReserves section of the classroom. Pay particular attention to the references these authors make to the works of others. Every citation within this article is essentially a head nod to other authors who have written about the same or similar topics. Were they all in the same room, you could imagine the authors of this article pointing to or calling out those other authors while speaking. This is what we mean when we refer to research and writing as one big conversation, with all of the participants listening and responding to one another.
In a discussion post, point to an example from this article and explain how the authors do one of the following:
· refer to another work in order to give legitimacy to their own point;
· refer to another work in order to build upon the ideas of others; or
· refer to another work in order to challenge that work.
If you select "refer to another work in order to give legitimacy to their own point," first describe what the authors' point is, then describe how the cited article supports that point.
If you select "refer to another work in order to build upon the ideas of others," first describe what the ideas are, then describe how the authors build upon those ideas.
If you select "refer to another work in order to challenge that work", first describe what is being challenged, then describe how the authors are challenging the cited work.
By Marvin LeNoue, Tom Hall,
Myron A. Eighmy
Marvin LeNoue is an ABD doctoral
candidate in Occupational and Adult
Education at North Dakota State
University, Fargo, ND. He is currently
serving as an instructor at the University
of Oregon American English Institute,
Eugene, OR. His research interests
include technology-enhanced education
delivery and the use of educational
social software.
(Email: [email protected])
Tom Hall has an Ed. D. in Adult and
Higher Education from the University
of South Dakota. He is currently
serving as an Assistant Professor in the
Educational Leadership Program at
North Dakota State University, Fargo,
ND. His research interests include
adult education in the 21st Century, the
impact of different generational cohorts
in today's workplace, and community
education in rural America.
(Email: thomas.e. [email protected] edu)
Myron A. Eighmy is a professor and
program coordinator for the Education
Doctoral Program at North Dakota State
University. Research interests include
alternative delivery modes, learning
communities, and graduate student
self-efficacy.
(Email: [email protected])
Adult Education and the
Social Media Revolution
The advent of Web 2.0 and the spread of social software tools havecreated new and exciting opportunities for designers of digitally-medi-
ated education programs for adults. Whether working in fully online, blended,
or face-to-face learning contexts, instructors may now access technologies that
allow students and faculty to engage in coope ...
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Manal Hasan Hasan Ebrahim Alkandari
Public Authority for Applied Education and Training
The Higher Institute for Administrative Services English Department
Abstract: In many learning places, online learning has become the new normal with the major aim of averting the
Covid-19 pandemic effects. Besides, the e-learning benefits can help mitigate the effects of conventionalism and
deferment in education institutions and foster the development of student's critical thinking skills as would be
anticipated in traditional residential practices if exploited effectively. Even though research myriads have proved
that it is a student-and-action-based model that has the potential to accomplish optimal education and learning
outcomes when applied successfully, online learning more often than not has been criticized for being unable to
engage learners amply. Understandably, in residential systems, teaching learners to develop critical thinking skills
has been challenging because it needs the physical presence of students and faculty to participate in the analyses
and syntheses of complex concepts for applications, clarity and better assimilations. To successfully apply the same
in an e-learning setting will need augmented knowledge in the subject matters as well as knowledge in the elearning dynamics, including applications of germane instructional strategies, contexts and influential theories.
Keywords: online learning, Covid-19 pandemic effects, e-learning benefits, education institutions.
Read the article Adult Education and the Social Media Revolution,.docxmakdul
Read the article “Adult Education and the Social Media Revolution,” available in the eReserves section of the classroom. Pay particular attention to the references these authors make to the works of others. Every citation within this article is essentially a head nod to other authors who have written about the same or similar topics. Were they all in the same room, you could imagine the authors of this article pointing to or calling out those other authors while speaking. This is what we mean when we refer to research and writing as one big conversation, with all of the participants listening and responding to one another.
In a discussion post, point to an example from this article and explain how the authors do one of the following:
· refer to another work in order to give legitimacy to their own point;
· refer to another work in order to build upon the ideas of others; or
· refer to another work in order to challenge that work.
If you select "refer to another work in order to give legitimacy to their own point," first describe what the authors' point is, then describe how the cited article supports that point.
If you select "refer to another work in order to build upon the ideas of others," first describe what the ideas are, then describe how the authors build upon those ideas.
If you select "refer to another work in order to challenge that work", first describe what is being challenged, then describe how the authors are challenging the cited work.
By Marvin LeNoue, Tom Hall,
Myron A. Eighmy
Marvin LeNoue is an ABD doctoral
candidate in Occupational and Adult
Education at North Dakota State
University, Fargo, ND. He is currently
serving as an instructor at the University
of Oregon American English Institute,
Eugene, OR. His research interests
include technology-enhanced education
delivery and the use of educational
social software.
(Email: [email protected])
Tom Hall has an Ed. D. in Adult and
Higher Education from the University
of South Dakota. He is currently
serving as an Assistant Professor in the
Educational Leadership Program at
North Dakota State University, Fargo,
ND. His research interests include
adult education in the 21st Century, the
impact of different generational cohorts
in today's workplace, and community
education in rural America.
(Email: thomas.e. [email protected] edu)
Myron A. Eighmy is a professor and
program coordinator for the Education
Doctoral Program at North Dakota State
University. Research interests include
alternative delivery modes, learning
communities, and graduate student
self-efficacy.
(Email: [email protected])
Adult Education and the
Social Media Revolution
The advent of Web 2.0 and the spread of social software tools havecreated new and exciting opportunities for designers of digitally-medi-
ated education programs for adults. Whether working in fully online, blended,
or face-to-face learning contexts, instructors may now access technologies that
allow students and faculty to engage in coope ...
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Manal Hasan Hasan Ebrahim Alkandari
Public Authority for Applied Education and Training
The Higher Institute for Administrative Services English Department
Abstract: In many learning places, online learning has become the new normal with the major aim of averting the
Covid-19 pandemic effects. Besides, the e-learning benefits can help mitigate the effects of conventionalism and
deferment in education institutions and foster the development of student's critical thinking skills as would be
anticipated in traditional residential practices if exploited effectively. Even though research myriads have proved
that it is a student-and-action-based model that has the potential to accomplish optimal education and learning
outcomes when applied successfully, online learning more often than not has been criticized for being unable to
engage learners amply. Understandably, in residential systems, teaching learners to develop critical thinking skills
has been challenging because it needs the physical presence of students and faculty to participate in the analyses
and syntheses of complex concepts for applications, clarity and better assimilations. To successfully apply the same
in an e-learning setting will need augmented knowledge in the subject matters as well as knowledge in the elearning dynamics, including applications of germane instructional strategies, contexts and influential theories.
Keywords: online learning, Covid-19 pandemic effects, e-learning benefits, education institutions.
EFL Students’ Perceptions and Attitudes towards Facebook as anEducational Lea...inventionjournals
The purpose of this study was to examine EFL students’ perceptions and attitudes towards Facebook as an educational learning tool.Participants were twenty eight undergraduate female students who experienced teaching and learning through Facebook and some classroom and face-to-face sessions. The researcher, to collect data, prepared and used two instruments; The first was face-to-face interview, while the second was Facebook Perception and Attitudes Questionnaire. Having conducted interviews, and administered the Facebook Perception and Attitudes Questionnaire, data were analyzed quantatively and qualitatively. The findings revealed that students had high and positiveperceptions of Facebook and its activities as a learning environment. Also, students had good and favourable attitudes towards using Facebook on teaching and learning.
Mobile devices have been the focus of a push in many nations and internationally as part of
efforts to achieve greater literacy and numeracy among students. Research has shown a strong
link between Internet usage, the spread of broadband in a country, and its GDP. Those countries
that are the highest performing educationally already integrate mobile devices in their
education. This paper synthesizes empirical research on mobile devices from 2010 to 2013 in
K-12 schools by focusing on studies that demonstrate emerging themes in this area. It is also
clear that the pedagogy needed to be successful in creating positive outcomes in the use of
technology has to be student-centered with the aim of personalizing the learning experience.
Research found that students could become collaborators in designing their own learning
process. As students become independent learners, they become more prepared in the skills
needed for college and in their careers.
The Impact of Social Media Technologies on Adult Learning IJECEIAES
Technology and social media have presented significant tools for adult learners to learn and advance continually. Fast technological advancements have enabled development of technologies used for learning. Expansion of various tools has given professors, educaters, trainers, instructers, many alternatives towards the implementation of the technology supported learning. The use of social media can improve adult learning outcomes and academic accomplishment. Social media is increasingly proven to be beneficial in adult learning and has a huge potential for adult education. This paper sheds some lights on benefits of social media for adult learners, this is incorporated through the review of previous work and some barriers that encounters social media for learning purposes. Also some social media models are reviewed to show the growth and effect of social media in adult learning context, and suggestions and recommendations are provided.
Dr. Chuck Holt and Dr. Amy Burkman - Published National Refereed Article in N...William Kritsonis
Dr. Chuck Holt and Dr. Amy Burkman - Published National Refereed Article in NATIONAL FORUM JOURNALS
NATIONAL FORUM JOURNALS
Founded 1982
NATIONAL FORUM JOURNALS are a group of national refereed, juried, peer-reviewed, blind-reviewed professional periodicals. Any article published shall earned five affirmative votes from members of our National Board of Invited Distinguished Jurors and must be recommended for national publication by members of the National Policy Board representing all National FORUM Journals. Journal issues are distributed both nationally and world-wide.
Our website features national refereed articles that are published daily within our National FORUM Journals Online Journal Division. Over 1,000 articles are available to scholars and practitioners world-wide. Over 250,000 guests visit our website yearly. About 56,000 articles are downloaded for academic purposes at no charge. We have about an 88% rejection rate. See: www.nationalforum.com
Founded in 1982, National FORUM Journals has published the scholarly contributions of over 5,200 professors with over 2,000 articles indexed. Our journals are indexed with many global agencies including Cabell’s Directories, ERIC, EBSCO, SWETS International, Library of Congress National Serials Data Program, and the Copyright Clearance Center, Danvers, Massachusetts.
Global Website: www.nationalforum.com
Dr. Chuck Holt and Dr. Amy Burkman, NATIONAL FORUM OF EDUCATIONAL ADMINISTRAT...William Kritsonis
Dr. Chuck Holt and Dr. Amy Burkman, NATIONAL FORUM OF EDUCATIONAL ADMINISTRATION AND SUPERVISION JOURNAL, 30(3) 2013
Dr. David E. Herrington, Invited Guest Editor, NFEAS JOURNAL, 30(3) 2013
Dr. William Allan Kritsonis, Editor-in-Chief (Since 1982)
Abstract: Blended learning is an educational model offered through traditional learning methods and digital
networks to share knowledge and education resources between instructors and learners. Besides, blended learning
provides learning courses accessed through digital platforms and gadgets utilizing online technologies such as
smartphones, tablets, laptops, and personal computers. Denoted as e-learning, these platforms are important in
teaching and training students through the internet and wireless technologies. In any course, offering online
learning plays a great role because e-learning provides the students the opportunities of developing their
capabilities, specifically in information science courses. In modern education, digital learning is becoming a
gradually popular option. The classroom settings moved online from full digital courses to classes held remotely.
However, effective communication in a digital learning environment may be hard, particularly when digital
learning transition is unplanned or has been sudden. Making such massive overhauls are confusing and frustrating
for the teachers, learners, and parents.
Nevertheless, digital learning communication can be made easier with the right resource. This research explores
the blended learning environment effectiveness by evaluating the relationships between design features, student
backgrounds or attributes, and learning outcomes. The paper's objective is to determine the important blended
learning effectiveness indicators, taking learning outcomes as dependent variables and design features and learner
background or attributes as independent variables. Results of multiple regression analyses indicated learner
attributes such as self-regulation and attitudes and traits of blended learning designs such as one-on-one support,
technology quality, and online tools forecasted students' satisfaction as an outcome. The findings show that design
characteristics and student traits are important indicators for student learning outcomes in blended learning.
In the last few decades the way information is being shared has been changed a lot, freely sharing of information and pervasiveness of the internet have created various new opportunities for teaching and learning (Martin. F, 2012). There is a growing concern that such technology provide a convergence between on and off-campus teaching and learning however this convergence takes some strong consideration of the limitation among the off campus learners
Tweeting the night away: Using Twitter to enhance social presencePatrick Lowenthal
To be truly effective, online learning must facilitate the social process of learning. This involves providing space and opportunities for students and faculty to engage in social activities. Although learning management systems offer several tools that support social learning and student engagement, the scope, structure, and functionality of those tools can inhibit and restrain just-in-time social connections and interactions. In this teaching tip, we describe our use of Twitter to encourage free flowing just-in-time interactions and how these interactions can enhance social presence in online courses. We then describe instructional benefits of Twitter, and conclude with guidelines for incorporating Twitter in online courses.
Education is a basic need for every human being and
digital education is the current trend and necessity for every
students or learners to be more focused in their learning. In this
paper authors worked with these current phenomena. Digital
education helps students or learners to gather knowledge in
easier and different ways than before. It also reduces the learning
time. In traditional education system we were mostly dependent
on text book or in instructor’s speech. But nowadays it is easier to
find any text book or any other learning materials by using
digital educational tools. Another charismatic change that
transformed human life is social networking. In terms of digital
education social networks contribute a good portion of education.
Among social networking services, Facebook has become most
popular for communication with familiar and unfamiliar
persons. The impact of the use of Facebook on students is very
impactful. In this paper authors conducted a survey on various
students for understanding the digitalization effect on
educational purpose. Machine learning was applied for classified
the happy and unhappy student with digitalization where focused
time spent on educational purposes. Finally authors provided an
analytical summary of digitalization effect on education based on
their survey.
Calculus Quiz 2 (Derivatives)Covers Units 9-13. This is a 10 quest.docxclairbycraft
Calculus Quiz 2 (Derivatives)
Covers Units 9-13. This is a 10 question, 10 point quiz consisting of multiple choice and calculated numeric answers.
You should complete the homework over these units before beginning the quiz.
You should complete the by
Thursday, November 12.
YOU MAY ATTEMPT THE QUIZ up to 3 timesIF YOU WISH to improve your score.
.
Calculus IDirections (10 pts. each) Answer each of the followin.docxclairbycraft
Calculus I
Directions: (10 pts. each) Answer each of the following questions below. In order to receive ANY credit for a question, you must SHOW YOUR WORK using proper notation and clear and concise logic. You're graded on both the accuracy of your answers AND your explanations that sufficiently support your answers. Unless otherwise stated, you're to give the EXAXCT VALUES of answers instead of decimal approximations. In order to receive ANY credit for any applied/word problem (i.e. Problems #29 - ), you MUST declare a variable (unless the variable(s) have already been declared in the problem) and set up and solve an appropriate mathematical expression that can be used to answer the question. Proper units must also be included in answers to applied problems. NO CREDIT WILL BE GIVEN FOR EITHER GUESSING OR CHECKING POSSIBLE ANSWERS WITHOUT SOLVING THE PROBLEM. YOU CANNOT USE CALCULUS TO SOLVE THESE PROBLEMS.
Finally, write ONLY FINAL ANSWERS ON THESE PAGES; you must show your work both according to homework guidelines and on YOUR OWN PAPER.
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
Multiply or divide as indicated. Write your answer in factored form.
1) x22 - 9x + 14 · xx22 -- 1618x x ++ 4877 1)
2)
x
-
12
x
+
32
Simplify the complex rational expression.
4
x
2
-
4
x
-
32
-
1
x
-
8
2)
1 + 1 x + 4
Find the difference quotient for the function and simplify it.
3) g(x) = 6x2 + 14x - 1 3)
Find the domain and range of the function. Write your answers using interval notation.
4)
g(z)
=
16
-
z
2
4)
Find a formula for the function graphed.
5) 5)
Determine if the function is even, odd, or neither. You must use algebra to justify your answer; otherwise, no full credit will be given. NO CREDIT is given for an answer without a mathematical explanation.
6) f(x) = x -+7 9 6)
State the domain of the composition.
7)
(
g
H
h)(x) with g(x)
=
x
+
5
and h(x)
=
8
x
+
7
7)
Compute
f(x
+
h)
-
f(x)
h
(h
J
0) for the given function
.
8) f(x) = 4x - 8 8)
9)
f(x)
=
5
x
2
+
6
x
9)
10)
f(x)
=
1
9
x
10)
Solve the equation by multiplying both sides by the LCD.
11) 32x - x 3+ 1 = 1 11)
12)
Solve the equation.
x
+
6
+
2
-
x
=
4
12)
13)
(
4
x
-
2
)
/
3
2
+
6
=
15
13)
14)
3
x
+
4
=
x
-
1
14)
Find the real solutions of the equation by factoring.
15) x3 + 8x2 - x - 8 = 0 15)
Solve the equation by making an appropriate substitution.
16) (x2 - 2x)2 - 11(x2 - 2x) + 24 = 0 16)
Solve the logarithmic equation.
17) log2(x + 7) + log2(x - 7) = 2 17)
Solve the exponential equation. Express the solution set in terms of natural logarithms.
18) 4x + 4 = 52x + 5 18)
Solve the inequality and express the solution in interval notation.
19) 7Ax - 1A L 2 19)
Solve the inequality. Write your answer using interval notation.
20) x 18- 5 > x 15+ 1 20)
Write the equation as f(x) = a(x - h)2 + k. Identify the vertex, range, and axis of symmetry of the function.
21) f(x) = x2 + 5x + 2 21)
23) log
F.
More Related Content
Similar to By Marvin LeNoue, Tom Hall,Myron A. EighmyMarvin LeNoue .docx
EFL Students’ Perceptions and Attitudes towards Facebook as anEducational Lea...inventionjournals
The purpose of this study was to examine EFL students’ perceptions and attitudes towards Facebook as an educational learning tool.Participants were twenty eight undergraduate female students who experienced teaching and learning through Facebook and some classroom and face-to-face sessions. The researcher, to collect data, prepared and used two instruments; The first was face-to-face interview, while the second was Facebook Perception and Attitudes Questionnaire. Having conducted interviews, and administered the Facebook Perception and Attitudes Questionnaire, data were analyzed quantatively and qualitatively. The findings revealed that students had high and positiveperceptions of Facebook and its activities as a learning environment. Also, students had good and favourable attitudes towards using Facebook on teaching and learning.
Mobile devices have been the focus of a push in many nations and internationally as part of
efforts to achieve greater literacy and numeracy among students. Research has shown a strong
link between Internet usage, the spread of broadband in a country, and its GDP. Those countries
that are the highest performing educationally already integrate mobile devices in their
education. This paper synthesizes empirical research on mobile devices from 2010 to 2013 in
K-12 schools by focusing on studies that demonstrate emerging themes in this area. It is also
clear that the pedagogy needed to be successful in creating positive outcomes in the use of
technology has to be student-centered with the aim of personalizing the learning experience.
Research found that students could become collaborators in designing their own learning
process. As students become independent learners, they become more prepared in the skills
needed for college and in their careers.
The Impact of Social Media Technologies on Adult Learning IJECEIAES
Technology and social media have presented significant tools for adult learners to learn and advance continually. Fast technological advancements have enabled development of technologies used for learning. Expansion of various tools has given professors, educaters, trainers, instructers, many alternatives towards the implementation of the technology supported learning. The use of social media can improve adult learning outcomes and academic accomplishment. Social media is increasingly proven to be beneficial in adult learning and has a huge potential for adult education. This paper sheds some lights on benefits of social media for adult learners, this is incorporated through the review of previous work and some barriers that encounters social media for learning purposes. Also some social media models are reviewed to show the growth and effect of social media in adult learning context, and suggestions and recommendations are provided.
Dr. Chuck Holt and Dr. Amy Burkman - Published National Refereed Article in N...William Kritsonis
Dr. Chuck Holt and Dr. Amy Burkman - Published National Refereed Article in NATIONAL FORUM JOURNALS
NATIONAL FORUM JOURNALS
Founded 1982
NATIONAL FORUM JOURNALS are a group of national refereed, juried, peer-reviewed, blind-reviewed professional periodicals. Any article published shall earned five affirmative votes from members of our National Board of Invited Distinguished Jurors and must be recommended for national publication by members of the National Policy Board representing all National FORUM Journals. Journal issues are distributed both nationally and world-wide.
Our website features national refereed articles that are published daily within our National FORUM Journals Online Journal Division. Over 1,000 articles are available to scholars and practitioners world-wide. Over 250,000 guests visit our website yearly. About 56,000 articles are downloaded for academic purposes at no charge. We have about an 88% rejection rate. See: www.nationalforum.com
Founded in 1982, National FORUM Journals has published the scholarly contributions of over 5,200 professors with over 2,000 articles indexed. Our journals are indexed with many global agencies including Cabell’s Directories, ERIC, EBSCO, SWETS International, Library of Congress National Serials Data Program, and the Copyright Clearance Center, Danvers, Massachusetts.
Global Website: www.nationalforum.com
Dr. Chuck Holt and Dr. Amy Burkman, NATIONAL FORUM OF EDUCATIONAL ADMINISTRAT...William Kritsonis
Dr. Chuck Holt and Dr. Amy Burkman, NATIONAL FORUM OF EDUCATIONAL ADMINISTRATION AND SUPERVISION JOURNAL, 30(3) 2013
Dr. David E. Herrington, Invited Guest Editor, NFEAS JOURNAL, 30(3) 2013
Dr. William Allan Kritsonis, Editor-in-Chief (Since 1982)
Abstract: Blended learning is an educational model offered through traditional learning methods and digital
networks to share knowledge and education resources between instructors and learners. Besides, blended learning
provides learning courses accessed through digital platforms and gadgets utilizing online technologies such as
smartphones, tablets, laptops, and personal computers. Denoted as e-learning, these platforms are important in
teaching and training students through the internet and wireless technologies. In any course, offering online
learning plays a great role because e-learning provides the students the opportunities of developing their
capabilities, specifically in information science courses. In modern education, digital learning is becoming a
gradually popular option. The classroom settings moved online from full digital courses to classes held remotely.
However, effective communication in a digital learning environment may be hard, particularly when digital
learning transition is unplanned or has been sudden. Making such massive overhauls are confusing and frustrating
for the teachers, learners, and parents.
Nevertheless, digital learning communication can be made easier with the right resource. This research explores
the blended learning environment effectiveness by evaluating the relationships between design features, student
backgrounds or attributes, and learning outcomes. The paper's objective is to determine the important blended
learning effectiveness indicators, taking learning outcomes as dependent variables and design features and learner
background or attributes as independent variables. Results of multiple regression analyses indicated learner
attributes such as self-regulation and attitudes and traits of blended learning designs such as one-on-one support,
technology quality, and online tools forecasted students' satisfaction as an outcome. The findings show that design
characteristics and student traits are important indicators for student learning outcomes in blended learning.
In the last few decades the way information is being shared has been changed a lot, freely sharing of information and pervasiveness of the internet have created various new opportunities for teaching and learning (Martin. F, 2012). There is a growing concern that such technology provide a convergence between on and off-campus teaching and learning however this convergence takes some strong consideration of the limitation among the off campus learners
Tweeting the night away: Using Twitter to enhance social presencePatrick Lowenthal
To be truly effective, online learning must facilitate the social process of learning. This involves providing space and opportunities for students and faculty to engage in social activities. Although learning management systems offer several tools that support social learning and student engagement, the scope, structure, and functionality of those tools can inhibit and restrain just-in-time social connections and interactions. In this teaching tip, we describe our use of Twitter to encourage free flowing just-in-time interactions and how these interactions can enhance social presence in online courses. We then describe instructional benefits of Twitter, and conclude with guidelines for incorporating Twitter in online courses.
Education is a basic need for every human being and
digital education is the current trend and necessity for every
students or learners to be more focused in their learning. In this
paper authors worked with these current phenomena. Digital
education helps students or learners to gather knowledge in
easier and different ways than before. It also reduces the learning
time. In traditional education system we were mostly dependent
on text book or in instructor’s speech. But nowadays it is easier to
find any text book or any other learning materials by using
digital educational tools. Another charismatic change that
transformed human life is social networking. In terms of digital
education social networks contribute a good portion of education.
Among social networking services, Facebook has become most
popular for communication with familiar and unfamiliar
persons. The impact of the use of Facebook on students is very
impactful. In this paper authors conducted a survey on various
students for understanding the digitalization effect on
educational purpose. Machine learning was applied for classified
the happy and unhappy student with digitalization where focused
time spent on educational purposes. Finally authors provided an
analytical summary of digitalization effect on education based on
their survey.
Calculus Quiz 2 (Derivatives)Covers Units 9-13. This is a 10 quest.docxclairbycraft
Calculus Quiz 2 (Derivatives)
Covers Units 9-13. This is a 10 question, 10 point quiz consisting of multiple choice and calculated numeric answers.
You should complete the homework over these units before beginning the quiz.
You should complete the by
Thursday, November 12.
YOU MAY ATTEMPT THE QUIZ up to 3 timesIF YOU WISH to improve your score.
.
Calculus IDirections (10 pts. each) Answer each of the followin.docxclairbycraft
Calculus I
Directions: (10 pts. each) Answer each of the following questions below. In order to receive ANY credit for a question, you must SHOW YOUR WORK using proper notation and clear and concise logic. You're graded on both the accuracy of your answers AND your explanations that sufficiently support your answers. Unless otherwise stated, you're to give the EXAXCT VALUES of answers instead of decimal approximations. In order to receive ANY credit for any applied/word problem (i.e. Problems #29 - ), you MUST declare a variable (unless the variable(s) have already been declared in the problem) and set up and solve an appropriate mathematical expression that can be used to answer the question. Proper units must also be included in answers to applied problems. NO CREDIT WILL BE GIVEN FOR EITHER GUESSING OR CHECKING POSSIBLE ANSWERS WITHOUT SOLVING THE PROBLEM. YOU CANNOT USE CALCULUS TO SOLVE THESE PROBLEMS.
Finally, write ONLY FINAL ANSWERS ON THESE PAGES; you must show your work both according to homework guidelines and on YOUR OWN PAPER.
SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.
Multiply or divide as indicated. Write your answer in factored form.
1) x22 - 9x + 14 · xx22 -- 1618x x ++ 4877 1)
2)
x
-
12
x
+
32
Simplify the complex rational expression.
4
x
2
-
4
x
-
32
-
1
x
-
8
2)
1 + 1 x + 4
Find the difference quotient for the function and simplify it.
3) g(x) = 6x2 + 14x - 1 3)
Find the domain and range of the function. Write your answers using interval notation.
4)
g(z)
=
16
-
z
2
4)
Find a formula for the function graphed.
5) 5)
Determine if the function is even, odd, or neither. You must use algebra to justify your answer; otherwise, no full credit will be given. NO CREDIT is given for an answer without a mathematical explanation.
6) f(x) = x -+7 9 6)
State the domain of the composition.
7)
(
g
H
h)(x) with g(x)
=
x
+
5
and h(x)
=
8
x
+
7
7)
Compute
f(x
+
h)
-
f(x)
h
(h
J
0) for the given function
.
8) f(x) = 4x - 8 8)
9)
f(x)
=
5
x
2
+
6
x
9)
10)
f(x)
=
1
9
x
10)
Solve the equation by multiplying both sides by the LCD.
11) 32x - x 3+ 1 = 1 11)
12)
Solve the equation.
x
+
6
+
2
-
x
=
4
12)
13)
(
4
x
-
2
)
/
3
2
+
6
=
15
13)
14)
3
x
+
4
=
x
-
1
14)
Find the real solutions of the equation by factoring.
15) x3 + 8x2 - x - 8 = 0 15)
Solve the equation by making an appropriate substitution.
16) (x2 - 2x)2 - 11(x2 - 2x) + 24 = 0 16)
Solve the logarithmic equation.
17) log2(x + 7) + log2(x - 7) = 2 17)
Solve the exponential equation. Express the solution set in terms of natural logarithms.
18) 4x + 4 = 52x + 5 18)
Solve the inequality and express the solution in interval notation.
19) 7Ax - 1A L 2 19)
Solve the inequality. Write your answer using interval notation.
20) x 18- 5 > x 15+ 1 20)
Write the equation as f(x) = a(x - h)2 + k. Identify the vertex, range, and axis of symmetry of the function.
21) f(x) = x2 + 5x + 2 21)
23) log
F.
Cadence Publishes Comprehensive Book onMixed-Signal Method.docxclairbycraft
Cadence Publishes Comprehensive Book on
Mixed-Signal Methodology; The "Mixed-Signal
Methodology Guide" Provides Expert Direction
on How to Address Design, Verification and
Implementation Challenges of Modern Mixed-
Signal Designs
Publication info: M2 Presswire ; Coventry [Coventry]14 Aug 2012.
ProQuest document link
ABSTRACT
SAN JOSE, Calif. -- Cadence Design Systems, Inc. (NASDAQ: CDNS), a leader in global electronic design innovation,
today announced availability of the critically acclaimed and much anticipated comprehensive design methodology
book for chip designers and CAD engineers that focuses on current and future advanced mixed-signal design
challenges and solutions. The "Mixed-Signal Methodology Guide" provides an overview of the design, verification
and implementation methodologies required for advanced mixed-signal designs. The book brings together top
mixed-signal design experts from across the industry -- including authors from Boeing, Cadence(R), ClioSoft and
Qualcomm -- to address the complex problems facing the mixed-signal design community.
"Modern mixed-signal design require new methodologies to improve productivity, reduce design time and achieve
silicon success," said Hao Fang, engineering director at LSI. "The Mixed-Signal Methodology Guide is a thorough
reference book on advanced verification and implementation methodologies. It will be particularly useful to mixed-
signal verification engineers for its coverage of analog behavioral modeling, and assertion and metric driven
verification methodology as applied to analog and mixed-signal design."
FULL TEXT
M2 PRESSWIRE-August 14, 2012-Cadence Publishes Comprehensive Book on Mixed-Signal Methodology; The
"Mixed-Signal Methodology Guide" Provides Expert Direction on How to Address Design, Verification and
Implementation Challenges of Modern Mixed-Signal Designs
(C)2012 M2 COMMUNICATIONS http://www.m2.com
August 13, 2012
SAN JOSE, Calif. -- Cadence Design Systems, Inc. (NASDAQ: CDNS), a leader in global electronic design innovation,
today announced availability of the critically acclaimed and much anticipated comprehensive design methodology
book for chip designers and CAD engineers that focuses on current and future advanced mixed-signal design
challenges and solutions. The "Mixed-Signal Methodology Guide" provides an overview of the design, verification
and implementation methodologies required for advanced mixed-signal designs. The book brings together top
mixed-signal design experts from across the industry -- including authors from Boeing, Cadence(R), ClioSoft and
Qualcomm -- to address the complex problems facing the mixed-signal design community.
The growing complexity of today's mixed-signal designs requires major changes in design methodology to both
increase productivity and deliver high quality products on time. This wide-ranging compendium examines in depth
such topics as AMS behavioral modeling, mixed-signal me.
Calculate the energy in the form of heat (in kJ) required to change .docxclairbycraft
Calculate the energy in the form of heat (in kJ) required to change 75.0 g of liquid water at 27.0 °C to ice at –20.0 °C. Assume that no energy in the form of heat is transferred to the environment. (Heat of fusion = 333 J/g; heat of vaporization = 2256 J/g; specific heat capacities: ice = 2.06 J/g×K, liquid water = 4.184 J/g×K)
.
CAHIIM Competencies Assessed Subdomain VI.D. Human Resources Ma.docxclairbycraft
CAHIIM Competencies Assessed:
Subdomain VI.D. Human Resources Management
Create and implement staff orientation and training programs (Blooms 6)
Instructions:
You are an HIM Supervisor at a hospital and you have been asked to create a new staff training on data compliance rules. Assume that the new staff has a wide variety of background, with some new staff knowing nothing about data compliance at all. The training should be basic and introductory.
Create an outline for your training.
Requirements:
Include an introduction and summary within your outline
Length of outline should be 3-4 pages
It should be an annotated outline. This means that it should include citations within the outline and a reference page.
Your training should include the topics of HIPAA and The Joint Commission and other data compliance topics that affect hospital staff
.
C8-1 CASE STUDY 8 CARLSON COMPANIES STORAGE SOLUT.docxclairbycraft
C8-1
CASE STUDY 8
CARLSON COMPANIES STORAGE SOLUTIONS
Carlson Companies (www.carlson.com) is one of the largest privately held
companies in the United States, with more than 171,000 employees in more
than 150 countries. Carlson enterprises include a presence in marketing,
business and leisure travel, and hospitality industries. Its Carlson Hotels
Worldwide division owns and operates approximately 1,075 hotels located in
more than 70 countries. Radisson, Park Plaza, and Country Inn & Suites by
Carlson are some of its hotel brands. The hotel loyalty program is named
Club Carlson. The Carlson Restaurants Worldwide includes T.G.I. Friday’s
and the Pick Up Stix chains. The company registered approximately $38
billion in sales in 2011.
Carlson’s Information Technology (IT) division, Carlson Shared Services,
acts as a service provider to its internal clients and consequently must
support a spectrum of user applications and services. The IT division uses a
centralized data processing model to meet business operational
requirements. The central computing environment has traditionally included
an IBM mainframe and over 50 networked Hewlett-Packard and Sun servers
[KRAN04, CLAR02, HIGG02]. The mainframe supports a wide range of
applications, including Oracle financial database, e-mail, Microsoft Exchange,
Web, PeopleSoft, and a data warehouse application.
C8-2
In 2002, the IT division established six goals for assuring that IT
services continued to meet the needs of a growing company with heavy
reliance on data and applications:
1. Implement an enterprise data warehouse.
2. Build a global network.
3. Move to enterprise-wide architecture.
4. Establish six-sigma quality for Carlson clients.
5. Facilitate outsourcing and exchange.
6. Leverage existing technology and resources.
The key to meeting these goals was to implement a storage area
network (SAN) with a consolidated, centralized database to support
mainframe and server applications. Carlson needed a SAN and data center
approach that provided a reliable, highly scalable facility to accommodate
the increasing demands of its users.
Storage Requirements
Prior to implementing the SAN and data center approach, the central DP
shop included separate disc storage for each server, plus that of the
mainframe. This dispersed data storage scheme had the advantage of
responsiveness; that is, the access time from a server to its data was
minimal. However, the data management cost was high. There had to be
backup procedures for the storage on each server, as well as management
controls to reconcile data distributed throughout the system. The mainframe
included an efficient disaster recovery plan to preserve data in the event of
major system crashes or other incidents and to get data back online with
little or no disruption to the users. No comparable plan existed for the many
servers.
C8-3
As Ca.
Caffeine intake in children in the United States and 10-ytre.docxclairbycraft
Caffeine intake in children in the United States and 10-y
trends: 2001–20101–4
Namanjeet Ahluwalia, Kirsten Herrick, Alanna Moshfegh, and Michael Rybak
ABSTRACT
Background: Because of the increasing concern of the potential
adverse effects of caffeine intake in children, recent estimates of
caffeine consumption in a representative sample of children are
needed.
Objectives: We provide estimates of caffeine intake in children in
absolute amounts (mg) and in relation to body weight (mg/kg) to
examine the association of caffeine consumption with sociodemo-
graphic factors and describe trends in caffeine intake in children in
the United States.
Design: We analyzed caffeine intake in 3280 children aged 2–19 y
who participated in a 24-h dietary recall as part of the NHANES,
which is a nationally representative survey of the US population
with a cross-sectional design, in 2009–2010. Trends over time be-
tween 2001 and 2010 were examined in 2–19-y-old children (n =
18,530). Analyses were conducted for all children and repeated for
caffeine consumers.
Results: In 2009–2010, 71% of US children consumed caffeine on
a given day. Median caffeine intakes for 2–5-, 6–11-, and 12–19-y
olds were 1.3, 4.5, and 13.6 mg, respectively, and 4.7, 9.1, and 40.6
mg, respectively, in caffeine consumers. Non-Hispanic black chil-
dren had lower caffeine intake than that of non-Hispanic white
counterparts. Caffeine intake correlated positively with age; this
association was independent of body weight. On a given day,
10% of 12–19-y-olds exceeded the suggested maximum caffeine
intake of 2.5 mg/kg by Health Canada. A significant linear trend
of decline in caffeine intake (in mg or mg/kg) was noted overall for
children aged 2–19 y during 2001–2010. Specifically, caffeine in-
take declined by 3.0 and 4.6 mg in 2–5- and 6–11-y-old caffeine
consumers, respectively; no change was noted in 12–19-y-olds.
Conclusion: A majority of US children including preschoolers con-
sumed caffeine. Caffeine intake was highest in 12–19-y-olds and
remained stable over the 10-y study period in this age group. Am J
Clin Nutr 2014;100:1124–32.
INTRODUCTION
Caffeine is a commonly consumed stimulant present naturally
in or added to foods and beverages. Caffeine consumption in
children has received considerable interest because of the con-
cern of adverse health effects. Caffeine intake of 100–400 mg has
been associated with nervousness, jitteriness, and fidgetiness
(1, 2). Because of the continued brain development involving
myelination and pruning processes, children may be particularly
sensitive to caffeine (3, 4). There has been some evidence that
has linked caffeine intake in children to sleep dysfunction, el-
evated blood pressure, impairments in mineral absorption and
bone health, and increased alcohol use or dependence (1, 5–7).
In addition, the routine use of caffeinated sugar-sweetened
beverages may contribute to weight gain and dental cavities (8).
Caffeine toxicity in children has also.
Cabbage patch hip dance move, The running man hip hop dance move, th.docxclairbycraft
Cabbage patch hip dance move, The running man hip hop dance move, the humpty dance hip hop move and the butterfly hip hop dance move. Describe each using the attachment in the assignment which provides certain words and descriptions. each style of dance ( cabbage patch, running man, the humpty dance, butterfly) has to have description or analysis using B.A.S.T.E See the attachment
use the attachment to describe each hip hop dance move
.
CA4Leading TeamsAre we a teamHi, my name is Jenny .docxclairbycraft
CA4:
Leading Teams
Are we a team?
Hi, my name is Jenny McConnell. I am the newly appointed CIO of a medium-sized technology company. Our company recruits top graduates from schools of business and engineering. Talent, intellect, creativity – it’s all there. If you lined up this crowd for a group photo, credentials in hand, the “wow” factor would be there.
Our company is spread over a dozen states, mostly in the Northwest. The talent pool is amazing across the board, both in IT and in the rest of the company. But when the CEO hired me, he said that we are performing nowhere near our potential. On the surface, the company is doing fine. But we should be a
Fortune 500
organization. With this much talent, we should be growing at a much faster rate. The CEO also said that I was inheriting “a super team with disappointing performance.” His task for me was to pull the IT stars into a cohesive team that would meet company needs for new IT systems and services much faster and more effectively.
Without making our superstars feel that they were being critiqued and second-guessed, or indicating “there’s a real problem here,” I wanted to gather as much information and feedback as possible from the 14 team members (regional CIOs and department heads) who report to me. I held one-on-one meetings in order to give a voice to each person, allowing each individual to provide an honest assessment of the team as well as areas for improvement and a vision for the future of team efforts.
I was surprised by the consistency of remarks and opinions. For example, a picture emerged of the previous CIO, who was obviously awed by the talent level of the team members. Comments such as “Bob pretty much let us do what we wanted” and “Bob would start the meeting and then just fade into the background, as if he found us intimidating” were typical. The more disturbing comment, “Bob always agree with
me
,” was expressed by most of the team members at some point in our conversation. It was as if the regional heads believed that the CIO wanted them to succeed by doing as they thought best for themselves.
I queried members about the level of cooperation during meetings and uncovered areas of concern, including the complaint that others at the table were constantly checking their iPads and smartphones during meetings. One department head told me, “You could turn off the sound while watching one of our meetings, and just by the body language and level of attention, tell who is aligned with whom and who wishes the speaker would just shup up. It would be comical if it weren’t so distressing.”
Such remarks were indicative of a lack of trust and respect and a breakdown of genuine communication. One team member told me, “I recently encountered a problem that a department head from another region had successfully solved, but the information was never shared, so here I am reinventing the wheel and wasting valuable time.” It was apparent that these so-called high performers were .
C7-1 CASE STUDY 7 DATA CENTER CONSOLIDATION AT GUARDI.docxclairbycraft
C7-1
CASE STUDY 7
DATA CENTER CONSOLIDATION AT GUARDIAN
LIFE
As one of the largest mutual life insurance firms in the United States,
Guardian Life (www.guardianlife.com) has more than 5000 employees and
over 3000 financial representatives in 80 agencies. Guardian and its
subsidiaries provide almost three million people with life and disability
income insurance, retirement services, and investment products such as
mutual funds, securities, variable life insurance, and variable annuities. The
company also supplies employee benefits programs to six million
participants, including life, health, and dental insurance, as well as qualified
pension plans. In addition to regional home offices in New York City;
Bethlehem, Pennsylvania; Spokane, Washington; and Appleton, Wisconsin,
the company has 55 remote sales offices and 80 remote agency offices.
Like other insurance companies, Guardian Life is an information
intensive organization where data processing and communications network
infrastructure have consistently been important contributors to its success.
Guardian Life’s IT organization has earned numerous accolades including
multiple CIO100 awards from CIO magazine [PRNE11]. According to Dennis
Callahan, Executive Vice President and Chief Information Officer for,
Guardian Life, "A strong partnership between IT and the businesses enables
http://www.guardianlife.com/
C7-2
Guardian to deliver cost-effective technology services that facilitate world-
class customer service, product innovation, and operational efficiency.”
Ensuring alignment between business and IT is important to Guardian Life
and provides a consistent theme for many of the insurance companies IT
projects including its data center consolidation initiatives [CIOZ12].
Data center consolidation has been an ongoing concern at Guardian for
more than a decade. Guardian’s IT governance structure is team-oriented
and the company’s data center consolidation initiatives are overseen by it
Infrastructure team. The Infrastructure team is primarily co-located in New
York, and Bethlehem, Pennsylvania but it has key support teams in Spokane,
Washington, Appleton, Wisconsin, and Pittsfield, Massachusetts.
Guardian Life began taking a serious look at data center consolidation in
2000, but in the aftermath of the September 11, 2001 terrorist attack,
Guardian also became more concerned with business continuity issues.
Guardian had four significant data centers, at its four home offices, but the
primary data center was in New York City. After 9/11, Guardian wanted
make infrastructure changes to ensure business continuity across its existing
data centers and made plans to add two more data centers to the mix.
Guardian performed an assessment of its data centers to provide a basis
for planning on the location of data processing resources. One surprising
outcome of this assessment had to do with utilization. The.
C9-1 CASE STUDY 9 ST. LUKES HEALTH CARE SYSTEM Hospitals have been .docxclairbycraft
C9-1 CASE STUDY 9 ST. LUKE'S HEALTH CARE SYSTEM Hospitals have been some of the earliest adopters of wireless local area networks (WLANs). The clinician user population is typically mobile and spread out across a number of buildings, with a need to enter and access data in real time. St. Luke's Episcopal Health System in Houston, Texas (www.stlukestexas.com) is a good example of a hospital that has made effective use wireless technologies to streamline clinical work processes. Their wireless network is distributed throughout several hospital buildings and is used in many different applications. The majority of the St. Luke’s staff uses wireless devices to access data in real-time, 24 hours a day. Examples include the following: • Diagnosing patients and charting their progress: Doctors and nurses use wireless laptops and tablet PCs to track and chart patient care data. • Prescriptions: Medications are dispensed from a cart that is wheeled from room to room. Clinician uses a wireless scanner to scan the patient's ID bracelet. If a prescription order has been changed or cancelled, the clinician will know immediately because the mobile device displays current patient data. C9-2 • Critical care units: These areas use the WLAN because running hard wires would mean moving ceiling panels. The dust and microbes that such work stirs up would pose a threat to patients. • Case management: The case managers in the Utilization Management Department use the WLAN to document patient reviews, insurance calls/authorization information, and denial information. The wireless session enables real time access to information that ensures the correct level of care for a patient and/or timely discharge. • Blood management: Blood management is a complex process that involves monitoring both patients and blood products during all stages of a treatment process. To ensure that blood products and patients are matched correctly, St. Luke’s uses a wireless bar code scanning process that involves scanning both patient and blood product bar codes during the infusion process. This enables clinicians to confirm patient and blood product identification before proceeding with treatment. • Nutrition and diet: Dietary service representatives collect patient menus at each nursing unit and enter them as they go. This allows more menus to be submitted before the cutoff time, giving more patients more choice. The dietitian can also see current patient information, such as supplement or tube feeding data, and view what the patient actually received for a certain meal. • Mobile x-ray and neurologic units: St. Luke’s has implemented the wireless network infrastructure necessary to enable doctors and clinicians to use mobile x-ray and neurologic scanning units. This makes it possible to take x-rays or to perform neurological studies in patient rooms. This minimizes the need to schedule patients for neurology or radiology lab visits. The mobile units also enable equipment to be brought to t.
C9-1 CASE STUDY 9 ST. LUKES HEALTH CARE SYSTEM .docxclairbycraft
C9-1
CASE STUDY 9
ST. LUKE'S HEALTH CARE SYSTEM
Hospitals have been some of the earliest adopters of wireless local area
networks (WLANs). The clinician user population is typically mobile and
spread out across a number of buildings, with a need to enter and access
data in real time. St. Luke's Episcopal Health System in Houston, Texas
(www.stlukestexas.com) is a good example of a hospital that has made
effective use wireless technologies to streamline clinical work processes.
Their wireless network is distributed throughout several hospital buildings
and is used in many different applications. The majority of the St. Luke’s
staff uses wireless devices to access data in real-time, 24 hours a day.
Examples include the following:
• Diagnosing patients and charting their progress: Doctors and
nurses use wireless laptops and tablet PCs to track and chart patient
care data.
• Prescriptions: Medications are dispensed from a cart that is wheeled
from room to room. Clinician uses a wireless scanner to scan the
patient's ID bracelet. If a prescription order has been changed or
cancelled, the clinician will know immediately because the mobile device
displays current patient data.
http://www.stlukestexas.com/
C9-2
• Critical care units: These areas use the WLAN because running hard
wires would mean moving ceiling panels. The dust and microbes that
such work stirs up would pose a threat to patients.
• Case management: The case managers in the Utilization Management
Department use the WLAN to document patient reviews, insurance
calls/authorization information, and denial information. The wireless
session enables real time access to information that ensures the correct
level of care for a patient and/or timely discharge.
• Blood management: Blood management is a complex process that
involves monitoring both patients and blood products during all stages of
a treatment process. To ensure that blood products and patients are
matched correctly, St. Luke’s uses a wireless bar code scanning process
that involves scanning both patient and blood product bar codes during
the infusion process. This enables clinicians to confirm patient and blood
product identification before proceeding with treatment.
• Nutrition and diet: Dietary service representatives collect patient
menus at each nursing unit and enter them as they go. This allows more
menus to be submitted before the cutoff time, giving more patients
more choice. The dietitian can also see current patient information, such
as supplement or tube feeding data, and view what the patient actually
received for a certain meal.
• Mobile x-ray and neurologic units: St. Luke’s has implemented the
wireless network infrastructure necessary to enable doctors and
clinicians to use mobile x-ray and neurologic scanning units. This makes
it possible to take x-rays or to perform neurological studies in patient
rooms. This min.
C361 TASK 2 2
C361 TASK 2 2
C361 Task 2
WGU
Evidence-Based Practice and Applied Nursing Research
C361
Eve Butler
July 28, 2019
Running head: C361 TASK 2 2
C361 Task 2
A.1 Healthcare problem
Worldwide estimates have shown that greater than 1.4 million patients have acquired nosocomial infections. Adherence to hand hygiene policies are shown to be the most effective way to help prevent these healthcare-associated infections; sadly research shows that healthcare workers have suboptimal compliance with their facilities hand hygiene policies due to lack of education and compliance monitoring. Patients in our healthcare settings are under the assumption that we are doing our best to promote their healing when in fact 7% of them will be subjected to a nosocomial infection with that rate climbing to 10% in developing countries (Finco et al., 2018).
A.2 Significance of the problem
The cost of care that is associated with nosocomial infections is estimated to be over ten billion dollars putting a burden on both patients and health organizations alike. It is estimated that 38% of all infections are caused by cross-contamination due to noncompliance with hand hygiene policies. These infections lead to approximately 99,000 deaths a year in the United States alone (Sickbert-Bennett et al., 2016).
A.3 Current healthcare practices related to the problem
Most healthcare facilities have an educational program that simply teaches how to achieve proper hand hygiene and use the WHO five moments of hand hygiene as their standard. However, this does not educate the healthcare workers on why it is important, nor does it address the far-reaching consequences for noncompliance. Along with the lack of foundational education, most facilities do not monitor for compliance.
A.4 How the problem affects the organization and patients’ cultural background
Inadequate hand hygiene leading to nosocomial infections can affect the organization's cultural background by leading to dissatisfaction in the workplace as staff becomes frustrated by their feelings of inadequacy and helplessness in dealing with patients getting sicker instead of better. The staff may also be feeling stress in the burden of caring for sicker patients. The patient's cultural background may be affected as they may be feeling despair or depression at their inability to get better, and some may feel it is punishment according to their cultural or religious beliefs.
B. Two research evidence sources and two non-research evidence sources considered
In searching for my research evidence sources, I start with the Western Governors University Library online. Once in the library, a boolean phrase was used, which allowed me to search for research articles that contain more than one topic in the same paper. Phrases I used in this search were “nosocomial infections,” “hand hygiene compliance,” and “ hand hygiene education.” With these phrases, thousands of articles were available to peruse.
One of the res.
C6-1 CASE STUDY 6 CHEVRON’S INFRASTRUCTURE EVOLUT.docxclairbycraft
C6-1
CASE STUDY 6
CHEVRON’S INFRASTRUCTURE
EVOLUTION
Chevron Corporation (www.chevron.com) is one of the world’s leading
energy companies. Chevron’s headquarters are in San Ramon, California.
The company has more than 62,000 employees and produces more than
700,000 barrels of oil per day. It has 19,500 retail sites in 84 countries. In
2012, Chevron was number three on the Fortune 500 list and had more than
$244 billion in revenue in 2011 [STAT12].
IT infrastructure is very important to Chevron and to better support all
facets of its global operations, the company is always focused on improving
its infrastructure [GALL12]. Chevron faces new challenges from increased
global demand for its traditional hydrocarbon products and the need to
develop IT support for new value chains for liquid natural gas (LNG) and the
extraction of gas and oil from shale. Huge investments are being made
around the world, particularly in Australia and Angola on massive projects of
unprecedented scale. Modeling and analytics are more important than ever
to help Chevron exploit deep water drilling and hydrocarbon extraction in
areas with challenging geographies. For example, advanced seismic imaging
tools are used by Chevron to reveal possible oil or natural gas reservoirs
beneath the earth’s surface. Chevron’s proprietary seismic imaging
http://www.chevron.com/
C6-2
technology contributed to it achieving a 69% discovery rate in
2011[CHEV12].
Supervisory Control and Data Acquisition (SCADA)
Systems
Chevron refineries are continually collecting data from sensors spread
throughout the facilities to maintain safe operations and to alert operators to
potential safety issues before they ever become safety issues. Data from the
sensors is also used to optimize the way the refineries work and to identify
opportunities of greater efficiency. IT controls 60,000 valves at Chevron’s
Pascagoula, Mississippi refinery; the efficiency and safety of its end-to-end
operations are dependent on advanced sensors, supervisory control and data
acquisition (SCADA) systems, and other digital industrial control systems
[GALL12].
SCADA systems are typically centralized systems that monitor and
control entire sites and/or complexes of systems that are spread out over
large areas such as an entire manufacturing, fabrication, power generation,
or refining facility. The key components of SCADA systems include:
Programmable logic units (PLCs) that and remote terminal units (RTUs)
connected to sensors that convert sensor signals to digital data and
send it to the supervisory system
A supervisory computer system that acquires data about the process
and sends control commands to the process
A human-machine interface (HMI) that presents process to the human
operators that monitor and control the process.
Process meters and process analysis instruments
Communication infrastructure connecting.
C125C126 FORMAL LAB REPORTFORMAL LAB REPORT, GeneralA f.docxclairbycraft
C125/C126 FORMAL LAB REPORT
FORMAL LAB REPORT, General
A formal lab report is required in conjunction with some of the experiments in each chemistry course. It is your chance to demonstrate to your professor or TA how well you understand the experiment and the chemical principles involved. A formal report is different than a term paper. It should be written in a scientific style, which is not the same style used for English or philosophy papers.
The keys to effective technical writing are organization, brevity, clarity, and an appreciation of the needs of the reader. You must write clearly and be thorough, but concise. Do not ramble. The best way to avoid rambling is to first prepare an outline of the report and stick to it. Always use complete sentences. Bulleted lists are okay in a lab notebook but are unacceptable in a formal report. Formal reports must be typed. Use 1.5 line spacing, 1-inch margins, 12 pt font and 8.5x11 inch paper. Only use third person, past tense. Also, proofread well.
The general structure of a formal lab report follows that of a scientific paper. It is:
Title and Author (s)
Introduction
Experimental Information
Data and Calculation
Results and Discussion
Conclusion
References
Results and discussion sections are combined into one single section. Different instructors may have specific formats that they want you to follow. You should always defer to the instructions given to you by your course. Presented here are general guidelines for writing formal lab reports and scientific papers.
Before writing your first report, visit the library and examine several journal articles. Pay close attention to the style of the prose and the contents of each particular section. Several common journals to investigate are:
The Journal of the American Chemical Society
The Journal of Physical Chemistry
Analytical Chemistry
Biochemistry
Initialed and dated laboratory notebook pages of the experiment must be submitted. While report sheets may be a joint effort, formal reports must be individually written. A schedule of reports and dates on which they are due is given in the course laboratory schedule. We highly recommend that reports be completed prior to the day of submission to allow time to proofread, and thus avoiding loss of points due to last minute problems. Lost data or the inability to print reports is not acceptable excuses for incomplete or missing reports. You will be informed when notebook pages will be collected before the report is due.
FORMAL LAB REPORT - Title and Author(s)
State the title of the experiment, your name, the date and your laboratory section number, if applicable. Also state the name of your lab partner(s). This information should be at the top of the first page.
FORMAL LAB REPORT – Introduction
The Introduction states the purpose of the study and introduces the reader with new ideas and topics. It also provides any background necessary to acquaint the read.
C10-1 CASE STUDY 10 CHOICE HOTELS INTERNATIONAL .docxclairbycraft
C10-1
CASE STUDY 10
CHOICE HOTELS INTERNATIONAL
Within the hospitality industry, there has traditionally been a division
between networks that serve guest functions and those that serve
operations and administration, both with respect to data transmission and
voice transmission. In recent years, most hotel and motel chains have
moved in the direction of consolidating multiple functions on networks that
used to be dedicated to one use. Tighter integration of voice and data and of
guest and operations/administration networking is a fast-growing trend.
Choice Hotels International (www.choice.com) is a good example of this
trend.
Choice Hotels International (NYSE: CHH) is one of the largest and most
successful lodging companies in the world. It franchises more than 6,100
hotels, representing more than 490,000 rooms, in the United States and
more than 30 countries and territories. The company's best known brands
include Comfort Inn, Comfort Suites, Quality, Sleep Inn, Clarion, Cambria
Suites, MainStay Suites, Suburban Extended Stay Hotel, Econo Lodge and
Rodeway Inn.
In-House Networking Functions
Choice supports two distinct networking functions. A central Web site
enables customers to reserve rooms at any Choice franchise
http://www.choice.com/
C10-2
accommodation. The central reservation system, known as Profit Manager,
automatically finds the most appropriate hotel based on location, price
range, or standard. Individual hotels also take bookings, so there needs to
be a way for hotels and the central system to remain synchronized.
Choice networks also support its franchisees. Choice is in fact a
relatively small company in terms of personnel (about 2000 employees) and
does not own or operate any hotels. All of the establishments under its brand
names are independently owned and pay Choice licensing fees and a royalty
on all sales. In return, they receive a variety of services, including
marketing, quality control, and inventory management. Many of these
services are offered via network, such as allowing managers to order
supplies online and check booking status. This support network is similar to a
corporate intranet but has a higher reliability requirement. The 6100 hotel
managers are, in effect, Choice's customers, not employees. Thus, the
standards for reliability and performance of the network are high.
In the late 1990s, Choice began to focus on providing a state-of-the-art
global reservation system. At this point, the synchronization of local and
online reservations was done manually. Each hotel provided Choice with a
fixed block of inventory to sell over the central reservation system, with an
average of 30% of capacity. Once that 30% was sold, Profit Manager listed
the hotel as fully booked, even though there might be plenty of rooms
available from the other 70%. The reverse problem also occurred: If the
local reservation system had so.
C11-1 CASE STUDY 11 CLOUD COMPUTING (IN)SECURITY .docxclairbycraft
C11-1
CASE STUDY 11
CLOUD COMPUTING (IN)SECURITY
Cloud computing is reshaping enterprise network architectures and
infrastructures. It refers to applications delivered as services over the
Internet as well as the hardware and systems software in data centers that
provide those services. The services themselves have long been referred to
as Software as a Service (SaaS) which had its roots in Software-Oriented
Architecture (SOA) concepts that began shaping enterprise network
roadmaps in the early 2000s. IaaS (Infrastructure as a Service) and PaaS
(Platform as a Service) are other types of cloud computing services that are
available to business customers.
Cloud computing fosters the notion of computing as a utility that can be
consumed by businesses on demand in a manner that is similar to other
services (e.g. electricity, municipal water) from traditional utilities. It has the
potential to reshape much of the IT industry by giving businesses the option
of running business software applications fully on-premises, fully in “the
cloud” or some combination of these two extremes. These are choices that
businesses have not had until recently and many companies are still coming
to grips with this new computing landscape.
Security is important to any computing infrastructure. Companies go to
great lengths to secure on-premises computing systems, so it is not
surprising that security looms as a major consideration when augmenting or
replacing on-premises systems with cloud services. Allaying security
C11-2
concerns is frequently a prerequisite for further discussions about migrating
part or all of an organization’s computing architecture to the cloud.
Availability is another major concern: “How will we operate if we can’t access
the Internet? What if our customers can’t access the cloud to place orders?”
are common questions [AMBR10].
Generally speaking, such questions only arise when businesses
contemplating moving core transaction processing, such as ERP systems,
and other mission critical applications to the cloud. Companies have
traditionally demonstrated less concern about migrating high maintenance
applications such as e-mail and payroll to cloud service providers even
though such applications hold sensitive information.
Security Issues and Concerns
Auditability is a concern for many organizations, especially those who must
comply with Sarbanes-Oxley and/or Health and Human Services Health
Insurance Portability and Accountability Act (HIPAA) regulations [IBM11].
The auditability of their data must be ensured whether it is stored on-
premises or moved to the cloud.
Before moving critical infrastructure to the cloud, businesses should do
diligence on security threats both from outside and inside the cloud
[BADG11]. Many of the security issues associated with protecting clouds
from outside threats are similar to those that have traditionally faced
.
C1-1 CASE STUDY 1 UNIFIED COMMUNICATIONS AT BOEING .docxclairbycraft
C1-1
CASE STUDY 1
UNIFIED COMMUNICATIONS AT BOEING
The Boeing Company (http://www.boeing.com/), headquartered in Chicago,
Illinois, is the world’s largest manufacturer of military aircraft and
commercial jetliners. Boeing has more than 159,000 employees working in
70 different countries who require effective communication to develop and
build some of the world’s most complex products using components from
more than 22,000 global suppliers.
The company’s workforce is one of the most highly educated in the
world. Most employees hold a college degree and many hold advanced
degrees. Collectively Boeing employees have very broad and deep
knowledge that can be harnessed to solve problems and design next
generation products.
Like many major corporations, Boeing has experienced an uptick in the
number of employees who work remotely or travel the majority of each work
week. Boeing’s engineers number in the thousands and are purposely
scattered worldwide to support the company’s global operations.
Boeing organizes its employees into work and project teams. Given the
company’s size and geographic footprint, many of Boeing work’s teams
include globally dispersed members. Engineers on the same team may be
separated by multiple time zones and thousands of miles. Time zone
differences and distance frequently present teams with communication
challenges when they are faced with time sensitive issues that must be
resolved quickly.
http://www.boeing.com/
C1-2
Additional communication issues are associated with the sheer breadth
and depth of Boeing’s knowledge base. When faced with questions about a
particular part included in one of Boeing’s new airliners, an engineer can be
challenged to identify the right person in the company to contact for
answers.
Collaboration Technologies
Boeing knows that continual innovation is important to its long term success.
It also recognizes that effective communication among its employees,
customers, and suppliers is an important enabler of continual innovation.
Boeing has traditionally relied on a variety of systems to facilitate
collaboration among its employees and business partners. As illustrated in
Figure C1-1a, Web conferencing, audio conferencing, desktop sharing, and
mobile voice and data services have been used by Boeing employees to
facilitate communication among geographically dispersed team members.
Historically, these capabilities have been provided by different third-party
providers who were selected on the basis of their ability to provide high-
quality communication services at competitive rates.
By the mid-2000s, Boeing had begun its migration toward unified
messaging and unified communications. At that time, instant messaging (IM)
was one of the more popular messaging services used Boeing employees. At
Boeing, IM has traditionally been supplemented by Web and audio
conferencing services as well as by de.
C09 07222011 101525 Page 88IT leader who had just been.docxclairbycraft
C09 07/22/2011 10:15:25 Page 88
IT leader who had just been hired and would be focused on developing a long-term IT
strategy for the company.
This chapter shows how to develop a strategy for your IT organization and avoid
getting overwhelmed with day-to-day issues. Many CIOs get caught up in tactical
issues and never take the time to establish a future strategy for the organization. The
process is not new or difficult, but many CIOs fail to devote the time to this area and
end up like Fred.
OVERVIEW
Developing an IT strategy is critical for IT leaders. Unless your organization has
developed an understanding of your future goals and objectives, you will not be
successful in leading it forward. In the same manner that you must first decide where
you want to live and build your dream house before engaging the architect and building
contractors, you need to develop a future strategy in order to successfully build your
IT organization.
This chapter is written for someone who has never developed an IT strategy in the
past or needs to revise an existing strategy to align with the company’s future direction.
We first review the methodology you can use to develop your strategy and then go
through the actual steps necessary to complete the strategy. It is important to note that
this is a collaborative process between the IT organization and its business partners. You
must actively engage them during the process and solicit their input during the
development of the strategy. The IT strategy should be considered a component of
an effective business strategy. Finally, we recommend that your strategy is a living
document that is updated on a regular basis to support the evolving nature of your
business. If you decide to enter a new market, offer new products or services, or change
your business model, the IT strategy must be revised to support the business.
IT STRATEGY METHODOLOGY
The methodology for creating your IT strategy consists of three steps, and development
of your improvement road map encompasses three critical elements, as shown in
Figure 9.1.
The first step is to understand the current state of the IT organization. Key questions
for determining current state include:
& Has the organization been successful in meeting the needs of the business?
& Are the relations between the IT organization and its business partners collaborative?
& Does the business feel that investments in the IT organization are providing the
desired benefits?
It is important to take an objective view of how the organization is operating today
and not assume that things are going great.
88 & Process
C
o
p
y
r
i
g
h
t
2
0
1
1
.
W
i
l
e
y
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r.
C053GXML 10192012 214425 Page 131cC H A P T E R.docxclairbycraft
C053GXML 10/19/2012 21:44:25 Page 131
c
C H A P T E R
5
Privacy and Cyberspace
Of all the ethical issues associated with the use of cybertechnology, perhaps none has
received more media attention than concern about the loss of personal privacy. In this
chapter, we examine issues involving privacy and cybertechnology by asking the
following questions:
� How are privacy concerns generated by the use of cybertechnology different from
privacy issues raised by earlier technologies?
� What, exactly, is personal privacy, and why is it valued?
� How do computerized techniques used to gather and collect information, such as
Internet “cookies” and radio frequency identification (RFID) technology, raise
concerns for personal privacy?
� How do the transfer and exchange of personal information across and between
databases, carried out in computerized merging and matching operations,
threaten personal privacy?
� How do tools used to “mine” personal data exacerbate existing privacy concerns
involving cybertechnology?
� Can personal information we disclose to friends in social networking services
(SNS), such as Facebook and Twitter, be used in ways that threaten our privacy?
� How do the use of Internet search engines and the availability of online public
records contribute to the problem of protecting “privacy in public”?
� Do privacy-enhancing tools provide Internet users with adequate protection for
their online personal information?
� Are current privacy laws and data protection schemes adequate?
Concerns about privacy can affect many aspects of an individual’s life—from
commerce to healthcare to work to recreation. For example, we speak of consumer
privacy, medical and healthcare privacy, employee and workplace privacy, and so forth.
Unfortunately, we cannot examine all of these categories of privacy in a single chapter. So
we will have to postpone our analysis of certain kinds of privacy issues until later chapters
in the book. For example, we will examine some ways that medical/genetic privacy issues
are aggravated by cybertechnology in our discussion of bioinformatics in Chapter 12, and
131
C053GXML 10/19/2012 21:44:25 Page 132
we will examine some particular employee/workplace privacy issues affected by the use
of cybertechnology in our discussion of workplace surveillance and employee mon-
itoring in Chapter 10. Some cyber-related privacy concerns that conflict with cyberse-
curity issues and national security interests will be examined in Chapter 6, where
privacy-related concerns affecting “cloud computing” are also considered. In our
discussion of emerging and converging technologies in Chapter 12, we examine
some issues that affect a relatively new category of privacy called “location privacy,”
which arise because of the use of embedded chips, RFID technology, and global
positioning systems (GPS).
Although some cyber-related privacy concerns are specific to one or more spheres or
sectors—i.e., employment, healthcare, and so f.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
By Marvin LeNoue, Tom Hall,Myron A. EighmyMarvin LeNoue .docx
1. By Marvin LeNoue, Tom Hall,
Myron A. Eighmy
Marvin LeNoue is an ABD doctoral
candidate in Occupational and Adult
Education at North Dakota State
University, Fargo, ND. He is currently
serving as an instructor at the University
of Oregon American English Institute,
Eugene, OR. His research interests
include technology-enhanced education
delivery and the use of educational
social software.
(Email: [email protected])
Tom Hall has an Ed. D. in Adult and
Higher Education from the University
of South Dakota. He is currently
serving as an Assistant Professor in the
Educational Leadership Program at
North Dakota State University, Fargo,
ND. His research interests include
adult education in the 21st Century, the
impact of different generational cohorts
in today's workplace, and community
education in rural America.
(Email: thomas.e. [email protected] edu)
Myron A. Eighmy is a professor and
program coordinator for the Education
Doctoral Program at North Dakota State
University. Research interests include
2. alternative delivery modes, learning
communities, and graduate student
self-efficacy.
(Email: [email protected])
Adult Education and the
Social Media Revolution
The advent of Web 2.0 and the spread of social software tools
havecreated new and exciting opportunities for designers of
digitally-medi-
ated education programs for adults. Whether working in fully
online, blended,
or face-to-face learning contexts, instructors may now access
technologies that
allow students and faculty to engage in cooperative and
collaborative learning
despite being separated in space and time. By supporting the use
of interactive
methods and multi-media materials, social software offers
educators more ways
to engage learners than any preceding educational technology.
Social software
also empowers curriculum designers to more effectively
accommodate many
of the core principles of adult learning than was possible with
earlier e-learning
technologies. This article offers a basic introduction to some
new possibilities
in the design and delivery of digitally-mediated education, and
an overview of
the compatibility between the capabilities of social software and
the principles
of adult education.
Digitally Mediated Learning
3. Self-directed learning is largely unconstrained in terms of time
and
location and has traditionally been a primary affordance of
distance education
(Holmberg, 1995). From its inception, distance education has
been marketed
as a solution for adults whose occupational, social, and/or
family commitments
limit their ability to pursue educational goals (Holmberg). In
the decades since
the 1970s, demand for distance programs has increased as the
globalization
of national economies creates a competitive atmosphere that
drives people to
become life-long learners in order to be successful in the
workplace (Merriam,
Caffarella, & Baumgartner, 2007).
For many people, the term distance education now conjures up
images of
computers, the Internet, and online learning. In fact, with
advances in mobile
technology, the delineation between computers and various
other electronic
devices (e.g. mobile phones, music players, personal digital
assistants, digital
tablets) is blurring, and what was once termed e-learning or
computer-mediated
learning has become more commonly referred to as digitally
mediated learning
(DML). This term implies that a medium for learning is
provided by digital
technology of some sort, and that interaction between
participants and between
participants and learning materials is not direct but rather
4. carried out through
the technology (Grudin, 2000). The use of networked devices,
local networks,
and the Internet is a key facet of DML, and online networked
technologies
are the delivery systems of choice for distance education
offerings (Allen &
Seaman, 2006).
The accessibility and convenience of online DML is positioning
the online
environment as the primary context for adult/post-secondary
education and
training in general (Allen & Seaman, 2007; Kim & Bonk, 2006;
McLoughlin
& Lee, 2007). A Sloan Foundation study of more than 2,500
colleges and
universities found online enrollments growing substantially
faster than overall
higher education enrollment, and the 17% growth rate in online
enrollments
A 4 Adult Learning
far exceeds the 1.2% growth rate in the overall higher
education population (Allen & Seaman, 2010). Allen and
Seaman classified an online course as one in which more
than 80% of content is delivered online and reported that
over 4.6 million students were taking such courses during
the fall 2008 term.
Whether working in fully online, blended, or face-
to-face learning contexts, instructors may now
access technologies that allow students and
5. faculty to engage in cooperative and collaborative
learning despite being separated in space and
time.
There has also been a trend toward the use of blended
learning or approaches that combine online and face-to-
face delivery modes. As part of efforts to enrich students'
learning experience, maximize efficiencies in time and
facilities use, and enhance program marketability, many
institutions are increasing their offerings of blended
courses (Mossavar-Rahmani & Larson-Daugherty, 2007).
This method is becoming increasingly common in K-12,
higher education, corporate, healthcare, and governmental
training settings (Allen, Seaman, & Garrett, 2007; Bonk,
Kim, & Zeng, 2005; Watson, 2008). The overall result is a
blurring of the boundaries between traditional classifica-
tions of instructional approaches. Palloff and Pratt (2007)
comment on the changes that digitally-mediated delivery
has wrought on our definition of distance learning:
Today we know that distance learning takes
several forms, including fully online courses,
hybrid or blended courses that contain some face-
to-face contact time in combination with online
delivery, and technology-enhanced courses,
which meet predominantly face-to-face but in-
corporate elements of technology into the course,
(p. 3)
A future is visible in which schooling is dominated by
delivery models that feature multiple instructional modes
fluidly combined within the affordances of technology-
enhanced delivery and interaction (Bonk, 2009; Kim &
Bonk, 2006). The scalability of these delivery models
allows for the design of courses that can accommodate
larger numbers of participants than has ever been possible
6. in the past (Siemens & Downes, 2008). As experience with
the operation of mega-universities demonstrates, these
models combine human, technological, and organizational
I
aspects in a powerful way (Daniel, 2003). Technology-
enhanced delivery revolutionizes education by offering
greatly expanded access to quality educational resources
delivered at a much lower per-student cost (Daniel, 2003;
Jung, 2005).
The Social Media Revolution
Designers of online education have tended
toward an emphasis on constructivist models
of education, with a focus on skills considered
to be essential in a knowledge-based economy,
including knowledge construction, problem-
solving, collaborative learning, critical thinking,
and autonomous learning (Bates, 2008; Sanchez,
2003). There is a need for delivery systems that
can maximize learner independence and freedom
by supporting open-enrollment and self-paced
learning while providing the capabilities for com-
munication and collaboration demanded by constructivist
pedagogies (Anderson, 2005).
Learning management systems (LMS) that integrate
geographically dispersed learners in asynchronous educa-
tional interactions have been widely available for several
years. However, they tend to be institution- and content-
centric, lacking in support for the affordances that lead
to the establishment of flattened communication networks
and collaborative information flows (Dalsgaard, 2006;
7. Siemens, 2004), An LMS is well suited for managing
student enrollment, exams, assignments, course descrip-
tions, lesson plans, messages, syllabi, and basic course
materials. However, these systems are developed for
the management and delivery of learning, not for sup-
porting the self-governed and problem-based activities
of students. Therefore, an LMS does not easily support
a social constructivist approach to digitally-mediated
learning. It is necessary to move beyond learning man-
agement systems to engage students in active use of the
web itself as a resource in self-governed, problem-based
and collaborative activities (Dalsgaard, 2006).
Web 2.0 technology can facilitate this move. This tech-
nology consists of Internet applications (small software
tools that can deliver active and interactive content to
a browser window) that support interaction between
mobile devices and the Internet, and allow interactivity
between the user, the web, and the tool itself (O'Reilly,
2005). These applications have provided Internet users
with the ability to easily create, contribute, communicate,
and collaborate in the online environment without need
for specialized programming knowledge. Applications of
this type have become known as social media or social
software. Comprised of a suite of tools that can support
5 A
learner choice and self-direction (McLoughlin & Lee,
2007), social software can be used to create open-ended
learning environments that provide multiple possibilities
for activities, and surround the student with different
tools and resources which support the problem-solving
process (Dalsgaard, 2006; Land & Hannafin, 1996).
8. Anderson (2008) referred to social software technology
as a new genre of distance education software emerging
from the intersection between earlier technologies that
generally support delivery and engagement with content,
and new interactive technologies that support multimodal
digitally-mediated human communication.
Social software can "create opportunities for radically
new conceptions of independence and collaboration in
distance education" (Anderson, 2008, p. 169).
Social software takes many forms, encompassing but
not limited to (a) groupware, (b) internet forums, (c) online
communities, (d) RSS feeds, (e) wikis, (f) tag-based folk-
sonomies, (g) podcasts, (h) e-mail, (i) weblogs, (j) virtual
worlds, (k) social network sites, (1) instant messaging,
texting, and microblogging; (m) peer-to-peer media-shar-
ing technologies, and (n) networked gaming (boyd, 2008;
Greenhow, Robelia, & Hughes, 2009; McLoughlin & Lee,
2007). Well-known applications include Google Groups,
Wikipedia, MySpace, Facebook, YouTube, Second Life,
Flickr, and Twitter. The use of social software centers on
contacts between people (Shirky, 2003). Social software
supports fluid interaction among people, and between
people and data, that may lead to the creation of user-
generated online content (boyd, 2007).
Among social media, social network sites (SNS)
are particularly useful in digitally-mediated education
delivery. SNS are defined by boyd & Ellison (2007) as
web-based services that allow individuals to (a) construct
a public or semi-public profile within a bounded system,
(b) articulate a list (network) of other users with whom
they share a connection, and (c) view and traverse their
list of connections and those made by others within
the system. Although SNS users may be able to meet
9. strangers online and make connections that would not
have been made otherwise, this networking function is
not the primary feature of these sites. The unique aspect
of an SNS is that it allows users to articulate and make
visible their social networks (boyd & Ellison, 2007).
In educational contexts, articulation and visibility may
recede in importance, giving way to other common SNS
features including (a) a suite of associated social media
tools that support interaction, communication, and col-
laboration, (b) provisions for the storage and display of
audio and video media, and (c) hosting for customizable
personal profile pages that support the establishment and
maintenance of individual presence in the online learning
environment. A well-designed SNS offers course partici-
pants multi-modal and multi-media communication and
content delivery capabilities that facilitate and stimulate
broad and dense interaction patterns, collaborative in-
formation discovery and processing, and multiple-style
learning opportunities.
Andragogy and the Internet Age
An array of technological media can be an ideal
educational tool when correctly deployed within effective
instructional designs. However, instructors working in
technology-enhanced learning environments must under-
stand that it does not replace good teaching (Stammen &
Schmidt, 2001). To maximize learning, instructors must
be able to accommodate the needs of a student population
that is becoming more and more diverse due to factors
including increased access to learning, lifelong learning
pursuits, recertification needs, immigration, longer
life spans, and better course marketing (Bonk, 2009),
Instructors also need to be equipped to meet the demands
of teaching in an age when "the Internet is, inexorably,
10. becoming the dominant infrastructure for knowledge -
both as a container and as a global platform for knowledge
exchange between people" (Tapscott & Williams, 2010,
para. 6).
Trainers and educators today will encounter cohorts
of learners who have come of age in the presence of the
Internet. They make up what Tapscott (1999) termed as
the net generation, and are "forcing a change in the model
of pedagogy, from a teacher-focused approach based on
instruction to a student-focused model based on collabo-
ration" (Tapscott, 2009, p. 11). Students today want to
participate in the learning process; they look for greater
autonomy, connectivity and socio-experiential learning,
have a need to control their environments, and are used
to instant connectivity and easy access to the staggering
amount of content and knowledge available at their fin-
gertips (Johnson, Levine, & Smith, 2009; McLoughlin &
Lee, 2007; Oblinger, 2008; Tapscott, 2009).
A world increasingly characterized by high digital
connectivity and a need for life-long, demand-driven
learning calls for the development of andragogies
(Knowles, 1980) specialized to DML environments. In
a context of limitless access to information, instructors
must take on the role of guides, context providers, and
quality controllers while simultaneously helping students
make their own contributions to content and evaluations
of the learning experience (Prensky, 2009). Palloff and
Pratt (2007) note that "In effective online learning, the in-
structor acts as a facilitator, encouraging students to take
A 6 Adult Learning
11. charge of their own learning process" (p. 125). Quality
online instruction will include learners as active partici-
pants or co-producers rather than passive consumers of in-
structional content, and frame learning as a participatory,
social process intended to support personal life goals and
needs (McLoughlin & Lee, 2007; Tapscott & Williams,
2010).
Social Software and Adult Education
The ideals of quality online education as noted
above can be seen to mesh well with the basic principles
of effective adult education. Drawing on the work of
Knowles (1980), Knowles, Holton, and Swanson (2005),
Tough (1979), Mezirow (1991 ), and MacKeracher (2004),
some of the primary principles of adult education can be
summarized:
• Adults develop readiness to learn as they experience
needs and interests within their life situations.
• Adult learners in general are autonomous individuals
capable of identifying their personal learning needs
and planning, carrying out, and assessing learning
activities.
• Adults have a need to be self-directing in their
learning processes.
• In adult education, the teacher should be positioned
as a facilitator engaged in a process of mutual
inquiry rather than as a transmitter of knowledge.
• Relationships and collaborations with others make
important contributions to the adult learning process.
12. • Adults learn throughout their lifetime and engage in
many informal learning projects outside of educa-
tional institutions and programs.
• Individual differences among people increase with
age; therefore, adult education must make optimal
provision for differences in style, time, and pace of
learning.
• Adults bring life experience and prior learning
to bear on current learning projects.
"As individuals mature, their need and capacity to
be self-directing, to use their experience in learning, to
identify their own readiness to learn, and to organize
their learning around life problems increases steadily"
(Knowles et al., 2005, p. 62). Adults learn most effectively
when new knowledge, understandings, skills, values, and
attitudes are presented in the context of application to
real-life situations (Knowles et al.). Thus, the problem-
based, constructivist, collaborative approaches to learning
that have become prevalent in online education delivery
are suitable to adult learning styles (Knowles et al.;
Merriam et al., 2007; Palloff & Pratt, 2003; Täte, 2004).
Adults generally adapt well to active roles as co-creators
of the instructional process; they learn best when they
(a) have a role in selecting content and developing the
learning experience, and (b) are able to build immediate
relevance between learning activities and the necessities
of their daily lives (Knowles, 1980; Täte, 2004).
Open-ended learning environments built on the af-
fordances of the Web itself allow for self-direction and
individualized adaptation/creation of content and in-
struction, while social software use is often centered on
13. collaboration. For an example, social bookmarking and
tagging tools like Delicious allow learners to develop
and share personalized resource sets, while tools such as
Google Docs, Wikispaces, and VoiceThread are expressly
designed to support collaborative work by allowing
multiple users to work together either synchronously or
asynchronously in the creation of text documents, slide-
shows, spreadsheets, and audio/video productions.
For adults, learning is an interactive phenomenon,
not an isolated internal process (Jarvis, 2006). Adult
learners generally value learning as a way to meet a
need for associations and friendships. They need regular
feedback from peers and instructors, and readily involve
others in their learning projects (Billington, 1996; Lieb,
1991; Merriam et al., 2007; Zemke & Zemke, 1984).
Connection, interaction, and dialogue can be considered
crucial elements of the adult learning context. These
are also primary aspects of community membership,
implying that adult learners are predisposed to favor work
and study as members of a community. It is now clear
that learners build and maintain communities of learning
in online environments by engaging in many of the
processes and behaviors associated with offline commu-
nities (Haythornthwaite, Kazmer, Robins, & Shoemaker,
2004; Kazmer, 2000). These processes and behaviors
include (a) sharing common meeting places and histories
(e.g. course discussion boards or chat rooms), (b) support-
ing common goals and commitment to the purposes of
the community, (c) establishing identity and membership
markers and rituals, (d) taking positions iñ hierarchies of
expertise, and (e) socially constructing rules and behaviors
(Haythornthwaite et al., 2004).
Ongoing interaction is the foundational theme
underlying all of these community-building behaviors.
14. The media chosen by instructors as the main means
of contact for the class will play the dominant role in
establishing and shaping the interactions among all
class members (Haythornthwaite & Bregman, 2004).
Successful course designs for adult online learning will
deploy tools and activities that facilitate and encourage
interaction (Billington, 1996; Hill, 2001). To this end, a
class social network site built on a platform such as Ning,
7 A
ELGG, or Social Media Classroom, can provide a virtual
community space where participants can meet and take
part in various formal and informal interactions centered
on shared learning objectives. This type of social space
can be a positive component of an online course (Palloff
& Pratt, 2003), and can encourage the development of the
object-centered social structures (Engstrom, 2005) that
arise naturally around the content, activities, and learning
objectives that constitute the commonalities shared by
course participants. Along with providing personal profile
pages that afford the establishment of emotional and
cognitive presence in the online environment (Dalsgaard,
2008; Garrison & Anderson, 2003; Rovai, Ponton, &
Baker, 2008), an SNS will commonly include useful com-
munication tools such as chat rooms, discussion boards,
support for blogging, and private messaging capabilities,
all of which empower extensive interaction.
A varied set of presentation tools can support dense
interaction, and allow participants to establish what
Haythomthwaite and Bregman (2004) referred to as
visibility in the online learning environment. From the
available means of communication, participants must
15. choose the mediums through which they will present
themselves to others in the community. More options
mean more opportunities for all participants. According
to Haythomthwaite & Bregman (2004), it is "important
when supporting collaborative activity to provide multiple
means of communication so that individuals and subgroups
within the full set of participants can use means that suit
their needs and preferences" (p. 137). Adult learners have
fully-developed personas, and are facile and diverse in
their use of self-expression to negotiate social interactions
(Knowles, 1980; Merriam et al., 2007). They will readily
make use of alternative modes of individual expression
including choice in the design of personal pages or spaces,
the ability to produce and display digital photographs and
art forms, the capability to play and share music, and so
forth. Instructors must also go beyond text to make use
of all available tools and delivery modalities as appropri-
ate to content and context. Meeting the requirement for
providing a diverse set of tools for expression, communi-
cation, and content delivery will help ensure a successful
experience for adult online learners.
Informal learning happens naturally in numerous
and varied places in the lives of adults as they engage
in a wide variety of activities to satisfy needs or provide
solutions in everyday life (Merriam et al., 2007). Adults
are capable of independently choosing and constructing
their own learning experiences in whole or part, and often
prefer to do so (Knowles et al., 2005; Zemke & Zemke,
1984). They are self-motivated to engage in the learning
process to the extent that the learning will help them
perform tasks or deal with problems that they confront in
their life situations (Knowles et al., 2005). Therefore, in-
structional designs for digitally-mediated learning should
exploit the adult propensity for self-directed informal
16. learning. This can be accomplished by offering dynamic
learning environments where students may go beyond
content presented by the instructor to explore, interact
with, comment on, modify, and apply the set content and
additional content they discover or create through the
learning process (Reynard, 2007).
Dynamic learning environments can be constructed
from suites of social software tools by instructors
working within the Personal Learning Environment
(PLE) paradigm. In general, PLEs are digitally-mediated
front-ends, or what may be thought of as dash-boards or
homepages, that serve as organizers and access points
through which students interact with an online informa-
tion cloud that offers nearly infinite resources for knowl-
edge-building and training of all sorts. Workable PLEs
can be built upon individual participant profile pages on a
class social network site, or around blogs/web pages such
as those offered by Word Press or Blogger. Another pos-
sibility is the use of the online portfolio concept, as with
Digication, online educational software that combines
elements of e-Portfolios and learning networks.
An important characteristic of mature learners is the
wealth of life experience that they bring to the learning
process (Knowles, 1980; Knowles et al., 2005; Merriam et
al., 2007). While this experience is the richest resource for
their learning, it is also a source of mental habits, biases,
and presuppositions that tend to make it difficult for adults
to open up to new ideas, fresh perceptions, and alternative
ways of thinking (Knowles et al.). Mature learners may
be resistant to the use of new technologies. They may also
simply lack experience, skill, or access. Even younger
students, those generalized as the net generation, should
not be presumed to be fluent in the tools and techniques
needed to take advantage of social software-powered
17. online learning (Vaidhyanathan, 2008). Although many
desirable social software tools are very easy to learn and
use, instructors must be ready with systems of support and
plans for scaffolding that will help all course participants
get the maximum benefit from the learning opportunities
being presented. While this may initially seem to be a
substantial downside to deploying these new online tools,
any negative effect is easily outweighed by the secondary
learning represented by gaining proficiency in the use of
the technology tools that are becoming prominent and
permanent fixtures in modem life.
As an indication of their accessibility, consider the
A 8 Adutt Learning
fact that social software tools have literally swept over
the online world, in the span of a few short years coming
into worldwide use by hundreds of millions of people of
all ages. This is a phenomenon of deep import for the way
people live, learn, and work. The power of social software
is concisely reflected in boyd's (2008) comment that it
has "affected how people interact with one another and,
thus, it has the potential to alter how society is organized"
(p. 93). In net-infused societies, new communities are
being created that are native to the new social software
technologies. Accessing these new communities requires
a new form of online education in which educators are
challenged to create and sustain learning opportunities
that leverage the learning affordances speciflc to the
technologies upon which these communities are built
(Anderson, 2008).
Conclusion
18. Technology now offers the potential for customiza-
tion of the learning process to the needs of each student
(Reynard, 2007) and for accommodation of any adult
learning style. The course interface in an internet-based
class is a portal to a literally inñnite expanse of material
and opportunities, and a correctly designed course will
leverage this fact by including a variety of elements that
mix formal, informal, and information-based models of
learning (Palloff & Pratt, 2007; Russell, 1999). Social
software tools empower students and instructors to
interact with, and within, the online environment, and
efflciently use and beneflt from the wealth of resources
available in that environment. The flexibility and adapt-
ability of social software applications are driving new
paradigms in digitally mediated education delivery and
have the potential to support organized approaches to
life-long learning.
Teaching in a digital world calls for expansion of the
vision of andragogy. In this new vision, learners actively
create their own learning process rather than passively
consume content, and realize learning as a participatory,
life-long social process embarked upon in support of in-
dividual goals and needs (McLoughlin & Lee, 2007). The
use of social software applications in digitally-mediated
education delivery encourages collaboration, while sup-
porting self-direction and individuation. In contrast to
standard content management systems that are teacher/
institution centric and emphasize content handling and
two-way communication (Siemens, 2004), social software
offers increased opportunities for interactivity and a dis-
tributed web of communication paths. In this way, social
software fosters interaction, a sense of community, and
group motivation. Connection and dialogue are supported.
19. offering the potential for transformation and lifelong
competence development (Marenzi, Demidova, Nejdl,
Olmedilla, & Zerr, 2008). Transformation and lifelong
learning are core ideals of the practice of adult education.
Proper use of Web 2.0 technologies and social media can
contribute to the achievement of these ideals in the design
and delivery of digitally-mediated adult learning.
References
Allen, I. E., & Seaman, J. (2006, November). Making the
grade: Online education in the United States, 2006.
Needham, MA: Sloan-C. Retrieved December 9,
2010, from http://sloanconsortium.org/publications/
survey/index, asp
Allen, I. E., & Seaman, J. (2007, October). Online
nation: Five years of growth in online learning.
Retrieved December 9, 2010, from http://sloancon-
sortium.org/publications/survey/index.asp
Allen, I. E., & Seaman, J. (2010, January). Learning
on demand: Online education in the United States,
2009. Retrieved December 9, 2010, from http://
sloanconsortium.org/publications/survey/index.asp
Allen, I. E., Seaman, J., & Garrett, R. (2007, March).
Blending in: The extent and promise of blended
education in the United States. Retrieved December
9, 2010, from http://sloanconsortium.org/publica-
tions/survey/i ndex. asp
Anderson, T (2005). Distance learning - social
software's killer ap? Retrieved December 9, 2010,
from http://auspace.athabascau.ca:8O8O/dspace/
handle/2149/2328
20. Anderson, T. (2008). Social software technologies in
distance education: Maximizing learning freedoms.
In T. Evans, M. Haughey, & D. Murphy (Eds.),
International handbook of distance education
(pp. 167-184 ).West Anglia, UK: Emerald Group
Publishing.
Bates, T. (2008). Transforming distance education
through new technologies. In T. Evans, M. Haughey,
& D. Murphy (Eds.), International handbook of
distance education (pp. 217-235 ). West Anglia, UK:
Emerald Group Publishing Limited.
Billington, D. D. (1996). Seven characteristics of
highly effective adult learning programs. Retrieved
December 9, 2010, from www.uwex.edu/erc//Word/
SevenCharacteri sties .doc
Bonk, C. J. (2009). The world is open: How technology
is revolutionizing education. San Francisco, CA:
Jossey-Bass.
9 A
Bonk, C , Kim, K., & Zeng, T (2005). Future direc-
tions of blended learning in higher education and
workplace learning settings. In P. Kommers & G.
Richards (Eds.), Proceedings of World Conference
on Educational Multimedia, Hypermedia and
Telecommunications 2005 (pp. 3644-3649),
Chesapeake, VA: AACE. Retrieved December 9,
2010, from http://www.editlib.Org/p/20646
21. boyd, d. (2007), The significance of social software.
Retrieved December 9, 2010, from http://www.
danah.org/papers/
boyd, d. (2008). Taken out of context: American teen
sociality in networked publics. Unpublished doctoral
dissertation. University of California-Berkeley,
School of Information. Retrieved December 9, 2010,
from http://www.danah.org/papers/
boyd, d. m., & Ellison, N. B. (2007). Social network
sites: Definition, history, and scholarship. Journal
of Computer-Mediated Communication, 13{).
Retrieved December 9, 2010, from http://jcmc.
indiana.edu/voll3/issuel/boyd.ellison.html
Dalsgaard, C. (2006, December 7), Social software:
E-Iearning beyond learning management sys-
tems. European Journal of Open, Distance and
E-Learning. Retrieved December 9, 2010, from
http://www.eurodl.org
Dalsgaard, C. (2008, June). Social networking sites:
Transparency in online education. ENUIS 2008
Proceedings, Arhus, Denmark, June 24-27, 2008.
Retrieved December 9, 2010, from http://eunis.dk/
papers/p41.pdf
Daniel, J. S. (2003, November). Mega-universities =
Mega-impact on access, cost and quality. Keynote
address presented at the Eirst Summit of Mega-
universities, Shanghai, PRC. Retrieved December 9,
2010, from http://portal.unesco.org
Engstrom, J. (2005, April 13). Why some social network
services work and others don't- Or: the case for
22. object-centered sociality [blog post]. Retrieved
June 30, 2010, from http://www.zengestrom.com/
blog/2005/04/why_some_social.html
Garrison, D. R., & Anderson, T. (2003). E-learning in
the 21st century [Questia Media online version].
Retrieved December 9, 2010, from http://www.
questia.com/Index.jsp
Greenhow, C , Robelia, B., & Hughes, J. E. (2009).
Learning, teaching, and scholarship in a digital age:
Web 2.0 and classroom research: What path should
we take novjl Educational Researcher, 38{A), 246-
259. doi: 10.3102/0013189X09336671
Grudin, J. (2000). Digitally mediated interaction:
Technology and the urge system. In G. Hatano, N.
Okada & H. Tanabe (Eds.), Affective minds: The
13th Toyota Conference (pp. 159-167). Amsterdam,
The Netherlands: Elsevier Science B. V.
Haythornthwaite, C , & Bregman, A. (2004).
Affordances of persistent conversation: Promoting
communities that work. In C. Haythornthwaite & M.
M. Kazmer (Eds.), Learning, culture, and commu-
nity in online education: Research and practice (pp.
129-143). New York, NY: Peter Lang Publishing.
Haythornthwaite, C , Kazmer, M. M., Robins, J., &
Shoemaker, S. (2004). Community development
among distance learners: Temporal and technologi-
cal dimensions. In C. Haythornthwaite & M. M.
Kazmer (Eds.), Learning, culture, and community in
online education: Research and practice (pp. 35-57).
New York, NY: Peter Lang Publishing.
23. Hill, J. R. (2001). Building community in web-based
learning environments: Strategies and techniques.
Retrieved December 9, 2010, from http://ausweb.
scu.edu.au/awOl/papers/refereed/hill/paper.html
Holmberg, B. (1995). Theory and practice of distance
education. New York, NY: Routledge.
Jarvis, P. (2006). Towards a comprehensive theory of
human learning. New York, NY: Routledge/Falmer
Près.
Johnson, L., Levine, A., & Smith, R. (2009). The 2009
Horizon Report. Retrieved December 9, 2010, from
http://www.nmc.org/publications/2009-horizon-
report Perspectives on distance education: Lifelong
learning and distance higher education (pp. 79-95).
Retrieved December 9, 2010, from http://unesdoc.
unesco.org/images/0014/001412/141218e.pdf
Kazmer, M. M. (2000). Coping in a distance environ-
ment: Sitcoms, chocolate cake, and dinner with a
friend. First Monday, 5(9). Retrieved December 9,
2010, from http://firstmonday.org/
Kim, K. J., & Bonk, C. J. (2006). The future of online
teaching and learning in higher education: The
survey says... EDUCAUSEQuarterly, 29(4).
Retrieved December 9, 2010, from http://www.
educause.edu
Knowles, M. S. (1980). The modern practice of adult
education: From pedagogy to andragogy (2nd ed.).
New York, NY: Cambridge Books.
Knowles, M. S., Holton, E. F., & Swanson, R. A. (2005).
24. The adult learner: The definitive classic in adult
education and human resource development. San
Diego, CA: Elsevier Inc.
A 1 0 Adult Learning
Land, S. M., & Hannafin, M. J. (1996). A conceptual
framework for the development of theories-in-action
with open-ended learning environments. Educational
Technology Research and Development, 44(3),
37-53. Retrieved December 9, 2010, from http://
www.aect.org/Intranet/Publications/index.asp
Lieb, S. (1991, Fall). Principles of adult learning. Vision.
Retrieved December 9, 2010, from http://honolulu.
hawaii.edu/intranet/committees/FacDevCom/
gu idebk/teachtip/adu 1 ts-2. htm
MacKeracher, D. (2004). Making sense of adult learning
(2nd ed.). Toronto, Canada: University of Toronto
Press.
Marenzi, I., Demidova, E., Nejdl, W., Olmedilla, D., &
Zerr, S. (2008). Social software for lifelong compe-
tence development: Challenges and infrastructure.
Internationaljournal of Emerging Technologies in
Learning, 3, 18-23. Retrieved December 9, 2010,
from http://www.online-journals.org/i-jet
McLoughlin, C , & Lee, M. J. W. (2007). Social software
and participatory learning: Pedagogical choices
with technology affordances in the Web 2.0 era. In
R. J. Atkinson, C. McBeath, S. K. A. Soong, & C.
Cheers (Eds.), ICT: Providing choices for learners
25. and learning. Proceedings of ASCILITE, Singapore
2007. Retrieved December 9, 2010, from http://
www.ascilite.org.au/conferences/singapore07/procs/
mcloughlin.pdf
Merriam, S. B., Caffarella, R. S., & Baumgartner, L. M.
(2007). Learning in adulthood. San Francisco, CA:
Jossey-Bass.
Mezirow, J. (1991). Transformative dimensions of adult
learning. San Francisco, CA: Jossey-Bass.
Mossavar-Rahmani, F., & Larson-Daugherty, C. (2007).
Supporting the hybrid learning model: A new
proposition. MERLOT Journal of Online Learning
and Teaching, i ( l ), 67-78. Retrieved December 9,
2010, from http://jolt.merlot.org/
Oblinger, D. G. (2008, March). Growing up with
Google: What it means to education. In Emerging
technologies for learning. 3, pp. 11-29. Retrieved
December 9, 2010, from http://www.becta.org.uk/
O'Reilly, T (2005, September). What is web 2.0: Design
patterns and business models for the next generation
of software [Weblog post]. Retrieved July 8, 2009,
from http://oreilly.com/pub/a/web2/archive/what-is-
web-20.html?page=l
Palloff, R. M., & Pratt, K. (2003). The virtual student:
A profile and guide to working with online learners.
San Francisco, CA: Jossey-Bass.
Pallof, R. M., & Pratt, K. (2007). Building online learn-
ing communities: Effective strategies for the virtual
26. classroom. San Francisco, CA: Jossey-Bass.
Prensky, M. (2009). H. Sapiens digital: From digital
immigrants and digital natives to digital wisdom.
Innovate Journal of Online Education, 5(3).
Retrieved December 9, 2010, from http://innovateo-
nline.info/
Reynard, R. (2007, May). Hybrid learning: Challenges
for teachers. THE Journal. Retrieved December 9,
2010, from http://thejournal.com
Rovai, A. P , Ponton, M. K., & Baker, J. D. (2008).
Distance learning in higher education: A program-
matic approach to planning, design, instruction,
evaluation, and accreditation. New York, NY:
Teachers College Press.
Russell, M. (1999). Online learning communities:
Implications for adult learning. Adult Learning, 10,
28.
Sanchez, F. (2003). Skills for a knowledge-based econ-
omy. Leadership, 33(2), 30-33. Retrieved December
9, 2010, from http://www.bnet.com/
Shirky, C. (2003, March). Social software and the
politics of groups [Weblog post]. Retrieved July
25, 2008, from http://www.shirky.com/writings/
group_politics.html
Siemens, G. (2004, November 22). Learning
Management Systems: The wrong place to start
learning. Elearnspace. Retrieved December 9, 2010,
from http://www.eleamspace.org/Articles/index.htm
27. Siemens, G., & Downes, S. (2008). Connectivism and
connective knowledge: A rather large open online
course... Retrieved December 9, 2010, from http://
ltc.umanitoba.ca/connectivism/
Stammen, R. M., & Schmidt, M. A., (2001, November).
Basic understanding for developing distance educa-
tion for online instruction. NASSP Bulletin, 55(628),
47-50.
Tapscott, D. (1999). Growing up digital. New York, NY:
McGraw-Hill.
Tapscott, D. (2009). Grown up digital. New York, NY:
McGraw-Hill.
Tapscott, D., & Williams, A. D. (2010). Innovating the
21st-century university: It's time! EDUCAUSE
Review, 45(1), 16-29. Retrieved December 9, 2010,
from http://www.educause.edu/er
Täte, M. L. (2004). Sit and get won't grow dendrites:
20 professional learning strategies that engage the
adult brain. Thousand Oaks, CA: Corwin Press.
11 A
Tough, A. (1979). The adult's learning projects: Afresh
approach to theory and practice in adult learning
(2nd ed.). Toronto, Canada: Ontario Institute for
Studies in Education.
Vaidhyanathan, S. (2008, September 19). Generational
myth. The Chronicle of Higher Education. Retrieved
28. December 9, 2010, from http://chronicle.com/free/
v55/i04/04b00701.htm
Watson, J. (2008). Blended learning: The convergence
of online and face-to-face education. Retrieved
December 9, 2010, from http://www.inacol.org/
Zemke, R., & Zemke, S. (1984, March). 30
things we know for sure about adult learning.
Innovation Abstracts, 6(8).
A 1 2 Adult Learning
Copyright of Adult Learning is the property of American
Association for Adult & Continuing Education and its
content may not be copied or emailed to multiple sites or posted
to a listserv without the copyright holder's
express written permission. However, users may print,
download, or email articles for individual use.
Practical Application of Research Skills
Read the article “Adult Education and the Social Media
Revolution,” available in the eReserves section of the
classroom. Pay particular attention to the references these
authors make to the works of others. Every citation within this
article is essentially a head nod to other authors who have
written about the same or similar topics. Were they all in the
same room, you could imagine the authors of this article
pointing to or calling out those other authors while speaking.
This is what we mean when we refer to research and writing as
29. one big conversation, with all of the participants listening and
responding to one another.
In a discussion post, point to an example from this article and
explain how the authors do one of the following:
· refer to another work in order to give legitimacy to their own
point;
· refer to another work in order to build upon the ideas of
others; or
· refer to another work in order to challenge that work.
If you select "refer to another work in order to give legitimacy
to their own point," first describe what the authors' point is,
then describe how the cited article supports that point.
If you select "refer to another work in order to build upon the
ideas of others," first describe what the ideas are, then describe
how the authors build upon those ideas.
If you select "refer to another work in order to challenge that
work", first describe what is being challenged, then describe
how the authors are challenging the cited work.
Then, give an example from your own life in which you rely
upon the work of others to complete a task or accomplish a
goal. (This example might be from your workplace, community,
or academic life.)
Post identifies examples from both the text and the student’s
life and fully explains the significance of these examples within
the stated context