Presentation on the scalability of embedded librarianship at LOEX 2012. For related information, see our Embedded Librarianship in the LMS Survey results at www.users.muohio.edu/burkejj/embedded librarian survey results.pdf. Also see a paper we wrote for ACRL 2011 - A Declaration of Embeddedness: Instructional Synergies and Sustaining Practices in LMS Embedded Librarianship at http://www.ala.org/acrl/sites/ala.org.acrl/files/content/conferences/confsandpreconfs/national/2011/papers/declaration_embedded.pdf.
This document provides an overview of the academic job search process. It includes statistics on applicant and position trends. The key steps of the process are creating a vita, researching positions, attending conferences, conducting interviews at conferences and on campus, and negotiating a job offer. Important factors for recruiters in deciding to interview and make offers include degree status, teaching experience, quality of publications, and compatibility. Salary and research support are common negotiation subjects. The document offers helpful hints and questions for navigating the academic job search.
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
The document discusses several topics related to online privacy, security, and social issues for social networks. It covers wireless LANs, location-based services using GPS, internet telephony and web conferencing, security and privacy concerns regarding personal information online, network security issues and technologies, virtual private networks, the digital divide in internet access, and copyright issues regarding file sharing.
The document discusses privacy risks for users of social network sites. It proposes prioritizing and analyzing threats by examining activities that cause damage and the reasons why activities are damaging. A framework is presented for applying concepts like information-based harm, informational inequality, and informational injustice to a case study about harmful remarks posted on MySpace. The analysis shows how identity-relevant information can be used to harm users when moving through different spheres.
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
This document discusses security and privacy issues on social networking sites. It identifies different types of social networks and factors that influence users' selection of social networks like ease of use, friends using the network, and privacy and security. The document outlines threats to social networks like identity theft through profile cloning, spam attacks, malware spreading, and privacy and security issues related to shared user profile data, activity data, and third party application access. It provides statistics on common security threats to social networks and references publications on related research.
This document provides information and guidance to teens on protecting their privacy and personal information when using social media and the internet. It discusses why online privacy is important, how personal information can be accessed and used, basic guidelines for safe social media use and disclosure of personal information, how to adjust privacy settings, security risks like passwords, phishing and spyware, and resources for further information. The overall message is that teens should be aware of privacy issues and risks when online and take steps to protect their privacy and personal information.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
This document discusses online social networks and some of the threats associated with using them. It defines online social networks as online communities where users can share interests and interact through chat, messaging, and other features. The most popular networks are used most by Generation Y and teens. Some key threats include cyberbullying, stalking, sexual predators, vulnerabilities in applications that can compromise privacy settings, spear phishing spam, and the aggregation of personal data by networks. It provides five ways to safely use social networks such as setting private defaults, being wary of applications, limiting personal information shared, only accepting friend requests from known people, and only posting information one is comfortable with others seeing.
This document discusses privacy issues with social networking. It begins by noting people's growing concerns about privacy online. It then outlines different types of social networks like social media sites for photos, videos, and audio; and location-based networks. The main privacy concerns addressed are identity theft from shared personal information, location tracking by services, and other issues like risks to children. The document concludes by providing some general tips for using social networks privately like using strong passwords and privacy settings.
This document provides an overview of the academic job search process. It includes statistics on applicant and position trends. The key steps of the process are creating a vita, researching positions, attending conferences, conducting interviews at conferences and on campus, and negotiating a job offer. Important factors for recruiters in deciding to interview and make offers include degree status, teaching experience, quality of publications, and compatibility. Salary and research support are common negotiation subjects. The document offers helpful hints and questions for navigating the academic job search.
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
The document discusses several topics related to online privacy, security, and social issues for social networks. It covers wireless LANs, location-based services using GPS, internet telephony and web conferencing, security and privacy concerns regarding personal information online, network security issues and technologies, virtual private networks, the digital divide in internet access, and copyright issues regarding file sharing.
The document discusses privacy risks for users of social network sites. It proposes prioritizing and analyzing threats by examining activities that cause damage and the reasons why activities are damaging. A framework is presented for applying concepts like information-based harm, informational inequality, and informational injustice to a case study about harmful remarks posted on MySpace. The analysis shows how identity-relevant information can be used to harm users when moving through different spheres.
Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
This document discusses security and privacy issues on social networking sites. It identifies different types of social networks and factors that influence users' selection of social networks like ease of use, friends using the network, and privacy and security. The document outlines threats to social networks like identity theft through profile cloning, spam attacks, malware spreading, and privacy and security issues related to shared user profile data, activity data, and third party application access. It provides statistics on common security threats to social networks and references publications on related research.
This document provides information and guidance to teens on protecting their privacy and personal information when using social media and the internet. It discusses why online privacy is important, how personal information can be accessed and used, basic guidelines for safe social media use and disclosure of personal information, how to adjust privacy settings, security risks like passwords, phishing and spyware, and resources for further information. The overall message is that teens should be aware of privacy issues and risks when online and take steps to protect their privacy and personal information.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
This document discusses online social networks and some of the threats associated with using them. It defines online social networks as online communities where users can share interests and interact through chat, messaging, and other features. The most popular networks are used most by Generation Y and teens. Some key threats include cyberbullying, stalking, sexual predators, vulnerabilities in applications that can compromise privacy settings, spear phishing spam, and the aggregation of personal data by networks. It provides five ways to safely use social networks such as setting private defaults, being wary of applications, limiting personal information shared, only accepting friend requests from known people, and only posting information one is comfortable with others seeing.
This document discusses privacy issues with social networking. It begins by noting people's growing concerns about privacy online. It then outlines different types of social networks like social media sites for photos, videos, and audio; and location-based networks. The main privacy concerns addressed are identity theft from shared personal information, location tracking by services, and other issues like risks to children. The document concludes by providing some general tips for using social networks privately like using strong passwords and privacy settings.
The document summarizes findings from a survey of USQ students about their use of technology. Key findings include:
1) Most USQ students access information online as 77% are external/online students. Laptops are the most common device used for study.
2) Popular technologies used by students in daily life include search engines, texting, email and social media like Facebook.
3) Technologies preferred for learning include the LMS, email, online conferencing and mobile phones for contributing to classes.
4) Students have varying levels of interest in using new technologies like tablets, ePortfolios and social media for educational purposes.
The survey found that students use technologies like social media, smartphones, and laptops extensively in their personal lives. While some tools like email and the LMS are widely used for studying, students expressed more interest in using additional technologies like online document sharing, virtual worlds, and mobile devices for learning in the future. The results indicate a shift toward more online and mobile technologies for learning, communication, and administration, though traditional tools also remain important.
This paper will focus on the progression in the use of Moodle and technology by educators at AUB, which seems to be calling for a paradigm shift in training strategies. A shift that should take into consideration that IT support and the Moodle application should be better tailored to the individual needs of educators.
Presented by Hossein Haman at the Moodlemoot Dublin 2013 http://moodlemoot.ie
The data is used to guide continuous improvement efforts. Teachers and administrators carefully examine performance trends to identify strengths and needs at the student, classroom, school and district level. This informs targeted interventions, curriculum revisions, and instructional goal-setting to help all students succeed.
Chrisie Mitchell's Online Student Success Initiatives at Dutchess Community C...Alexandra M. Pickett
SLN SOLsummit 2010
http://slnsolsummit2010.edublogs.org
February 25, 2010
Chrisie Mitchell, Associate Director, Mary Louise Van Winkle Teaching Learning Center, Dutchess Community College
Online Student Success Initiatives at Dutchess Community College
Research of online persistence conducted by many SUNY institutions seems to indicate that there are important risk factors that hinder student success in online courses. The Teaching Learning Center at DCC has translated those risk factors into specific initiatives aimed at increasing student success rates and overall online persistence at the college. These specific initiatives include:
* Registration Policy for Online Courses – DCC has implemented a policy that restricts enrollment in online courses based on first time full time status and cumulative grade point average.
* Mandatory Online Student Orientation – A current second-stage pilot at DCC, the Online Student Orientation is an automated, ANGEL-based module that seeks to inform students about their online courses, both technically and pedagogically.
* Student Outreach Program – This initiative identifies students who may be having difficulty in their online course based on logins and low time in the course shell and employs student aides to reach out to their fellow students to provide assistance and support.
* Quality Matters Initiative – A group of faculty participated in a QM pilot program at DCC in summer of 2009 in order to support student success at the course design level. Five faculty are now QM certified peer reviewers. The QM Rubric is currently being customized for use at DCC as we prepare to roll out peer review of course shell design.
This presentation will give an overview of each initiative, the process behind the implementation, and thoughts for the future.
The document provides an overview of the state of education in South Africa and challenges facing the country, with some proposed solutions. It discusses low performance on international tests, high dropout rates, and disparities between school types. Potential causes mentioned include lack of teacher development, dysfunctional school management, and untruths such as overemphasis on resources over quality. The presentation proposes steps to improve education quality, including increasing teacher professionalism, establishing student-teacher connections, and implementing student accountability measures. It aims to raise awareness of educational issues and provide examples of school turnarounds.
The library update document contained the following key points:
1) The library budget included $100K in base funding and $50K for new degree programs, with $20K more for extended hours. Four staff took early retirement and four new staff were hired.
2) The library is working on several programs including information literacy, data management, and archives projects. Several digitization projects were also completed.
3) Renovations included a new technology lab, reading alcove, and learning space. Future projects include a reading sanctuary and expanded book alcove.
The document contains multiple charts and graphs showing trends over time. The first chart shows production numbers increasing from 2006 to 2015. The second chart shows monetary values increasing from 2008 to 2015. The third chart shows viewership numbers for a TV channel peaking in 2010 and generally declining since.
This document summarizes a presentation about online education trends in SUNY and their impact on UUP members. It discusses the growth of online courses nationally and within SUNY. It also examines faculty motivations and barriers to online education. Survey results from UUP members found that intellectual property and workload are concerns regarding online education. The presentation recommends continued research on these issues and communicating IP information to members.
The document provides an update from the University of Delaware. It discusses the follow up from an LTC conference held in Second Life, the adoption of the Sakai learning management system, development of e-portfolios, H1N1 preparedness strategies involving technology and pedagogy, and the launch of a new IT website.
The document discusses using supplemental instruction (SI) to support online students. It introduces four SI leaders and their roles. SI provides weekly review sessions led by experienced students. Research shows SI improves grades for all students. The document then describes how online SI (OSI) works through virtual sessions, and shares data showing higher grades for OSI participants. Student quotes praise OSI for its personal approach, ability to ask questions, and improved understanding of course material.
The document discusses how Korea achieved the highest secondary education rate in the world. It provides historical context on Korea's emphasis on education dating back to Confucian influences that valued scholarship. Private schools emerged in the early 20th century as part of the independence movement against Japanese occupation. After World War 2 and the Korean War, the government prioritized education to aid economic recovery and development, establishing policies like free public education to boost attainment rates which ultimately led Korea to having the highest secondary education completion rate globally.
The BYU-Idaho Pathway report summarizes key statistics from the Pathway program between 2009-2012. It shows growth in the number of students enrolled increasing from 162 to over 3,650. It also shows improvements in students' spiritual activities like scripture study, prayer, and church attendance. Additionally, it provides data on the number of Pathway students serving as missionaries and the number of domestic and international sites hosting Pathway students.
This presentation discusses collaborative advising methods used to promote student success for a nontraditional nursing student population in a distance learning program. It explores challenges advising students who are mostly New York residents over age 40, with a 1:200 full-time advisor to student ratio. Advisors meet quarterly to share best practices for overcoming common barriers. The nursing program headcount has grown and is projected to continue growing, requiring collaborative work between advisors, faculty, and student services to resolve issues.
The document contains 11 charts that show trends in children's issues from 2003 to 2011. It shows data on the number of orphans and vulnerable children receiving support over time. It also provides information on how children access various medical services and how they learn about prevention. The data demonstrates changes in the situations of at-risk youth and how support for them has grown significantly in recent years.
Brock University Faculty of Social Sciences Annual Report 2010-11BrockSocSci
The annual report summarizes the activities of the Faculty of Social Sciences at a university for 2010-11. Enrolment and graduate numbers increased from the previous year. Faculty produced quality research and teaching. Major contributions were made to research projects and awards were won by faculty and staff. The report provides statistics on enrolment, courses, programs, research, and service.
The University of A Coruña established the Senior University program in 1989 for unemployed individuals over 50 seeking updated education. The program consists of 4 courses over 8 months each for a total of 36 credits and a Senior University Degree. Subjects include humanities, social sciences, science, technology, and health. Class sizes have grown from 100 students initially to over 600 currently. Students study compulsory and optional subjects while also having opportunities to participate in workshops on topics like music, European projects, and cinema. European workshops promote active learning, skills, research, and active European citizenship for senior students.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
The document summarizes findings from a survey of USQ students about their use of technology. Key findings include:
1) Most USQ students access information online as 77% are external/online students. Laptops are the most common device used for study.
2) Popular technologies used by students in daily life include search engines, texting, email and social media like Facebook.
3) Technologies preferred for learning include the LMS, email, online conferencing and mobile phones for contributing to classes.
4) Students have varying levels of interest in using new technologies like tablets, ePortfolios and social media for educational purposes.
The survey found that students use technologies like social media, smartphones, and laptops extensively in their personal lives. While some tools like email and the LMS are widely used for studying, students expressed more interest in using additional technologies like online document sharing, virtual worlds, and mobile devices for learning in the future. The results indicate a shift toward more online and mobile technologies for learning, communication, and administration, though traditional tools also remain important.
This paper will focus on the progression in the use of Moodle and technology by educators at AUB, which seems to be calling for a paradigm shift in training strategies. A shift that should take into consideration that IT support and the Moodle application should be better tailored to the individual needs of educators.
Presented by Hossein Haman at the Moodlemoot Dublin 2013 http://moodlemoot.ie
The data is used to guide continuous improvement efforts. Teachers and administrators carefully examine performance trends to identify strengths and needs at the student, classroom, school and district level. This informs targeted interventions, curriculum revisions, and instructional goal-setting to help all students succeed.
Chrisie Mitchell's Online Student Success Initiatives at Dutchess Community C...Alexandra M. Pickett
SLN SOLsummit 2010
http://slnsolsummit2010.edublogs.org
February 25, 2010
Chrisie Mitchell, Associate Director, Mary Louise Van Winkle Teaching Learning Center, Dutchess Community College
Online Student Success Initiatives at Dutchess Community College
Research of online persistence conducted by many SUNY institutions seems to indicate that there are important risk factors that hinder student success in online courses. The Teaching Learning Center at DCC has translated those risk factors into specific initiatives aimed at increasing student success rates and overall online persistence at the college. These specific initiatives include:
* Registration Policy for Online Courses – DCC has implemented a policy that restricts enrollment in online courses based on first time full time status and cumulative grade point average.
* Mandatory Online Student Orientation – A current second-stage pilot at DCC, the Online Student Orientation is an automated, ANGEL-based module that seeks to inform students about their online courses, both technically and pedagogically.
* Student Outreach Program – This initiative identifies students who may be having difficulty in their online course based on logins and low time in the course shell and employs student aides to reach out to their fellow students to provide assistance and support.
* Quality Matters Initiative – A group of faculty participated in a QM pilot program at DCC in summer of 2009 in order to support student success at the course design level. Five faculty are now QM certified peer reviewers. The QM Rubric is currently being customized for use at DCC as we prepare to roll out peer review of course shell design.
This presentation will give an overview of each initiative, the process behind the implementation, and thoughts for the future.
The document provides an overview of the state of education in South Africa and challenges facing the country, with some proposed solutions. It discusses low performance on international tests, high dropout rates, and disparities between school types. Potential causes mentioned include lack of teacher development, dysfunctional school management, and untruths such as overemphasis on resources over quality. The presentation proposes steps to improve education quality, including increasing teacher professionalism, establishing student-teacher connections, and implementing student accountability measures. It aims to raise awareness of educational issues and provide examples of school turnarounds.
The library update document contained the following key points:
1) The library budget included $100K in base funding and $50K for new degree programs, with $20K more for extended hours. Four staff took early retirement and four new staff were hired.
2) The library is working on several programs including information literacy, data management, and archives projects. Several digitization projects were also completed.
3) Renovations included a new technology lab, reading alcove, and learning space. Future projects include a reading sanctuary and expanded book alcove.
The document contains multiple charts and graphs showing trends over time. The first chart shows production numbers increasing from 2006 to 2015. The second chart shows monetary values increasing from 2008 to 2015. The third chart shows viewership numbers for a TV channel peaking in 2010 and generally declining since.
This document summarizes a presentation about online education trends in SUNY and their impact on UUP members. It discusses the growth of online courses nationally and within SUNY. It also examines faculty motivations and barriers to online education. Survey results from UUP members found that intellectual property and workload are concerns regarding online education. The presentation recommends continued research on these issues and communicating IP information to members.
The document provides an update from the University of Delaware. It discusses the follow up from an LTC conference held in Second Life, the adoption of the Sakai learning management system, development of e-portfolios, H1N1 preparedness strategies involving technology and pedagogy, and the launch of a new IT website.
The document discusses using supplemental instruction (SI) to support online students. It introduces four SI leaders and their roles. SI provides weekly review sessions led by experienced students. Research shows SI improves grades for all students. The document then describes how online SI (OSI) works through virtual sessions, and shares data showing higher grades for OSI participants. Student quotes praise OSI for its personal approach, ability to ask questions, and improved understanding of course material.
The document discusses how Korea achieved the highest secondary education rate in the world. It provides historical context on Korea's emphasis on education dating back to Confucian influences that valued scholarship. Private schools emerged in the early 20th century as part of the independence movement against Japanese occupation. After World War 2 and the Korean War, the government prioritized education to aid economic recovery and development, establishing policies like free public education to boost attainment rates which ultimately led Korea to having the highest secondary education completion rate globally.
The BYU-Idaho Pathway report summarizes key statistics from the Pathway program between 2009-2012. It shows growth in the number of students enrolled increasing from 162 to over 3,650. It also shows improvements in students' spiritual activities like scripture study, prayer, and church attendance. Additionally, it provides data on the number of Pathway students serving as missionaries and the number of domestic and international sites hosting Pathway students.
This presentation discusses collaborative advising methods used to promote student success for a nontraditional nursing student population in a distance learning program. It explores challenges advising students who are mostly New York residents over age 40, with a 1:200 full-time advisor to student ratio. Advisors meet quarterly to share best practices for overcoming common barriers. The nursing program headcount has grown and is projected to continue growing, requiring collaborative work between advisors, faculty, and student services to resolve issues.
The document contains 11 charts that show trends in children's issues from 2003 to 2011. It shows data on the number of orphans and vulnerable children receiving support over time. It also provides information on how children access various medical services and how they learn about prevention. The data demonstrates changes in the situations of at-risk youth and how support for them has grown significantly in recent years.
Brock University Faculty of Social Sciences Annual Report 2010-11BrockSocSci
The annual report summarizes the activities of the Faculty of Social Sciences at a university for 2010-11. Enrolment and graduate numbers increased from the previous year. Faculty produced quality research and teaching. Major contributions were made to research projects and awards were won by faculty and staff. The report provides statistics on enrolment, courses, programs, research, and service.
The University of A Coruña established the Senior University program in 1989 for unemployed individuals over 50 seeking updated education. The program consists of 4 courses over 8 months each for a total of 36 credits and a Senior University Degree. Subjects include humanities, social sciences, science, technology, and health. Class sizes have grown from 100 students initially to over 600 currently. Students study compulsory and optional subjects while also having opportunities to participate in workshops on topics like music, European projects, and cinema. European workshops promote active learning, skills, research, and active European citizenship for senior students.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
This presentation was provided by Racquel Jemison, Ph.D., Christina MacLaughlin, Ph.D., and Paulomi Majumder. Ph.D., all of the American Chemical Society, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
19. Survey Findings
• Courses
• 70% online
• 69% face-to-face
• 54% hybrid
• 61% undergrad
• 42% grad
• Average of 31% of MLS librarians embedded per institution
• 44% in 5 or fewer courses each
• 19% in 6-10 courses each
• 15% in 11 or more courses each
• Growth in future?
• 49% yes
• 37% stay the same
20. Our Experience & Insights
Course sections Students
900
35 800
30 700
600
25 500
20 400
300
15 200
10 100
0
5
Spring Fall 2009 Spring Fall 2010 Spring Fall 2011 Spring
0 2009 2010 2011 2012
Spring Fall Spring Fall Spring Fall Spring
2009 2009 2010 2010 2011 2011 2012
We have been thinking a lot about this question. We have surveyed our colleagues around the world on the question in 2011. We have worked as embedded librarians since 2009 on a university regional campus at Miami University of Ohio. We have been reading the professional literature. We have written a book on how to launch and expand such a program. Let’s reason together in the next hour.
We know from national ProjectInformation Literacy (Head & Eisenberg, 2008-)and the state ERIAL Project (Ethnographic Research Illinois Academic Libraries (College Libraries and Student Culture, ALA 2012) students work in the LMS. They prefer online research. They do not seek out librarians nor speak library lingo, but they do feel overwhelmed by the research process served up in their classes. When a knowledgeable and approachable embedded librarian shows up in their LMS course and pointedly directs them to start research using subject databases and time-saving tools, they are grateful. They welcome the interaction, endorsed by their professor, the subject expert. Word gets around among students and faculty, this library service is useful! More faculty request the service. At last, instruction librarians feel appreciated and needed! But secretly we wonder: CAN WE DELIVER? Is LMS embedded librarianship scalable? Can we offer it on the menu as standard fare?It’s a fair question, one we will explore together. This is the question that strikes fear in many and shuts down some from trying!
If we are honest, these traditional methods of providing information literacy instruction are not scalable either. After all, who are we kidding? Can 1 reference librarian engage the entire campus community during finals week at OSU, for instance? Traditional methods have served us well for many years, but technology enables us to work in new ways!100% coverage is equally impossible. How have we managed all these years?
First students are confused by the sign: REFERENCE. What does this mean?Who is that person sitting at the desk and what do they know? Students do not differentiate between level of training and credentials, whether undergrad, classified staff, or librarian.Many seem to follow parental warning: Don’ t talk to strangers.Students may not even come to the physical library. They work from home/dorm and online!Reference desk interactions are declining; some academic libraries have even closed the Desk!
Why would I want to start searching here? I have my methods and familiar sources.OCLC’s 2010 Perceptions of Libraries report documents that 0 studentsstart research at the library website.Moreover, tutorials and guides are not easily discoverable by students. Some never imagine such screencasts exist.
1 Shots are spotty. Some instructors schedule them and others never do.Sometimes librarians teach one-shot info lit classes. Sometimes they train to TAs teach these skills in the many sections of Freshmen Composition. Typically instruction time is limited to 50-75 minutes. Because of peer pressure,students hesitate to admit they don’t know how to…If the class is not timed exactly right in the term, they may forget the research lessons presented.
Vegetables are good for you!Where is the discipline context?We seldom enroll every student in these credit courses. Enrollment may be capped at 15-20 students. We don’t have the instruction staff and time. This may explain why tutorials and online modules are becoming more popular.Nor can we teach every information literacy skill that may be needed in higher education and the workplace. There are specialty topics we may overlook.And the tools and technology keep changing, seemingly at a faster pace.Too few students enroll
Individualized reference appointments seem appealing. Seniors working on capstone projects and graduate students, however, may not request one. Nor freshmen just starting out, for that matter.
F2F CoursesHybrid CoursesOnline CoursesDistance LearningSurvey stats of usageLMS embedded librarianship allows direct interaction with students! It is student-centered and meets real information needs.Librarians see the research assignment!It is now possible to streamline the research process for students and guide them in using scholarly, relevant library collections and services.Students like the convenient links and strategies turning up in their LMS course. They may build a relationship with the librarian who becomes a trusted coach in research. Students prefer working with trusted mentors who understand their research needs.
Barriers to growing LMS embedded librarianship. Here are the Hard Questions that come up in conversation and the literature.
Is LMS embedded librarianship just too time-consuming to undertake?Think of the LMS as the university oasis where teaching and learning happens. It meets users’ preferences. Traditional methods can be incorporated in embedded librarianship. Embedded may even lead to requests for 1 shots or research consultations or increased activity at the reference desk.Librarians need to be in the LMS to be visible and align themselves with the university’s mission, rather than wait for students and scholars to come looking for them.It deepens community, enhances communication, and is time-effective as 100 students can be emailed in the time it would take to assist one student at the Reference Desk.Time savers are still available to us, such as:Reuse ready-made tutorials in and beyond your library.Refer students to appropriate campus offices.Set reasonable boundaries to monitor courses and interact with students. (Think about making appointments rather than holding virtual office hours.. Let students know how to reach you and when you are likely to respond. Unplug at day’s end. You need to refuel and refresh yourself.