With the rise of Web 2.0, microblogging has become a widely accepted phenomenon for sharing information. Moreover, the Twitter platform has become the tool of choice for universities looking to increase their digital footprint. However, scant research addresses the viability of microblogging as a tool to facilitate knowledge creation practices among higher education students. This paper proposes a model to explain how students, as digital natives, leverage the features of the Twitter microblogging for the transfer of knowledge. Finally, the paper examines the dark side of Twitter as a privacy-leaking platform and issues a call to higher institutions for specific security policies to prevent nefarious use.
This document provides an overview of Russell Francis's doctoral thesis investigating the implications of media change for learning. The thesis explored how learners are appropriating new media to support learning through two design experiments and an ethnographic study of advanced learners. The ethnographic study identified six genres of practice used by learners and attempted to develop conceptual tools to understand new media literacies. The thesis argues that media convergence has decentralized formal education and learners now need new media literacies to design personal learning environments leveraging online resources.
N e w t r e n d i n E d u c a t i o n : The Knowledge StrategyMd Santo
To addressing the current unpredictable condition of learning environment, we as educational researchers came up with special product knowledge in instructional educational design applied for learning and educational activities
This document presents a framework for online collaborative learning called telecollaboration. The framework is centered on collaborative educational experiences where knowledge creation occurs through social, teaching, and cognitive presence based on the Community of Inquiry model. The framework is meant to guide educators in designing, developing, and implementing authentic online collaborative learning experiences locally, nationally, or internationally. The framework focuses on knowledge construction through online interactions between learners, educators, experts, and content from different locations.
The document discusses different approaches to MOOCs and how they relate to learning culture and cultural differences. It proposes an "enhanced MOOC" model that considers knowledge creation through collaboration, uses culture-sensitive materials, and offers diversified and customized learning. xMOOCs focus on knowledge acquisition through videos and quizzes, while cMOOCs emphasize participation through discussion boards. An enhanced MOOC would foster knowledge creation using shared artifacts and trialogical learning informed by cultural psychology theories to account for both pedagogical and cultural diversity.
This document discusses a constructivist approach to inquiry-based learning. It describes constructivism as a learning theory where students build new knowledge based on their prior experiences. It outlines how WebQuest is an example of inquiry-based learning that allows students to ask questions and explore information to increase their understanding. The document argues that a constructivist approach using inquiry-based learning like WebQuest can help develop college freshman's critical thinking skills as they engage with course content.
Stewart, benjamin english language educators and technology ije v5 n1 20...William Kritsonis
Published by NATIONAL FORUM JOURNALS - A group of national refereed, peer-reviewed, scholarly, academic periodicals. William Allan Kritsonis, PhD, Editor-in-Chief, NFJ (Since 1982)
This document discusses the need for a learning system to meet the complex knowledge needs of today's era. It makes four key points:
1. Knowledge needs are now defined by complexity and interconnectivity rather than singular narratives.
2. Emerging job opportunities are knowledge-based rather than focused on technical skills alone.
3. The concept of a university is expanding to accommodate more diverse student profiles and complexifying knowledge.
4. Knowledge institutions and learning models must mirror the distributed, networked nature of information to be effective.
Information literacy is a set of skills that allows individuals to find, evaluate, and use information effectively. These skills are needed to navigate the abundant and diverse information available in various formats. Information literacy involves determining how much information is needed, accessing it efficiently, evaluating sources critically, incorporating information, understanding legal and ethical issues, and using information effectively. It is a broader competence than just technology skills, involving critical thinking abilities. Developing information literacy is important for higher education as it supports lifelong learning and is considered a key outcome by accrediting organizations. Teaching information literacy requires collaboration between faculty, librarians, and administrators through integrating it across curricula.
This document provides an overview of Russell Francis's doctoral thesis investigating the implications of media change for learning. The thesis explored how learners are appropriating new media to support learning through two design experiments and an ethnographic study of advanced learners. The ethnographic study identified six genres of practice used by learners and attempted to develop conceptual tools to understand new media literacies. The thesis argues that media convergence has decentralized formal education and learners now need new media literacies to design personal learning environments leveraging online resources.
N e w t r e n d i n E d u c a t i o n : The Knowledge StrategyMd Santo
To addressing the current unpredictable condition of learning environment, we as educational researchers came up with special product knowledge in instructional educational design applied for learning and educational activities
This document presents a framework for online collaborative learning called telecollaboration. The framework is centered on collaborative educational experiences where knowledge creation occurs through social, teaching, and cognitive presence based on the Community of Inquiry model. The framework is meant to guide educators in designing, developing, and implementing authentic online collaborative learning experiences locally, nationally, or internationally. The framework focuses on knowledge construction through online interactions between learners, educators, experts, and content from different locations.
The document discusses different approaches to MOOCs and how they relate to learning culture and cultural differences. It proposes an "enhanced MOOC" model that considers knowledge creation through collaboration, uses culture-sensitive materials, and offers diversified and customized learning. xMOOCs focus on knowledge acquisition through videos and quizzes, while cMOOCs emphasize participation through discussion boards. An enhanced MOOC would foster knowledge creation using shared artifacts and trialogical learning informed by cultural psychology theories to account for both pedagogical and cultural diversity.
This document discusses a constructivist approach to inquiry-based learning. It describes constructivism as a learning theory where students build new knowledge based on their prior experiences. It outlines how WebQuest is an example of inquiry-based learning that allows students to ask questions and explore information to increase their understanding. The document argues that a constructivist approach using inquiry-based learning like WebQuest can help develop college freshman's critical thinking skills as they engage with course content.
Stewart, benjamin english language educators and technology ije v5 n1 20...William Kritsonis
Published by NATIONAL FORUM JOURNALS - A group of national refereed, peer-reviewed, scholarly, academic periodicals. William Allan Kritsonis, PhD, Editor-in-Chief, NFJ (Since 1982)
This document discusses the need for a learning system to meet the complex knowledge needs of today's era. It makes four key points:
1. Knowledge needs are now defined by complexity and interconnectivity rather than singular narratives.
2. Emerging job opportunities are knowledge-based rather than focused on technical skills alone.
3. The concept of a university is expanding to accommodate more diverse student profiles and complexifying knowledge.
4. Knowledge institutions and learning models must mirror the distributed, networked nature of information to be effective.
Information literacy is a set of skills that allows individuals to find, evaluate, and use information effectively. These skills are needed to navigate the abundant and diverse information available in various formats. Information literacy involves determining how much information is needed, accessing it efficiently, evaluating sources critically, incorporating information, understanding legal and ethical issues, and using information effectively. It is a broader competence than just technology skills, involving critical thinking abilities. Developing information literacy is important for higher education as it supports lifelong learning and is considered a key outcome by accrediting organizations. Teaching information literacy requires collaboration between faculty, librarians, and administrators through integrating it across curricula.
Crossing the Threshold: Envisioning Information Literacy through the Lens of ...Tom Mackey
Twitter is abuzz with comments about metaliteracy, threshold concepts, and frameworks. Information literacy is being reframed, reinvented, and reimagined in articles, books, conference presentations, and lively discussions in the field. What happened to the more traditional elements of information literacy and the iconic ACRL Information Literacy Competency Standards for Higher Education? Why are these alternative models appearing now, and what do they bring to the conversation? This collaborative keynote will provide an opportunity to learn more about these new models, and to reflect on how they might inform your teaching and your students’ learning. We will explore these developments by highlighting key aspects of our new book Metaliteracy: Reinventing Information Literacy to Empower Learners. Trudi Jacobson will also relate these questions to her work as Co-Chair of the ACRL Task Force that is shifting the original standards to a framework informed by a scaffolding of threshold concepts.
This presentation examines the metaliteracy framework developed by Tom Mackey and Trudi Jacobson. Metaliteracy will be examined as a reframing of information literacy. This presentation also reports on the successful Innovative Instruction Technology Grant (IITG) at SUNY that led to new metaliteracy learning objectives.
This document proposes a new theoretical model for information literacy education in school settings that goes beyond skill-based approaches. It discusses how school pedagogy, information literacy, and communication theory converge. Specifically, it argues that a communicative pedagogical model is needed that incorporates theoretical perspectives like phenomenography, discourse analysis, and sociocultural theory. This model would address informational knowledge, operational knowledge, and motivational factors beyond just skills. It also examines the relationship between information literacy and media literacy as fields that are increasingly converging.
Empowering Yourself in a Connected World: Designing an Open SUNY Coursera MOO...Tom Mackey
A collaborative team within SUNY that includes both Empire State College and The University at Albany designed a learner-centered Open SUNY Coursera MOOC based on the concept of metaliteracy. We reached a global audience through the Coursera platform that influenced our design decisions and expanded our understanding of digital literacies internationally.
Expanding Metaliteracy Across the Curriculum to Advance Lifelong Civic Engage...Tom Mackey
This presentation was for 2015 Summer Workshop at Cedar Crest College and explored the following: Metaliterate learners, who apply integrated competencies related to evaluating, consuming, and producing information in participatory environments, will be better prepared for college level learning and lifelong civic engagement. This workshop defined metaliteracy, discussed the four domains of metaliteracy and related learning goals and objectives, and examined how this approach has been applied in the curricular design of several innovative projects such as competency based digital badging and three MOOCs. Participants discussed ways to envisage opportunities to enhance students’ metaliteracy abilities, and to share these ideas with other attendees.
Authors: Theo Hug, Norm Friesen
In this paper we map the changing but ultimately convergent meanings of the term “microlearning” as they have emerged and developed over the last few years. We explore how the term works to organize and order a set of pedagogical and technological phenomena and concepts in new and interesting ways.
This document provides an overview of a presentation on reframing information literacy as metaliteracy. It discusses the changing information environment and rise of online learning. Metaliteracy is presented as a framework that promotes critical thinking and collaboration in digital spaces. It emphasizes metacognition and the ability to critically evaluate one's own skills. The document outlines several metaliteracy objectives like understanding different content formats and privacy issues. Examples are given of how metaliteracy can be practiced, including a student project and potential badging system. Overall, the presentation argues that metaliteracy provides a more comprehensive approach for engaging with information in today's online world.
This document provides an overview of technology-based learning environments (TBLEs). It defines TBLEs as any learning environment that incorporates technology. TBLEs can range from structured online courses to less structured immersive environments. The document reviews different types of TBLEs and discusses important factors for effective TBLE design such as content, interaction, accessibility, and assessment. It concludes that TBLEs provide opportunities for more engaged, student-centered learning and challenges educators to create TBLEs that support this engagement.
Promoting Metaliteracy and Metacognition in Collaborative Teaching and LearningTom Mackey
Trudi Jacobson and Tom Mackey present on metaliteracy as part of a panel at the NOLA Information Literacy Collective on Friday, August 11, 2017. This virtual presentation defines metaliteracy, discusses the ACRL Framework for Information Literacy for Higher Education, and examines the metaliteracy learning goals and objectives. Specific metaliteracy related projects such as the competency based digital badging system and Massive Open Online Courses (MOOCs) are examined as well.
Presentation to accompany proposal for a BC Board/Authority Authorized Course - framework posted at http://db.tt/yCrfoQ6A. Middle Earth 12 is a senior Humanities elective course - a personalized, blended approach to the study of Language and Landscape. Middle Earth 12 is designed to work as a stand-alone course but will be implemented with a Humanities Program that also includes students seeking credit for BC English 11 and Geography 12.
«Assessment of Digital Resources use in Education - Anatomy of Digital Resources in Learning Generation»
languages, civics curricula, anatomy of different digital tools web 2.0, assessment
Developing Metaliterate Learners: Transforming Literacy across DisciplinesTom Mackey
This was the opening keynote presentation by Tom Mackey and Trudi Jacobson for the SUNY "Conversations in the Disciplines" one-day conference focused on metaliteracy.
The 8th plymouth enhanced learning conference v2Daniel Chun
The document discusses how mobile learning can help increase intercultural understanding in transnational education programs. It notes that as globalization has increased western universities offering offshore programs, intercultural issues need to be considered. Mobile learning could help educational institutions be more interculturally competent by increasing opportunities for intercultural contact. However, more research is still needed on the intercultural and sociocultural implications of mobile learning, as existing studies have focused more on effectiveness and system design with little analysis of cultural factors. The document recommends future research to help address this knowledge gap.
Teaching Metaliteracy in the Post-Truth WorldTom Mackey
This presentation introduced metaliteracy and its critical role in today’s post-truth world. Trudi Jacobson and Tom Mackey presented Ideas for incorporating discipline-based teaching of metaliteracy, from the development of metaliteracy learning outcomes to the design of collaborative teaching and learning opportunities. Participants gained insights about how to promote metaliterate learning academically and through lifelong learning.
Metaliteracy as an Empowering Model for Teaching Mobile and Social LearnersTom Mackey
Tom Mackey and Trudi Jacobson presented a collaborative keynote on metaliteracy at The University of Puerto Rico’s Mobile Learning Week event on Monday, March 20 at 10am eastern time. In a presentation entitled “Metaliteracy as an Empowering Model for Teaching Mobile and Social Learners,” Tom and Trudi will explored the theory of metaliteracy while illustrating practical applications that can be applied in a variety of teaching and learning situations. In today’s mobile media environments our learners are continuously engaged with information in a variety of forms using a range of technologies. Learners from around the world are texting, posting, and sharing documents they find online through a multitude of social media spaces and mobile devices. But how much of this information can be trusted?
Metaliteracy: Reflective and Empowered Lifelong LearningTom Mackey
This keynote presentation at La Universidad de Guadalajara "Second Encounter of Reading in Higher Education: Literacy in Everyday Life" defined metaliteracy in everyday experience and in academic settings, while exploring its importance in today’s multifaceted social media spaces. Tom Mackey and Trudi Jacobson examined how metaliteracy complements the literacy of reading and writing in new media environments, and extends information literacy beyond search and retrieval, to define a metacognitive perspective that prepares individuals to continuously reflect, adapt, persist, and participate in mutable information environments. The authors demonstrated metaliteracy learning projects, including a competency based digital badging system and Massive Open Online Courses (MOOCs) that map the metaliteracy learning goals and objectives to tangible and reflective learning activities.
Metaliteracy provides a framework for teaching information literacy that emphasizes collaboration, participation, and critical thinking in digital environments. It can be taught by having students evaluate user-generated content, understand privacy and ethics, and create original work in multiple formats. Assignments like blogs, digital stories, and online projects help develop metaliteracy skills. A future MOOC called #L4LLL will teach metaliteracies for lifelong learning.
Information Seeking: Information LiteractJohan Koren
This document discusses various theories and concepts related to information seeking and information literacy. It begins by defining information seeking as involving searching for, retrieving, recognizing, and applying meaningful content. It then covers several theories that seek to explain why people seek information, including Belkin's Anomalous State of Knowledge theory, Kuhlthau's Uncertainty Principle, and Dervin's Sense-Making hypothesis. The document also discusses theories about who seeks information and how they seek it. Additional concepts covered include information competence, literacy, inquiry-based learning, lifelong learning, and 21st century skills. The document emphasizes that the goal is to develop knowledgeable, critical thinkers who can effectively engage with information.
This document discusses the history and theories of educational psychology and instructional design. It covers behaviorism, cognitive science influences like computer science, constructivism, e-learning approaches like blended learning, computer-supported collaborative learning, educational media and tools, e-learning authoring tools, learning management systems, and pedagogical elements.
This document outlines 5 test slides. Slides 1 through 5 are briefly described to test an unknown topic. The slides progress sequentially from the first to the fifth test slide with no other details provided.
Crossing the Threshold: Envisioning Information Literacy through the Lens of ...Tom Mackey
Twitter is abuzz with comments about metaliteracy, threshold concepts, and frameworks. Information literacy is being reframed, reinvented, and reimagined in articles, books, conference presentations, and lively discussions in the field. What happened to the more traditional elements of information literacy and the iconic ACRL Information Literacy Competency Standards for Higher Education? Why are these alternative models appearing now, and what do they bring to the conversation? This collaborative keynote will provide an opportunity to learn more about these new models, and to reflect on how they might inform your teaching and your students’ learning. We will explore these developments by highlighting key aspects of our new book Metaliteracy: Reinventing Information Literacy to Empower Learners. Trudi Jacobson will also relate these questions to her work as Co-Chair of the ACRL Task Force that is shifting the original standards to a framework informed by a scaffolding of threshold concepts.
This presentation examines the metaliteracy framework developed by Tom Mackey and Trudi Jacobson. Metaliteracy will be examined as a reframing of information literacy. This presentation also reports on the successful Innovative Instruction Technology Grant (IITG) at SUNY that led to new metaliteracy learning objectives.
This document proposes a new theoretical model for information literacy education in school settings that goes beyond skill-based approaches. It discusses how school pedagogy, information literacy, and communication theory converge. Specifically, it argues that a communicative pedagogical model is needed that incorporates theoretical perspectives like phenomenography, discourse analysis, and sociocultural theory. This model would address informational knowledge, operational knowledge, and motivational factors beyond just skills. It also examines the relationship between information literacy and media literacy as fields that are increasingly converging.
Empowering Yourself in a Connected World: Designing an Open SUNY Coursera MOO...Tom Mackey
A collaborative team within SUNY that includes both Empire State College and The University at Albany designed a learner-centered Open SUNY Coursera MOOC based on the concept of metaliteracy. We reached a global audience through the Coursera platform that influenced our design decisions and expanded our understanding of digital literacies internationally.
Expanding Metaliteracy Across the Curriculum to Advance Lifelong Civic Engage...Tom Mackey
This presentation was for 2015 Summer Workshop at Cedar Crest College and explored the following: Metaliterate learners, who apply integrated competencies related to evaluating, consuming, and producing information in participatory environments, will be better prepared for college level learning and lifelong civic engagement. This workshop defined metaliteracy, discussed the four domains of metaliteracy and related learning goals and objectives, and examined how this approach has been applied in the curricular design of several innovative projects such as competency based digital badging and three MOOCs. Participants discussed ways to envisage opportunities to enhance students’ metaliteracy abilities, and to share these ideas with other attendees.
Authors: Theo Hug, Norm Friesen
In this paper we map the changing but ultimately convergent meanings of the term “microlearning” as they have emerged and developed over the last few years. We explore how the term works to organize and order a set of pedagogical and technological phenomena and concepts in new and interesting ways.
This document provides an overview of a presentation on reframing information literacy as metaliteracy. It discusses the changing information environment and rise of online learning. Metaliteracy is presented as a framework that promotes critical thinking and collaboration in digital spaces. It emphasizes metacognition and the ability to critically evaluate one's own skills. The document outlines several metaliteracy objectives like understanding different content formats and privacy issues. Examples are given of how metaliteracy can be practiced, including a student project and potential badging system. Overall, the presentation argues that metaliteracy provides a more comprehensive approach for engaging with information in today's online world.
This document provides an overview of technology-based learning environments (TBLEs). It defines TBLEs as any learning environment that incorporates technology. TBLEs can range from structured online courses to less structured immersive environments. The document reviews different types of TBLEs and discusses important factors for effective TBLE design such as content, interaction, accessibility, and assessment. It concludes that TBLEs provide opportunities for more engaged, student-centered learning and challenges educators to create TBLEs that support this engagement.
Promoting Metaliteracy and Metacognition in Collaborative Teaching and LearningTom Mackey
Trudi Jacobson and Tom Mackey present on metaliteracy as part of a panel at the NOLA Information Literacy Collective on Friday, August 11, 2017. This virtual presentation defines metaliteracy, discusses the ACRL Framework for Information Literacy for Higher Education, and examines the metaliteracy learning goals and objectives. Specific metaliteracy related projects such as the competency based digital badging system and Massive Open Online Courses (MOOCs) are examined as well.
Presentation to accompany proposal for a BC Board/Authority Authorized Course - framework posted at http://db.tt/yCrfoQ6A. Middle Earth 12 is a senior Humanities elective course - a personalized, blended approach to the study of Language and Landscape. Middle Earth 12 is designed to work as a stand-alone course but will be implemented with a Humanities Program that also includes students seeking credit for BC English 11 and Geography 12.
«Assessment of Digital Resources use in Education - Anatomy of Digital Resources in Learning Generation»
languages, civics curricula, anatomy of different digital tools web 2.0, assessment
Developing Metaliterate Learners: Transforming Literacy across DisciplinesTom Mackey
This was the opening keynote presentation by Tom Mackey and Trudi Jacobson for the SUNY "Conversations in the Disciplines" one-day conference focused on metaliteracy.
The 8th plymouth enhanced learning conference v2Daniel Chun
The document discusses how mobile learning can help increase intercultural understanding in transnational education programs. It notes that as globalization has increased western universities offering offshore programs, intercultural issues need to be considered. Mobile learning could help educational institutions be more interculturally competent by increasing opportunities for intercultural contact. However, more research is still needed on the intercultural and sociocultural implications of mobile learning, as existing studies have focused more on effectiveness and system design with little analysis of cultural factors. The document recommends future research to help address this knowledge gap.
Teaching Metaliteracy in the Post-Truth WorldTom Mackey
This presentation introduced metaliteracy and its critical role in today’s post-truth world. Trudi Jacobson and Tom Mackey presented Ideas for incorporating discipline-based teaching of metaliteracy, from the development of metaliteracy learning outcomes to the design of collaborative teaching and learning opportunities. Participants gained insights about how to promote metaliterate learning academically and through lifelong learning.
Metaliteracy as an Empowering Model for Teaching Mobile and Social LearnersTom Mackey
Tom Mackey and Trudi Jacobson presented a collaborative keynote on metaliteracy at The University of Puerto Rico’s Mobile Learning Week event on Monday, March 20 at 10am eastern time. In a presentation entitled “Metaliteracy as an Empowering Model for Teaching Mobile and Social Learners,” Tom and Trudi will explored the theory of metaliteracy while illustrating practical applications that can be applied in a variety of teaching and learning situations. In today’s mobile media environments our learners are continuously engaged with information in a variety of forms using a range of technologies. Learners from around the world are texting, posting, and sharing documents they find online through a multitude of social media spaces and mobile devices. But how much of this information can be trusted?
Metaliteracy: Reflective and Empowered Lifelong LearningTom Mackey
This keynote presentation at La Universidad de Guadalajara "Second Encounter of Reading in Higher Education: Literacy in Everyday Life" defined metaliteracy in everyday experience and in academic settings, while exploring its importance in today’s multifaceted social media spaces. Tom Mackey and Trudi Jacobson examined how metaliteracy complements the literacy of reading and writing in new media environments, and extends information literacy beyond search and retrieval, to define a metacognitive perspective that prepares individuals to continuously reflect, adapt, persist, and participate in mutable information environments. The authors demonstrated metaliteracy learning projects, including a competency based digital badging system and Massive Open Online Courses (MOOCs) that map the metaliteracy learning goals and objectives to tangible and reflective learning activities.
Metaliteracy provides a framework for teaching information literacy that emphasizes collaboration, participation, and critical thinking in digital environments. It can be taught by having students evaluate user-generated content, understand privacy and ethics, and create original work in multiple formats. Assignments like blogs, digital stories, and online projects help develop metaliteracy skills. A future MOOC called #L4LLL will teach metaliteracies for lifelong learning.
Information Seeking: Information LiteractJohan Koren
This document discusses various theories and concepts related to information seeking and information literacy. It begins by defining information seeking as involving searching for, retrieving, recognizing, and applying meaningful content. It then covers several theories that seek to explain why people seek information, including Belkin's Anomalous State of Knowledge theory, Kuhlthau's Uncertainty Principle, and Dervin's Sense-Making hypothesis. The document also discusses theories about who seeks information and how they seek it. Additional concepts covered include information competence, literacy, inquiry-based learning, lifelong learning, and 21st century skills. The document emphasizes that the goal is to develop knowledgeable, critical thinkers who can effectively engage with information.
This document discusses the history and theories of educational psychology and instructional design. It covers behaviorism, cognitive science influences like computer science, constructivism, e-learning approaches like blended learning, computer-supported collaborative learning, educational media and tools, e-learning authoring tools, learning management systems, and pedagogical elements.
This document outlines 5 test slides. Slides 1 through 5 are briefly described to test an unknown topic. The slides progress sequentially from the first to the fifth test slide with no other details provided.
The 3-Brain Leadership Runa Bouius 2015Runa Bouius
Conscious Leadership integrates the three intelligences from our mind -- IQ, our feelings -- EQ, and our body -- BQ. Often referred to as 3-Brain Leadership. Upgrading the leadership mindset from the 20th century paradigm to the 21st century paradigm is essential for our Next Generation Leadership.
El correo resume quejas recibidas de CCOO sobre posibles interferencias de la empresa Carrefour en el proceso electoral sindical. Se indica que desde RRHH no se pueden verificar estas quejas y que la obligación de la empresa es no intervenir de ninguna forma en esta fase del proceso, prohibiendo a cualquier mando o responsable de RRHH interferir en nombre de la empresa en la presentación de candidaturas sindicales, bajo responsabilidad individual. El deber de la empresa es respetar la libertad de los trabajadores y fomentar buenas relaciones entre sindicatos.
The headline review conducted by Chris White of EMC Ltd. examined WorkRite's business development practices in detail. The review found that improvements were needed in a range of processes to help WorkRite achieve its goal of triple-digit growth. Chris used a BD Framework Assessment tool to evaluate 25 aspects of WorkRite's business development, including key account management, sales disciplines, client satisfaction, and market research. Based on the findings, WorkRite enhanced its sector strategy, tightened key account management, and developed a plan to more closely manage marketing, business development, and management details.
Learning Objective: Examine strategies for effectively dealing with change in the workplace
The next generation of corporate and federal executive leaders is faced with unique challenges and changes as business threats and solutions change rapidly. It is critical to continue to assess position and purpose to stay ahead of the competition. The key to success is not always trying to figure out what will happen next, but about developing the strategy to manage changes, turn obstacles into opportunities, and thrive in the face of great uncertainty. A Matrix of Change is one strategy that can help leaders anticipate the complexity of how people, processes, and systems impact each other.
At the end of this seminar, participants will be able to:
a. Examine the change matrix and associated management skills
b. Explore how management and leadership skills impact the change process
c. Explore ways to stay inspired and committed
d. Identify specific strategies and examples of how obstacles and change can be stepping stones for great opportunities
e. Examine how to support teams through change.
The CEO of Wightman & Parrish commissioned Chris White of EMC to review the company's sales and customer service functions and develop a plan to better align them with the company's business strategy. Chris interviewed staff, analyzed performance data, and proposed a restructuring plan. This plan was presented to the CEO and staff could provide feedback to address issues. The first step in implementing the plan was hiring a senior Sales Director to roll out the changes over the next few months.
El documento resume los puntos principales sobre el recurso jerárquico en el derecho tributario venezolano. Explica que el recurso jerárquico es una reclamación ante la administración tributaria para que revise un acto y lo modifique o extinga. Luego detalla las formas de interponerlo, los plazos, las causales de inadmisión como la falta de interés o representación legal, y casos en los que no procede como cuando se dictan actos en tratados internacionales para evitar doble tributación.
Este documento presenta las reglas generales y especiales de acentuación del español. Explica que las palabras se dividen en átonas y tónicas, y detalla las reglas para palabras agudas, graves, esdrújulas y sobresdrújulas. También cubre casos especiales como palabras con tilde diacrítica, pronombres, adverbios, y palabras con dos acentos. Por último, ofrece ejemplos de extranjerismos, latinismos y palabras con doble acentuación.
SCRUM es un marco ágil para la gestión de proyectos complejos que se centra en iteraciones cortas llamadas "sprints". Los sprints tienen una duración fija y el objetivo es entregar un incremento de valor al cliente. El equipo SCRUM se compone de un dueño de producto, un equipo de desarrollo auto-organizado y un scrum master. Al final de cada sprint se realiza una revisión para inspeccionar el incremento y una retrospectiva para mejorar el proceso.
Mindfulness and Stress Resilience: The Best Benefit for Your Employees and Yo...Human Capital Media
A recent Willis Towers Watson survey revealed that 75% of U.S. employers say stress is their number one workplace health concern. Stress is taking a massive toll on both your employee wellness and overall business performance. It’s no wonder that corporate mindfulness is a hot topic in leading companies.
This webinar will give you insight into:
What mindfulness is and how it helps employees reduce stress, while improving performance.
The neuroscience behind training employees for resilience and mental wellbeing.
Why 1/3 of Fortune 500 companies name mental well-being and stress reduction as their #1 priority.
The financial, operational and cultural benefits that digital, on-demand mindfulness training can have in your company.
La revista América Economía Perú publica un reportaje sobre el liderazgo de LLORENTE & CUENCA y crecimiento que ha experimentado la Firma en los últimos años, especialmente desde la entrada de su socio financiero, MBO Partenaires. Alejandro Romero, Socio y CEO para América Latina, explica los nuevos retos marcados.
“Ir con prisas a Cuba es una estrategia equivocada"LLYC
Cinco Días publica una entrevista a Pau Solanilla, Director general de LLORENTE & CUENCA Cuba, sobre la puesta en marcha el pasado mes de marzo de una nueva unidad de negocio enfocada a Cuba. Durante la entrevista, se analizan los objetivos de la compañía en Cuba y el interés real de las empresas españolas de explorar vías de negocio en Cuba.
Swift sin hype y su importancia en el 2017 Software Guru
En esta presentación platicaremos de Swift y su futuro inmediato, las mejoras y las guías de diseño que esta siguiendo. Mostraremos herramientas relacionadas para los implementen en sus proyectos además de conocer frameworks que están hechos completamente en Swift.
This document provides an overview of cloud computing and Microsoft's Windows Azure platform. It begins with background on the lack of clarity around cloud definitions and then presents Microsoft's taxonomy for classifying different cloud services. The rest of the document discusses the business benefits of cloud computing, introduces Windows Azure and its capabilities, and explores how Microsoft plans to work with partners to support the platform. It addresses common questions around Windows Azure's supported languages, differences between SQL Azure and SQL Server, and how Windows Azure computes pricing for compute, storage, and bandwidth resources.
Search Inside Yourself is the mindfulness-based emotional intelligence program that started at Google and is now taught world wide to develop clarity, resilience, and compassionate leadership in organizations.
If you are curious to learn more, please email shalini@MFactor.org
Este documento describe las similitudes y diferencias entre Lean Startup y el desarrollo ágil, y cómo pueden aplicarse conjuntamente para crear productos exitosos. Explica que ambos enfoques promueven la entrega rápida de valor al cliente a través de iteraciones cortas y retroalimentación continua. También describe cómo las historias de usuario y los productos mínimos viables son elementos clave de ambos enfoques para validar hipótesis sobre el problema y solución del cliente.
The document discusses how a primary school in Singapore implemented virtual learning environments to enhance students' information literacy skills. Students used online platforms like wikispace to collaboratively discuss topics in their Tamil language class. This allowed students to connect, construct, and relate information on issues like the impact of tourism on Singapore. The virtual platform provided a space for students to build on each other's contributions. Overall, the implementation was successful in engaging students in higher-order thinking and helping them develop skills in accessing, evaluating, and using information to learn.
This document presents the concept of Learner Generated Contexts (LGC) as a potential framework to support more effective use of technology in learning. LGC views context as defined by a learner's interactions across physical and virtual spaces over time, rather than being confined to a single location. It proposes that learners can now take greater agency in creating their own learning contexts through technologies that enable sharing information and collaborating online. The document discusses shortcomings of current educational models and argues that a context-based model organized around learner-generated contexts could offer more participatory and democratic learning experiences.
This chapter introduces the concept of learning design and argues that explicitly representing and sharing the design of learning activities can help teachers create more effective learning environments. It discusses the changing context of education and needs of modern learners. A new learning design methodology is needed to help teachers design pedagogically sound learning that leverages new technologies. The chapter lays out an argument for shifting to a more systematic, explicit approach to design using tools and methods grounded in research.
A Synthesis of Self-directed Learning Design Model with Constructionism in t...Kru Suthin
This document proposes a self-directed learning model combining constructionism that is suitable for the new media environment in Thai higher education. The model aims to develop students' creative thinking skills. It was developed through interviews, expert opinions, and focus group discussions. The model includes identifying learning goals, analyzing learners, designing lesson content, identifying learning activities, preparing learning environment support systems, and assessing learning. The model is meant to incorporate social media technologies to improve deep learning through a more student-centered approach.
The document discusses two social constructivist programs - Fostering a Community of Learners (FCL) and Schools for Thought (SFT). FCL focuses on literacy and biology development through reflection, discussion, and collaboration between students and experts. SFT combines aspects of the Jasper Project, FCL, and CSILE to emphasize problem-based learning, extended inquiry projects, and collaboration using technology. Both programs aim to develop deeper understanding through social interaction and real-world problem solving rather than traditional instruction.
The unit uses a process model curriculum and constructivist learning theory. It focuses on how 9th grade students will learn about Shakespeare's Romeo and Juliet through collaborative activities, games, and formative assessments. Students will analyze themes, characters, language, and develop their understanding of the play through group work, technology use, and connecting with peers. The goals are to expose students to Shakespeare in an engaging way and help them make sense of the complex text.
This document discusses emerging learning theories and how they can be applied to discussion boards in online classes. It examines social constructivism, connectivism, transactional distance theory, and andragogy. These theories emphasize building a community of learners through discussion boards. A community provides benefits like supporting individual and collective learning. Discussion boards allow sharing of knowledge and experiences in online classes based on emerging theories.
Activities And Resources In Online Learning From A Critical Thinking ViewSamantha Martinez
This document summarizes a study that investigated the relationship between online learning and critical thinking in an undergraduate online introductory computer literacy course. The study aimed to identify which parts of the course's learning modules (resources and activities) contributed most to developing students' critical thinking skills. A survey of 490 students found that interactive course components like assignments and projects were perceived to contribute more to critical thinking than static resources like textbooks. Assignments had the strongest perceived impact, followed by an Excel mini case project. Overall, results indicated students viewed interactive elements as contributing more to critical thinking development than non-interactive content, assessment, or projects. The findings suggest online course designers should focus on incorporating interactive elements to foster critical thinking skills.
This document discusses the transformation of education for the 21st century. It argues that schools need to transform, not just reform, by changing the underlying culture and structure, not just procedures. This involves shifting beliefs, values and the social structure to support innovation. The document advocates preparing students for their future world by developing skills like critical thinking, collaboration, adaptability and accessing/analyzing information. New literacies and emerging media have a place in transforming education and the role of educators.
The document discusses trends for learning in the digital age and describes connected learners. It defines connected learners as those with an inclination towards being open-minded, a dedication to ongoing expertise development, and a willingness to collaborate and leave their comfort zone. It also discusses digital literacies important for the 21st century like social networking, transliteracy, and participating in online communities and networks. Professional development is shifting towards community-based models like professional learning communities, communities of practice, and personal learning networks.
This document provides an overview of educational technology and its role in learning. It discusses how technology can be used as both a tool for delivering content as well as a tool for facilitating constructive and collaborative learning. Some key points made include:
- Technology allows for knowledge sharing and access to up-to-date information but can also enable ideological propaganda and other exploitative uses if not used properly.
- It can be used to engage students in active and authentic learning or to simply deliver pre-determined content.
- When used effectively, technology has been shown to increase student learning, understanding, achievement, and motivation while supporting skills like critical thinking.
- Examples of technologies discussed include computers, speakers, cellphones and their
The document discusses 21st century skills and theories of learning relevant in today's world. It defines 21st century skills as competencies including collaboration, digital literacy, critical thinking and problem solving. It also summarizes several learning theories - cognitivism, constructivism, reflectivism, and connectivism - noting they support principles of 21st century teaching and learning. The document advocates applying multiple learning theories and emphasizes skills like deep learning and higher-order thinking in modern education.
This document proposes a self-organizing peer-to-peer (P2P) learning model for education, inspired by P2P file sharing networks. It describes tools developed to support this model, including an intelligent student grouping tool, a collaborative learning environment (CLE), a social learning network (ELSE), and a mobile learning platform. The goal is to maximize knowledge transfer and learning efficiency through autonomous knowledge sharing between peers.
A presentation sharing some of my sabbatical work with the EU LearningLayers project, draws upon Cook (2013)
Cook, J. (2010). Mobile Phones as Mediating Tools Within Augmented Contexts for Development. International Journal of Mobile and Blended Learning, 2(3), 1-12, July-September. Link to paper http://goo.gl/NFWnSZ
The document discusses several concepts related to pedagogy and learning theories:
- Pedagogy is the study of teaching methods and how the learning process is influenced. It considers interactions during learning and how teaching/learning are shaped by psychological, social, and political factors.
- Participatory learning gives students space to create their own interpretations through participating in activities like creating wikis, blogs, and digital stories.
- Peer and self-assessment methods are used to help students correct their own mistakes and improve work by evaluating others' work.
- Building trust, openness, risk-taking, and relationships are important for classroom success as students must learn to trust and be trusted by others to feel comfortable sharing
The document discusses learner-generated contexts, which are contexts created by learners interacting together with a common, self-defined learning goal, rather than being consumers of contexts created for them. It proposes a research agenda to develop context-based models, realign informal and formal learning, and challenge consumption and creation relationships in learning. Key questions are raised about how technology and pedagogies have changed and could further change to better support learner-generated contexts.
The document discusses emerging learning theories and how they relate to the use of discussion boards in online adult education classes. It examines theories like social constructivism, connectivism, transactional distance, and andragogy. These theories emphasize community building, making connections, bridging gaps in online environments, and understanding how adults learn best. The document also provides best practices for using discussion boards, such as defining goals, building rapport, encouraging public sharing, and providing guidelines for interaction and etiquette.
This document summarizes a research paper that investigated learner autonomy through a distance learning program at a university in Malaysia. The study found that first-year students lacked confidence in autonomous learning and needed help organizing, monitoring, and evaluating their learning, despite showing some confidence in planning. For students to effectively participate in asynchronous online learning, they need to be equipped with skills and tools to manage their own lifelong learning and become autonomous learners. The integration of information and communication technologies in higher education is aimed at empowering learners, and learning management systems can help develop online courses and websites to meet student needs for acquiring information flexibly.
The document provides an overview of the connectivism learning theory. It discusses the key principles of connectivism, which were introduced in 2005 by George Siemens and Stephen Downes. Connectivism suggests that learning occurs through connections within networks, and is enhanced by technology and constant connectivity. It promotes group collaboration and learning that occurs outside of individuals. The document also discusses how connectivism can be implemented in classroom settings through the use of social media, gamification, and simulations.
The document discusses the transition from traditional education models to more connected, personalized learning models leveraging technology and networks. It notes that by 2011, 80% of Fortune 500 companies will use immersive virtual worlds. It outlines shifts from formal to informal learning, mandated to collaborative teaching, and a focus on learning networks and passion-based learning over quick learning bites.
Similar to Microblogging in higher education: Digital Natives, knowledge creation, social engineering, and intelligence analysis of educational tweets (20)
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
Since the last elections in the United States, France, and other nations, fake news has become a tool to manipulate voters. This creation of fake news creates a problem that ripples through an entire society creating division. However, the media has not scrutinized enough on data misuse. Daily it appears that there are breaches causing millions of users to have their personal information taken, exposed, and sold on the Dark Web in exchange of encrypted currencies. Recently, news has surfaced of major social media sites allowing emails to be read without user consent.
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. This talk will discuss technical, human, societal, and policy issues concerning hyperconnectivity and IoT. Additionally, this talk will offer insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
The purpose of this paper is to provide a framework that allows for the development of a virtual lab that incorporates emerging technologies such as the Industrial Internet of Things and embedded systems while incorporating open source components. The global shortage of talent is a significant concern as organizations continue to embrace and roll out new technologies such as 5G, and Artificial Intelligence. Several countries such as those in developing countries face issues regarding technology use in the classroom. Thus, to provide a learning environment where cybersecurity and information systems concepts can be taught in an exploratory environment.
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
In this paper, the researcher briefly discusses the attacks that have occurred recently within Saudi Arabia to entities such as Saudi Aramco to the Ministry of Health. These attacks are aggressions against government institutions that can render a sector vulnerable. Observing the ongoing attacks on critical infrastructure in Ukraine one can see a replication of similar attacks that could occur and spread over the Middle East. As this nation is a politically turbulent region, there is no small number of external threats. To combat these evolving threat, a shift towards cyber readiness must occur. This includes new laws, security hardened technologies, and education for people living in the kingdom.
The document discusses gaining control of a situation through intelligence gathering and search techniques in order to find vulnerabilities that can be exploited to perform unparalleled events. It explores controlling the landscape through applying intelligence operations, information warfare, data science, and cybersecurity to search for and sample applications that allow one to exploit and destroy through techniques like searching for PHP errors that enable SQL injection. The session aims to explore this landscape and applications of control, search, exploit, and destroy.
The document summarizes the activities of the Midwest Association for Information Systems (MWAIS) in 2017, provides information about the 2018 annual conference, and makes a call for future conference organizers. Key points:
- MWAIS was recognized for the third year in a row as an outstanding AIS chapter in 2016. The 2017 annual conference in Springfield, Illinois was well attended with over 100 participants.
- The 2018 conference will be held in St. Louis, Missouri in May and focus on the theme of cybersecurity.
- Future conferences will be hosted by the University of Wisconsin-Oshkosh in 2019 and Drake University in 2020. Hosting a conference is an opportunity to showcase a university and
The document provides insights from a student who traveled to Guinea, Conakry to conduct a 2-week training assignment for the agriculture sector. The student trained Agriculture Trainers and Specialized Technicians in computer skills like Microsoft Office and using the Internet as a research tool. The experience helped the student contribute to the global society and learn about Guinean culture. The student advised that such assignments provide professional and personal growth opportunities. The document also discusses establishing an enterprise security architecture and key elements to consider like information, strategies, security mechanisms, and security services. The architecture should be flexible, adaptable, and promote self-regulation to address evolving security threats.
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
Many countries in the Economic Community of West African States (ECOWAS) are using Information Communications Technology (ICT) to enhance agriculture development and production. To do this efficiently the John Ogonowski and Doug Bereuter Farmer-to-Farmer Program managed for West Africa by Winrock International has been tasked with providing volunteer assignments to ministries of agriculture. The University of Missouri - Saint Louis (UMSL) has entered a partnership with Winrock International to offer upper-level undergraduate and graduate students the opportunity to provide technical assistance to international government entities. In this panel; we discuss findings and opportunities for improvement in Guinea and Senegal as they relate to ICT discovered through the onsite support provided.
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
This article critically analyzes a project executed for the The John Ogonowski and Doug Bereuter Farmer-to-Farmer Program which provides technical assistance with volunteers from the United States to farmers, agricultural institutions, and government organizations involved in agriculture such as the Ministry of Agriculture. In Guinea, the focus is on computer literacy as more sectors of agriculture rely on computing technology. These skills needs range from basic computing tasks such as creating databases to more advanced items such as programming Global Positional Systems. This study looks at findings, based on the analysis of the System Usability Scale results from a sample of 16 participants. The findings demonstrated that the training proved to be effective for the participants and continued training is necessary. As a result of training 62.5% of the participants ranked above average, as opposed to 43.6% prior to training.
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
This document provides the schedule for the 2018 Midwest Association for Information Systems (MWAIS) Conference taking place May 17-18 at the University of Missouri-St. Louis. The schedule lists the times, locations, and topics for events including keynote speakers, panels, presentations in concurrent sessions, workshops, and social events. Some of the topics covered are cybersecurity, artificial intelligence, healthcare IT, e-commerce, and pedagogical issues related to information systems education. Transportation between the conference hotel and campus is provided via shuttle.
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
The 13th Annual Conference of the Midwest AIS will be held in St. Louis, Missouri, and is sponsored by the College of Business Administration at the University of Missouri – St. Louis (UMSL). MWAIS 2018 will provide an intimate environment to facilitate the sharing of ideas, and close interaction among participants. About 100 participants are expected from throughout the Midwest US, the neighboring states and Canadian provinces, and beyond.
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
Midwest Association for Information Systems
13th Annual Conference
May 24 – 25, 2018
College of Business Administration
University of Missouri – Saint Louis
Saint Louis, Missouri
We invite submissions of completed manuscripts, research-in-progress papers, panel proposals, and workshop proposals addressing behavioral, organizational, and technical aspects of information systems. Two to three parallel sessions are planned. A computer lab will be available if needed. Submitted papers and proposals will undergo a double blind review process by at least two reviewers. To facilitate the blind review, include the title of the paper, names, affiliations, mailing addresses, e-mail addresses, and phone numbers of all authors on a cover page submitted as a separate document from the body of the manuscript. If one or more of the co-authors are students, please clearly indicate so. Include only the title of the paper at the beginning of the manuscript. In the case of multiple-authorship, designate the corresponding author with a footnote on the cover page. Please do not include any author or affiliation identification on any page (except the separate cover page), in headings/footers, or in the properties of the submitted file. Previously published work or work under review elsewhere is not eligible for submission. All submissions should be posted electronically in either MS Word or PDF.
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
Recently some countries have fell victim to attacks from nation-states, cyber criminals, and bad actors resulting in loss of critical data or damage to critical infrastructure. Thus there is an urgent need to design, implement, and deliver innovative solutions that meet the challenges through advancements in intellection collection, analysis. This submission will explore multiple aspects of the solutions side of cyber security and present cutting-edge research from researchers and practitioner around the world concerning multiple sources of intelligence. This submission will provide insights into technological advancement for all cyber intelligence. Additionally, technological advancements for subjects such as open source intelligence, human intelligence, geospatial intelligence, social media intelligence, and data science will be explored. Researchers, practitioners, and professionals will benefit from this publication’s broad perspective.
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
Data and technological advances are abounding at lightening speed. It is hard to stay on top of everything that is happening in these digitally disruptive times. But there has never been more important for companies and individuals to do so. Hacking, privacy, and security are on the minds of every corporation and private citizen. In this keynote, you will hear the latest trends in combating contrast threats to one’s security, how much more data can we possibly handle. The unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products allowing Internet connectivity.
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
This presentation discusses UMSL's cyber security program which is currently the only and first NSA & DHS CAE in cyber security education in the St. Louis Metropolitan Region.
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
This is the most essential programme of the year around the dangers of cybercrime and how to manage safety within the most indispensable digital sphere & technology system. The reason is that, “Looking beyond Internet of Things (IoT) to Internet of Everything there is a potential market that is approximately $14.4 trillion and over 99% of physical devices are still unconnected.” ~Mo Dawson. Your participation give you golden access to a transcending Cyberspace picture, enhanced solution oriented capabilities as an ICT expert or practitioner, Telecommunications Corporates & Companies
Personnel, Aviation ICT Officials, Other Transportation controls network hubs, Business dealer in Cyberspace services provider or supplier, Academicians and researchers, Government Departments & Public service ICT systems Officials & staff, Students, general ICT security involvement and on top of that your enhanced multidimensional scope & prosperity out of this untapped gold mine is guaranteed.
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Microblogging in higher education: Digital Natives, knowledge creation, social engineering, and intelligence analysis of educational tweets
1. Article
Microblogging in higher
education: Digital Natives,
knowledge creation, social
engineering, and intelligence
analysis of educational tweets
Simon Cleveland
Nova Southeastern University, USA
Barcus C Jackson
Barnes-Jewish College, USA
Maurice Dawson
University of Missouri – St Louis, USA
Abstract
With the rise of Web 2.0, microblogging has become a widely accepted phenomenon for sharing
information. Moreover, the Twitter platform has become the tool of choice for universities
looking to increase their digital footprint. However, scant research addresses the viability of
microblogging as a tool to facilitate knowledge creation practices among higher education stu-
dents. This paper proposes a model to explain how students, as digital natives, leverage the
features of the Twitter microblogging for the transfer of knowledge. Finally, the paper examines
the dark side of Twitter as a privacy-leaking platform and issues a call to higher institutions for
specific security policies to prevent nefarious use.
Keywords
Digital Natives, intelligence analysis, knowledge creation, microblogging, social engineering,
Twitter
Introduction
The goal of university programs is to prepare students to face the challenges in the car-
eers of their choice through acquisition of knowledge. Such knowledge includes both hard
Corresponding author:
Simon Cleveland, Nova Southeastern University Carl DeSantis Building, 4th Floor Fort Lauderdale, FL 33314-7796, USA.
Email: sc1674@nova.edu
E-Learning and Digital Media
0(0) 1–19
! The Author(s) 2016
Reprints and permissions:
sagepub.co.uk/journalsPermissions.nav
DOI: 10.1177/2042753016672130
ldm.sagepub.com
by guest on October 13, 2016ldm.sagepub.comDownloaded from
2. skills – specific training of tools, techniques and methods used in organizations, and soft
skills – team building, problem solving, and leadership. With the proliferation of Web 2.0
tools and learning management systems, universities rely on a plethora of information and
communication technologies to facilitate the knowledge sharing process.
This paper explores the microblogging phenomenon and analyzes its potential for know-
ledge creation by leveraging the information foraging, media specificity, and knowledge
creation theories. The paper proposes a model to explain how the features of the Twitter
microblogging platform enhance students’ conveyance and convergence practices for the
purposes of acquiring and transferring tacit and explicit knowledge.
Moreover, the concept of Digital Natives is examined and the Twitter mobile application
is proposed as a tool for teaching and educating the Digital Natives through sharing of best
practices as identified in the Community of Inquiry theory.
Finally, the paper provides evidence of the potentiality for extraction of specific identifi-
able information from Twitter posts through the use of various open source tools. The paper
calls for the creation of specific policies to ensure that security and privacy of students’
educational tweets are protected.
Literature review
Educational knowledge creation process
The goal of university programs is to prepare students to face the challenges in the careers of
their choice through acquisition of knowledge. Such knowledge includes both hard skills –
specific training of tools, techniques and methods used in organizations, and soft skills –
team building, problem solving, and leadership. Nonaka (1994) categorized the knowledge
that develops hard skills as explicit, since this particular type of knowledge can be captured
in a written form and can be easily stored in systems. In contrast, knowledge that develops
soft skills is considered tacit, since it is difficult to explicate and is ingrained in action.
To explain the educational knowledge creation process, we employ the knowledge cre-
ation theory proposed by Nonaka and Takeuchi (1995), who depicted the knowledge cre-
ation as a spiral process that winds through the various knowledge patterns (Figure 1).
Figure 1. Nonaka and Takeuchi’s knowledge creation model (1995).
2 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
3. Socialization and personal notes. The theory proposes that the creation of knowledge occurs
through the exchange of information through four patterns. The first pattern is known as
socialization. Here, students engage in the transformation of tacit into tacit knowledge. This
occurs through observation, interaction, and in some instances imitation of the professor.
Moreover, the information exchange occurs through rich communication (e.g. face-to-face
or through synchronous medium) in an effort to develop shared mental models.
One useful tool to capture and reflect on shared mental models is through the use of
personal notes. Personal notes have been shown as information storage methods to portray
solution of problems, as archival tools to refresh the memory, and as information sharing
tools to encourage interaction among individuals (Koskinen and Aramo-Immonen, 2008).
For example, the Read, Encode, Annotate, and Ponder note-taking technique has been
shown to increase learning success and to facilitate common understanding among individ-
uals (Tasdemir, 2010).
Externalization and stories. The next pattern of knowledge creation is called externalization.
Here, instructors use metaphors and analogies to portray knowledge elements such as the
know-how, know-why, and care-why. At the same time, students transfer the shared tacit
into explicit knowledge via the use of written documents.
One tool that has been proven to facilitate learning through the externalization process is
the story. The story is essential in the recombination of personal and shared knowledge
through the process of collective- and self-reflection. Stories are textual representations of
lessons interwoven into a series of events and constrained by specific timelines. A story is used
to portray specific identity, facilitate a decision making process, and boost a social bond
between the storyteller and the listeners. For example, Jonassen and Hernandez-Serrano
(2002) found that stories can serve as problem-solving tools that reinforced the retrieval of
past experiences and used the lessons to address new problems. Furthermore, learning from
stories has been demonstrated to facilitate knowledge transfer among teams, since teams
frequently engage in the exchange of metaphors and storytelling to share lessons (Goffin
and Koners, 2011; Newell, 2004; Whyte and Classen, 2012). Through the art of storytelling,
students are able to catalogue past lessons and convert them into new mental models.
Combination and reflection. The third pattern is known as combination. Here, students trans-
form explicit into explicit knowledge through categorization and sorting of written and
digital documents, best practices, and methodologies. One tool to facilitate this process is
through personal reflection. Extant literature has demonstrated that reflection enables learn-
ing through the acquisition of lessons, promotion of innovation, capture of best practices,
and creation of soft skills (Knipfer et al., 2013; Loo, 2002; Matturro and Silva, 2010).
Internalization and lessons learned. Finally, during the internalization pattern, students convert
explicit to tacit knowledge through the process of collective reflection by joining the acquired
knowledge to validate and augment their individual mental models.
One method to facilitate this process is the collective assessment of lessons learned, typ-
ically performed at the completion of a course. The use of lessons learned is widespread in
the project management domain, but its applicability is universal to other domains as well.
In higher education, lessons learned documents can serve as valuable knowledge tools to
foster conversion of tacit into explicit knowledge, increase competency, and improve learn-
ing strategy (Cleveland, 2013; Williams, 2008).
Cleveland et al. 3
by guest on October 13, 2016ldm.sagepub.comDownloaded from
4. Student knowledge seeking behavior
The knowledge seeking behavior involves an active searching of information in order to
satisfy a specific information need (Xu et al., 2006). Students engage in knowledge seeking as
a result of gaps that exist in their mental models. Such gaps represent problems that require
specific courses of action (Pirolli and Card, 1999). To explain the knowledge seeking behav-
ior, Pirolli and Card (1999) developed the information foraging theory, in which they argued
that missing knowledge can be regarded as prey that is hidden in various sources (e.g. people,
systems, archives). In an effort to achieve the maximum value of information relevant to
their knowledge gap, information foragers will engage in knowledge seeking of the most
valuable information that will take the least amount of time and effort to locate. To apply
the theory to the education setting, it can be argued that a student who is seeking specific text
that describes a concept discussed in the class will seek to spend the least amount of time to
locate the source while dedicating more time to converting the knowledge from its explicit
into its tacit state. As a result, information located in hard to locate sources (e.g. file drawers,
archives, etc.) is expected to take a longer time and more energy to locate versus information
stored in online databases. Students forced to make decisions whether to hunt for hard-to-
locate information will focus on locating information which will require the least amount of
time and effort to locate.
To explain student knowledge seeking behavior, we apply the knowledge seeking process
model proposed by Savolainen (2006) (Figure 2). We propose that students’ knowledge
seeking behavior is triggered by the existence of a specific gap in their knowledge in relation
to proposed concepts in the classroom. Next, the students consider potential sources of
information and evaluate the ease of locating the most valuable information for the least
amount of effort. Upon locating specific information, students engage in the evaluation and
interpretation of the information. The process involves the weighing of whether 1) the infor-
mation successfully addresses the knowledge gap, or 2) further information is necessary to
bridge the gap. Based on the analysis, the seeking behavior may be repeated by students,
where additional information is sought for the same channel. The behavior will be termi-
nated if the discovered knowledge satisfies the knowledge gap.
Knowledge dimensions and interactions
Extant literature proposes that knowledge consists of four dimensions: situational, concep-
tual, procedural, and strategic (De Jong and Ferguson-Hessler, 1996). The situational
Identify new
knowledge gap
Consider knowledge
sources
Evaluate knowledge
sources
Locate knowledge
Evaluate if knowledge
satisfies existing gap
No
Yes
Figure 2. Students’ knowledge seeking process model (adapted from Savolainen (2006)).
4 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
5. dimension contains information associated with specific conditions. Such knowledge is
mostly superficial in nature and contains explicit properties. Its structure contains awareness
of an applicable model to resolve the problem of a specific case, is already automated (e.g.
step-based process), lends itself to verbal explication, and contains general properties
acquired through formal training.
The conceptual knowledge is factual in nature and is based on specific principles within a
domain. This knowledge is relational, structured through symbols, independent concepts,
and has verbalizable properties, but lends itself to transfer through diagrams, models, and
pictures due to its tacit nature. The procedural knowledge dimension is action oriented
within a specific domain. This knowledge comprises rules related to specific principles, can
be explicated through step-by-step processes or figures, and is domain specific.
Finally, the strategic knowledge dimension requires a deeper cognitive understanding of
specific concepts and abstractions, because it consists of unique plans and actions. Such
knowledge is transferred through demonstrations, pictures, and graphs, and requires deep
analysis.
To understand how technology can facilitate the transfer of each knowledge dimension,
we leverage the media synchronicity theory (MST). According to the MST (Dennis et al.,
2008), communication is essential for the seeking and acquisition of information. Moreover,
the communication process between individuals consists of numerous interactions, through a
variety of communication mediums, in order to satisfy the information gap. The theory
posited that these interactions come in two flavors: 1) conveyance – where individuals
share ‘‘new’’ knowledge to create new mental models, and 2) convergence – the sharing of
‘‘known’’ knowledge to validate existing mental models.
Dennis et al. (2008) argued that in the instances where new mental models need to be
created, the exchange of knowledge between the knowledge seeker and knowledge provider
needs to occur through a rich communication medium. In such instances, the parties need to
be highly in-sync with one another for longer periods of time, so that the seeker of know-
ledge can soak up large volumes of transferred knowledge from the knowledge provider. As
a result, the media synchronicity theory proposes that the conveyance process necessitates
communication channels characterized by capabilities for high synchronicity between the
parties (e.g. video/audio interactions). As a result, it is argued that such technology mediums
are more suitable for the transfer of the conceptual and strategic knowledge dimensions.
To facilitate the convergence process for the purposes of validation of existing mental
models, Dennis et al. (2008) argued that frequent interactions with relatively small amounts
of information exchange are required between individuals. For this purpose, technology
mediums that foster low synchronicity are necessary (e.g. short textual messages, web
links), and they are most suitable for the transfer of situational and procedural knowledge
dimensions.
These interactions are best illustrated by the process model shown in Figure 3, adapted
from Cleveland et al. (2015).
Microblogging
Universities are investing in numerous information and communication technologies in
order to facilitate the educational knowledge creation process. By some estimates, the learn-
ing management systems (LMSs) market is expected to reach US$8 billion by 2018
(McIntosh, 2014). Research demonstrates that such technologies positively influence the
Cleveland et al. 5
by guest on October 13, 2016ldm.sagepub.comDownloaded from
6. processes of socialization, externalization, combination, and internalization (Collins et al.,
2015; Lopez-Nicolas and Soto-Acosta, 2010). While many of these robust LMSs offer a
variety of rich communication channels for students to interact, the use of microblogging
for search and dissemination of knowledge is still rather scant.
Microblogging has been demonstrated to facilitate the distribution of knowledge practices
(Hanseth and Lyytinen, 2004; Seebach, 2012). It provides users with the ability to post short
messages through a variety of devices (Java et al., 2007). Users set up personal profiles,
subscribe and follow other users, interact with them through brief discussions, and share
web links, videos, and photos with their followers (Java et al., 2007). One of the most
popular microblogging platforms today is Twitter, which has over 320 million registered
users and one billion unique visits monthly to sites embedded in the Twitter message
(Twitter.com, 2016).
Presently, Twitter limits users’ posts to 140 characters. Extant studies show that this word
limit is sufficient for users to foster reflective information sharing in order to facilitate col-
laboration (Cleveland and Ellis, 2013; Yang and Chang, 2011). Moreover, studies have
demonstrated that, in some instances, the microblogging interaction supports the exchange
of knowledge and the development of learning (Ebner and Mauerer, 2008; Ebner et al.,
2010). As a result, it is argued that through its features, microblogging can aid users in
the process of educational knowledge creation.
In this paper, we propose the knowledge creation process illustrated in Figure 4 to explain
the conversion of information into learning through the various knowledge patterns.
Microblogging convergence through lessons learned and reflection. Communication channels such as
emails or discussion boards allow users the ability to develop their ideas without word limit.
In contrast, the microblogging platforms typically constrain each post to a predefined char-
acter length, where users are forced to exercise creativity in constructing concise posts.
Moreover, posted content is broadened since numerous users contribute to the same con-
versation topic. The interactions between users occurs through frequent exchanges of mes-
sages that contain position statements, questions, and specific answers. The exchanges can be
Figure 3. Knowledge dimensions and interaction model (adapted from Cleveland et al. (2015)).
6 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
7. one-to-one, where two users communicate with one another; one-to-many, where one user
converses with either two or more participants at the same time; and many-to-many, where a
group of users communicate and collaborate on a specific topic (Cleveland et al., 2015).
Twitter provides users with the ability to re-post (retweet) other users’ posts in their own
network. As a result, this exchange propagates knowledge exchange with new audiences. For
example, in their study, Zhang et al. (2010) found that users relied on microblogging to share
different types of information through frequent and lengthy conversations. The shared
knowledge assisted the participants with clarification on the type of work performed by
others and location of knowledge for the purposes of solving specific situational questions.
In their microblogging study, Zhao et al. (2011) found that over 90% of the posts were
work-relevant, lending further proof to the argument that microblogging facilitates the
transfer of situational and procedural knowledge. For example, nearly half of the informa-
tion exchanges (44%) concerned task statuses. The researchers determined that microblog-
ging served as a tool to exchange information related to daily work activities. In a similar
study, Riemer et al. (2011) found that microblogging facilitated transfer of knowledge
related to task coordination, delegation of specific work, work-related questions, meeting
coordination, meeting agendas, statements of opinions and feedback on ideas, and replies to
messages.
Studies demonstrate that microblogging has been used to facilitate user interaction for the
purpose of sharing lessons. For example, in their study on microblogging in an educational
setting, Ebner et al. (2010) showed that the platform is utilized for the capture of lesson-
related communication, by allowing one user to become part of another user’s learning
process. The platform was shown to enable collective user participation for the purposes
of specific problem solving.
In a related study, Carpenter (2014) found that nearly half of microblogging student use
was for the purposes of distributing links to education sources and related articles (24% of
peer-interaction tweets) and curriculum materials and lesson plans (23%). Moreover, Mu¨ ller
and Stocker (2011) demonstrated that microblogging helped users to acquire best practices,
access standards/quality procedures, and use and improve documentation standards, docu-
ment quality, and document processes. The researchers also discovered that the platform led
to an improved information flow, promotion of learning and knowledge management prac-
tices and learning, and diffusion of rich experiences, leading to more innovative thinking.
Figure 4. Microblogging knowledge creation process.
Cleveland et al. 7
by guest on October 13, 2016ldm.sagepub.comDownloaded from
8. Finally, Wright (2010) found that microblogging posts made by students were used for the
purposes of reflective thinking. Users reported that the platform helped them overcome
social isolation, while the character limit focused their attention on purposeful reflection
with regard to their experiences.
Microblogging conveyance through stories and personal notes. Earlier, we argued that personal
stories and notes are useful tools for the conversion of tacit into tacit and tacit into explicit
knowledge. Here we demonstrate the ability of the microblogging features to facilitate the
use of such tools.
Microblogging platforms provide users with the ability to group microblogging posts into
stories. These events are called social curation and deliver considerable value to the micro-
blogging community. Web services sites such as Storify and Togetter allow content organ-
izers to formulate a story from a list of microblogging posts. For example, Duh et al. (2012)
demonstrated that a sample of 10.2 million microblogging posts from 800,000 users con-
tained 96,000 lists consisting of diaries (9%), problem solving (16%), collections of long
articles (19%), and conversations on specific topics (19%). This multiplicity of interactions
demonstrates that users are able to transcend the character limitation and engage in uniform
storytelling for the purposes of information exchange.
Furthermore, Reinhardt et al. (2009) found that over 40% of users in their Twitter study
used the platform to capture personal notes for the purposes of knowledge building and
information sharing with others. Similarly, in their study of microblogging use, Pepe and
Mayernik (2012) demonstrated that the platform is used by scientists to document field
research data in the form of notes. Their results demonstrated that microblogging notes
taken on the spot as short text messages can facilitate the transfer of tacit into explicit
knowledge.
Microblogging and Digital Natives
The birthdate for Digital Natives is 1980. Digital Natives are children who have grown up
with technology (Prensky, 2001). Others have referred to Digital Natives as ‘‘Gen C, Gen I,
Net Gen, Gen Y, Gen Z, and Internet Generation’’ (Howell, 2012). Another name for this
generation is ‘‘Net Generation’’ or ‘‘Net Geners’’ (Tapscott, 1998). Tapscott (2008) back-
dated the ‘‘Net Generation’’ or ‘‘Net Geners’’ date of birth to 1977. Jukes et al. (2010) refer
to these Digital Natives simply as the ‘‘Digital Generation.’’ For the purpose of this paper,
Digital Natives is used.
Because these students have grown up in the Information Age, it is believed that these
students learn and think differently from non-Digital Native students. Despite this notion, a
large number of faculty members are using traditional teaching methods. It was found that
90% of students own laptops and 86% own Smart Phones. Use of mobile devices may be
banned in the classroom (Dahlstrom et al., 2013).
Digital Natives and Digital Immigrants were initially introduced to distinguish the dif-
ference between young people today and their elders (Prensky, 2001). As time passed, it was
believed that the idea of Digital Natives and Digital Immigrants would become less relevant
because people would have grown up in the era of digital technology. To that end, Prensky
(2009) introduced a new term, Digital Wisdom, and defined it as a twofold concept. He
referred to Digital Wisdom as the use of technology to access cognitive power beyond our
innate capacity and as a means to enhance our capabilities.
8 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
9. In contrast to mobile devices being banned, learning with mobile devices has been proven
to further engage Digital Natives in how they want to learn (Gikas and Grant, 2013). The
cost of providing mobile functionality for the LMS could be a barrier to this type of learn-
ing. The mobile module is not a part of the baseline LMS provided by the vendor.
Dahlstrom et al. (2013) demonstrated that students learn best when the learning envir-
onment is blended. While most faculty members are knowledgeable about traditional teach-
ing and learning approaches, he or she may need to learn best practices in teaching for online
learning to create an environment the students learn best in (Prensky, 2001). A widely
used theory for design and delivery of online courses is the Community of Inquiry (CoI)
theory. The need for the theory was driven by the need to understand computer-mediated
communication and computer conferencing in supporting an education experience (Garrison
et al., 1999).
While Twitter’s intended use is as social media, Twitter can be used as a tool for teaching
and learning in an educational environment. Twitter’s features and functions allow for
Digital Natives to learn in the way they want to learn using technology, in a blended learning
environment, and on a mobile device. Twitter also allows for faculty to put in practice online
teaching and learning best practices identified in the CoI theory. Twitter’s mobile app can be
used as an alternative to purchasing LMS vendors’ mobile modules to offset the cost.
As one can see, using Twitter in education can yield multiple benefits in teaching today’s
students; therefore, the purpose of this section is to further discuss why Twitter is a legit-
imate tool for teaching and learning. As mentioned above, Digital Natives learn best in a
blended learning environment; therefore, first Twitter and CoI will be discussed.
Twitter and CoI. The idea behind the CoI is computer-mediated communication and computer
conferencing in supporting an education experience (Garrison et al., 1999). The CoI con-
structs are: teacher presence, cognitive presences, and social presences. Cognitive presence is
the extent to which participants in any particular configuration of a community of inquiry
are able to construct meaning through sustained communication (Garrison et al., 2001).
Social presence is the ability of learners to project their personal characteristics into the
community of inquiry, thereby presenting themselves as ‘‘real people’’ (Rourke et al., 2007).
Teaching presence is defined as the design, facilitation, and direction of cognitive and social
processes for the purpose of realizing personally meaningful and educational worthwhile
learning outcomes (Anderson et al., 2001). The overarching idea behind the CoI is that the
three constructs must be present in the learning space in order for an education transaction
to take place.
Twitter allows for the CoI to be put into practice because faculty has the ability to allow
students to follow them. Once students are following the faculty member, teacher presences
can be addressed by the faculty member tweeting. Tweeting is posting content of no more
than 140 characters that followers can see. Content can be text, pictures, and videos. For
example, faculty could post a video or link to an article related to the learning objectives that
the faculty member is teaching about. The faculty can also facilitate social and cognitive
presences by making sure students are tweeting with one another in a timely manner and by
making sure the students’ tweets are contributing to the learning process.
Twitter allows for faculty to address social presence, because students can post content,
like pictures and videos, that will project him or her as real. Students are also able to follow
their peers and instructor and reply to tweets. Tweeting is important to the social presence
construct because it allows a conversation to happen with real people.
Cleveland et al. 9
by guest on October 13, 2016ldm.sagepub.comDownloaded from
10. Cognitive presence can be addressed using Twitter by students exchanging information
related to the learning objective. Students can add new knowledge that may not be a part of
the discussion. Students are also able to get immediate feedback from peers if the instructor
is not available to respond.
The fact that Digital Natives like learning in a blended learning environment and faculty
are able to address Digital Natives’ learning style using Twitter by putting CoI online
learning best practices in practice, Twitter is appropriate for teaching and learning in
education.
In addition to addressing the needs of Digital Natives, Digital Wisdom is addressed when
Twitter and CoI are married together. Twitter is the technology that houses the information
that allows users to become wiser because the information is readily available when users are
ready to absorb it. The use of Twitter and CoI enhances students’ capabilities because
students have to research new information to create a cognizant connection noted as a
fact of the CoI framework. Students’ capacity increases because research skills and content
knowledge are heightened. Because students are using technology, their self-efficacy is devel-
oped; therefore, the students become better disseminators of information. Moreover, the
students become adept and are able to repeat the information gathering and information
dissemination processes again for new information discovery.
Next, Digital Natives and Twitter are discussed in more detail.
Twitter and Digital Natives. It is believed that Digital Natives learn differently (Kelly et al.,
2008; Prensky, 2001), and K-12 institutions and Higher Education institutions haven’t
changed teaching and learning practices to capitalize on how Digital Natives want to
learn (Kelly et al., 2008).
Research shows that students want to email, chat with instant messaging, surf the inter-
net, read and publish blogs, text with cell phones, take and send pictures with cell phones,
play electronic and online games, and listen to, watch and create podcasts (Kelly et al.,
2008).
One way education institutions can improve the educating of Digital Natives is to
embrace applications like Twitter. While Twitter does not address every way that Digital
Natives want to learn, Twitter does allow Digital Natives to learn with technology and in an
environment that they want to learn in. Similar to text messaging, blogging, and sending and
taking pictures with a cell phone, Twitter allows for students to engage in similar types of
tasks when tweeting.
Twitter allows for learning to take place anytime anywhere via a mobile device using
Twitter’s mobile app. Research shows that 86% of Digital Natives have smartphones and
are more engaged in learning when utilizing mobile devices (Hudson, 2011). To that end,
these observations further validate Twitter as an appropriate tool for teaching and learning
in education. Next, the benefits of Twitter’s having a mobile app are further discussed.
Twitter’s mobile application benefits. Studies show that over 50% of faculty believe that mobile
devices can enhance learning, while students reported that the use of mobile devices
increased communication among them (Gikas and Grant, 2013). By using mobile devices,
students can quickly access course documents and upload and post course content anywhere
(Sharples et al., 2010; Traxler, 2007, 2010).
While learning with mobile devices yields a positive impact on student success, mobile
modules are not a part of the LMS base package. Schools are facing funding issues due to
10 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
11. states implementing performance-based funding, low enrollment, and student retention. As a
result of lack of funding, educational institutions faced with investment decisions on whether
to acquire a mobile module may reconsider such expenditures; however, for education to
reap the benefits of mobile teaching and learning, Twitter can be used as an alternative.
Twitter has mobile apps for Apple and Android users.
Mobile code and device security. Cyber security has been a growing concern as there have been
major headlines concerning poor Information Assurance posture with the Department of
Defense (DoD), Target, Sony, and more. The used mobile device itself contains vulnerabilities
resulting from inherent weaknesses that even users may not be aware of (Vigna, 2003). This
makes it difficult to protect users, as they wish to use mobile devices for educational tweets.
Social engineering and intelligence analysis on educational tweets
With the rise of Web 2.0, Twitter has become a tool of choice for universities looking to
increase their digital footprint. However, there is not much guidance given on the protections
of these tweets or the secure integration of Twitter into other Web 2.0 applications. As a
result, this paper explores methods with which Twitter and its data can be exploited for
nefarious uses (Dawson and Omar, 2015). Explored in this paper are the methods with which
Twitter and its data can be exploited for nefarious uses.
Open Source Intelligence. The intelligence field of Open Source Intelligence (OSINT) relies on
data that is freely available on the public domain to conduct an analysis. OSINT is con-
ducted by collecting data in an overt manner. OSINT has been defined by the United States
(US) DoD and the US Director of National Intelligence as analysis produced from publicly
available information that is collected, exploited, and disseminated for the purpose of
addressing a specific intelligence requirement (Congress, 2006). Displayed in Subtitle D –
intelligence – Related Matters SEC. 931., 932., and 933 are findings by Congress for the
DoD strategy for OSINT (Congress, 2006). These findings provide a basis for the import-
ance of OSINT as it relates to intelligence.
Geolocation. Twitter allows geolocation tags in tweets through a geotagging feature in the
Twitter Application Programing Interface (API) (Twitter, 2014). Twitter provides terms of
Twitter’s Developer Policy regarding aggregation, caching, and storing of geographic infor-
mation (Twitter, 2014). However, anyone who develops an application using this API can
tweak items, providing even more granularity of its users. Even without modification of
tweets, simply adding the location will provide details such as neighborhood, city, state, or
country. This publication information can be used to start an analysis. In iOS version 6.26þ
and Android version 5.55þ, precise location can be shared if elected to do so. Also, third
party applications or websites may share precise tweet locations as well.
Personal Twitter accounts provide the ability to associate a specific location (Figure 5).
This location over time can provide trends of locations visited with time/date stamps. This
can be used to start developing a full analysis on tweeting trends from particular locations,
frequency of location visits, and content analysis through text mining.
Exchange Image File Format. Exchange Image File Format (EXIF) data is a standard that
specifies the formats for images, sounds, and ancillary tags used by digital cameras.
Cleveland et al. 11
by guest on October 13, 2016ldm.sagepub.comDownloaded from
12. The EXIF digital image standard specifies the following: the basic structure of digital image
data files, tags and JPEG marker segments the standard uses, and how to define and manage
format versions (Tesˇ ic´ , 2005). Research has been conducted on how to effectively extract
EXIF data for prosecuting those involved in child pornography (Alvarez, 2004).
Extracting EXIF data using the ImageMagick application is rather simple in Debian
based Linux operating systems. First, the following command is run: ‘‘sudo apt-get install
Figure 6. Twitter photo example.
Figure 5. Twitter location example.
12 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
13. imagemagick.’’ Next, the following command is run to extract the EXIF data: ‘‘identify -
verbose/usr/share/backgrounds/sample_exif.jpg j grep ‘‘exif:’’.’’ The EXIF data output for
Figure 6 is displayed in Figure 7.
The data that is provided includes date and time of photo taken, camera used, and other
properties that allow for a more detailed analysis over time. There are more programs than
ImageMagick that allow the viewing of EXIF data. This includes applications that can be
added to the Chrome browser, Firefox browser, and downloadable applications.
Figure 7. Exchange Image File Format data output.
Cleveland et al. 13
by guest on October 13, 2016ldm.sagepub.comDownloaded from
14. Stenography. Tweets can contains photos that have compressed and encrypted embedded
data. Data can be hidden in image and audio files, making it nearly impossible for institu-
tions to look at files that could contain information that is geared towards radical, extremist,
or terrorist ideologies. Researchers uncover the validity of tweets used by political reports
which can be correlated to use by nefarious organizations (Coddington et al., 2014). This
means that students, professors, or staff could be unknowingly retweeting images that can be
used for communication propaganda or illicit instructions. Figure 8 displays an example of
the extraction of a photo using Steghide, where a simple text, 123456, was embedded using
the command ‘‘steghide extract -sf pic.jpeg.’’
Text mining. The words contained in tweets provide another method of collecting intelligence
through discovery of similar words, anomaly detection, and discussion tracking (Berry and
Figure 8. Steghide stenography example.
Table 1. Open source mining tools.
Software application Description and potential use
R language Language used for statistical computing and graphics.
Maltego Program used to determine the relationships and real world links.
RapidMiner Program used for all steps of the data mining process including results
visualization, validation, and optimization.
RStudio Integrated development environment for R that allows for the use of R.
KNIME Used for enterprise reporting, Business Intelligence, data mining,
data analysis, and text mining.
Python High level, general purpose programming language.
14 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
15. Castellanos, 2004). Thus conversations had with others in the form of public replies can be
further analyzed for patterns, keywords, and relationship discovery. Table 1 provides a list
of software applications with their description and potential use.
Conclusion
This paper demonstrates the viability for microblogging to facilitate student knowledge
creation practices. It proposes a model to describe how specific microblogging features
can enhance the conveyance and convergence practices for the purposes of acquiring and
transferring tacit and explicit knowledge among Twitter users.
Moreover, Twitter is proposed as a legitimate tool for teaching and learning. The fact that
the use of Twitter can address several best practices when teaching today’s students/Digital
Natives further validates Twitter as a quality teaching tool. Individuals responsible for
educating Digital Natives should act now by sharing with their respective institutions how
Twitter can be used to put online teaching best practices like CoI into practice, how Twitter
can be used as a mobile app alternative, and how Twitter can be used to create a blended
learning environment desired by today’s students.
Finally, while higher education institutions continue to increase the use of Web 2.0 in
the classroom, this article provides evidence of the potential extraction of specific identi-
fiable information that Twitter posts contain. As there are a number of proprietary and
open source applications that allow for the extraction of images, the images should have
the metadata removed. The current concern of universities is the type of content shared
and not the data contained. This needs to change to ensure the overall privacy of the
individual sending out the tweets. As a result, higher education institutions are encouraged
to create policies to ensure that security and privacy of students’ educational tweets are
protected.
Declaration of conflicting interests
The authors declare that there is no conflict of interest.
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-
profit sectors.
References
Alvarez P (2004) Using extended file information (EXIF) file headers in digital evidence analysis.
International Journal of Digital Evidence 2(3): 1–5.
Anderson T, Rourke L, Archer W, et al. (2001) Assessing teaching presence in computer conferencing
transcripts. Journal of the Asynchronous Learning Network 5(2): 1–12.
Berry MW and Castellanos M (2004) Survey of text mining. Computing Reviews 45(9): 548.
Carpenter JP (2014) Twitter’s capacity to support collaborative learning. International Journal of
Social Media and Interactive Learning Environments 2(2): 103–118.
Cleveland S (2013) On-the-job informal learning practices for IS students. In: Proceedings of 2013
Southern Association for Information Systems Conference, GA, USA, 8–9 March 2013, pp.16–21.
Association for Information Systems, Savannah.
Cleveland et al. 15
by guest on October 13, 2016ldm.sagepub.comDownloaded from
16. Cleveland S and Ellis TJ (2013) Determining microblogging effectiveness for capturing quality know-
ledge. In: Proceedings of the 19th Americas Conference on Information Systems (AMCIS), Chicago,
IL, USA, 15–17 August 2013. Association for Information Systems.
Cleveland S, Ellis T and Hinojosa C (2015) Knowledge exchange via unified communication services:
A grounded theory approach. In: 21st Americas Conference on Information Systems, Puerto Rico,
13–15 August 2015. Association for Information Systems.
Coddington M, Molyneux L and Lawrence RG (2014) Fact checking the campaign how political
reporters use Twitter to set the record straight (or not). The International Journal of Press/
Politics 19(4): 391–409.
Collins R, Deek F and Hiltz S (2015) Share and Share Alike: Integrating Internet Resource Sharing
Into Learning. In: 21st Americas Conference on Information Systems. Association for Information
Systems, Puerto Rico.
Congress (2006) U.S. Senate Armed Services Committee. 2006. National Defense Authorization Act
for Fiscal Year. Public Law. Washington, DC: USGPO, pp.109–163.
Dahlstrom E, Walker J and Dziuban C (2013) ECAR study of undergraduate students and informa-
tion technology. 2013.
Dahlstrom E, de Boor T, Grunwald P, et al. (2011) ECAR national study of undergraduate students and
information technology. Available at: http://net.educause.edu/ir/library/pdf/ERS1103/ERS1103W.
pdf (accessed 14 March 2016).
Dawson M and Omar M (2015) New Threats and Countermeasures in Digital Crime and Cyber
Terrorism. Hershey, PA, USA: IGI Global.
De Jong T and Ferguson-Hessler MG (1996) Types and qualities of knowledge. Educational
Psychologist 31(2): 105–113.
Dennis AR, Fuller RM and Valacich JS (2008) Media, tasks, and communication processes: A theory
of media synchronicity. MIS Quarterly 32(3): 575–600.
Duh K, Hirao T, Kimura A, et al. (2012) Creating stories: Social curation of Twitter messages. In:
Proceedings of the International AAAI Conference on Web and Social Media, Dublin, Ireland, 4 June
2012.
Ebner M and Mauerer H (2008) Can Microblogs and Weblogs change traditional scientific writing? In:
Proceedings of E-Learn 2008, Las Vegas, 17–21 November 2008, pp.768–776. AACE.
Ebner M, Lienhardt C, Rohs M, et al. (2010) Microblogs in higher education – a chance to facilitate
informal and process-oriented learning? Computers & Education 55(1): 92–100.
Garrison DR, Anderson T and Archer W (1999) Critical inquiry in a text-based
environment: Computer conferencing in higher education. The Internet and Higher Education
2(2): 87–105.
Garrison DR, Anderson T and Archer W (2001) Critical thinking, cognitive presence, and computer
conferencing in distance education. American Journal of Distance Education 15(1): 7–23.
Gikas J and Grant MM (2013) Mobile computing devices in higher education: Student perspectives
on learning with cellphones, smartphones & social media. The Internet and Higher Education
19(2013): 18–26.
Goffin K and Koners U (2011) Tacit knowledge, lessons learnt, and new product development. Journal
of Product Innovation Management 28(2): 300–318.
Hanseth O and Lyytinen K (2004) Theorizing about the design of Information Infrastructures: Design
kernel theories and principles. Sprouts: Working Papers on Information Environments, Systems and
Organizations 4: 207–241.
Howell J (2012) Teaching with ICT: Digital Pedagogies for Collaboration and Creativity. Melbourne,
Australia: Oxford University Press.
Hudson HT (2011) The digital divide. Instructor 121(2): 46–50.
Java A, Song X, Finin T, et al. (2007) Why we twitter: Understanding microblogging usage and
communities. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web
mining and social network analysis, San Jose, CA, USA, 12–15 August 2007, pp.56–65. ACM.
16 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
17. Jonassen DH and Hernandez-Serrano J (2002) Case-based reasoning and instructional design: Using
stories to support problem solving. Educational Technology, Research and Development 50(2): 65.
Jukes I, McCain T and Crockett L (2010) Understanding the Digital Generation: Teaching and Learning
in the New Digital Landscape. Thousand Oaks, CA: Corwin Press.
Kelly FS, McCain T and Jukes I (2008) Teaching the Digital Generation: No more Cookie-cutter High
Schools. Corwin Press.
Knipfer K, Kump B, Wessel D, et al. (2013) Reflection as a catalyst for organisational learning. Studies
in Continuing Education 35(1): 30–48.
Koskinen KU and Aramo-Immonen H (2008) Remembering with the help of personal notes in a
project work context. International Journal of Managing Projects in Business 1(2): 193–205.
Loo R (2002) Journaling: A learning tool for project management training and team-building. Project
Management Journal 33(4): 61.
Lopez-Nicolas C and Soto-Acosta P (2010) Analyzing ICT adoption and use effects on knowledge
creation: An empirical investigation in SMEs. International Journal of Information Management
30(6): 521–528.
McIntosh D (2014) Vendors of learning management and e-learning products. Learning Management
Vendors 2014: 88–96. Available at: http://www.anitacrawley.net/Resources/LMS%20Vendors.pdf.
Matturro G and Silva A (2010) A model for capturing and managing software engineering knowledge
and experience. Journal of Universal Computer Science 16(3): 479–505.
Mu¨ ller J and Stocker A (2011) Enterprise microblogging for advanced knowledge sharing: The
References@ BT Case Study. J. UCS 17(4): 532–547.
Newell S (2004) Enhancing cross-project learning. Engineering Management Journal 16: 12–20.
Nonaka I (1994) A dynamic theory of organizational knowledge creation. Organization Science 5(1):
14–37.
Nonaka I and Takeuchi H (1995) The Knowledge-creating Company: How Japanese Companies create
the Dynamics of Innovation. New York, NY: Oxford University Press.
Pepe A and Mayernik MS (2012, January). The use of microblogging for field-based scientific research.
In: 45th Hawaii International Conference on System Science (HICSS), pp. 1666–1675. IEEE.
Pirolli P and Card S (1999) Information foraging. Psychological Review 106(4): 643–675.
Prensky M (2001) Digital natives, digital immigrants part 1. On the Horizon 9(5): 1–6.
Prensky M (2009) H. sapiens digital: From digital immigrants and digital natives to digital wisdom.
Innovate: Journal of Online Education 5(3): 1.
Reinhardt W, Ebner M, Beham G, et al. (2009) How people are using Twitter during conferences. In:
Creativity and Innovation Competencies on the Web. Proceedings of the 5th EduMedia, 4–5 May
2009, pp.145–156. Salzburg, Austria: AACE.
Riemer K, Altenhofen A and Richter A (2011) What are you doing? – Enterprise microblogging as
context building. In: 19th European Conference on Information Systems, 9–11 June 2011. Helsinki,
Finland: AIS.
Rourke L, Anderson T, Garrison DR, et al. (2007) Assessing social presence in asynchronous text-
based computer conferencing. International Journal of E-Learning & Distance Education 14(2):
50–71.
Savolainen R (2006) Time as a context of information seeking. Library & Information Science Research
28(1): 110–127.
Seebach C (2012) Searching for answers–knowledge exchange through social media in organizations.
In: 45th Hawaii International Conference on System Science (HICSS), 4–7 January 2006, pp.3908–
3917. Maui, HI: IEEE.
Sharples M, Taylor J and Vavoula G (2010) A theory of learning for the mobile age. Medienbildung in
Neuen Kulturra¨umen. Wiesbaden, Germany: Springer, pp.87–99.
Tapscott D (1998) Growing up Digital. New York: McGraw-Hill.
Tapscott D (2008) Grown Up Digital: How the Net Generation is Changing Your World HC. New York:
McGraw-Hill.
Cleveland et al. 17
by guest on October 13, 2016ldm.sagepub.comDownloaded from
18. Tasdemir M (2010) The effects of the REAP reading comprehension technique on students’ success.
Social Behavior and Personality: An International Journal 38(4): 553–560.
Tesˇ ic´ J (2005) Metadata practices for consumer photos. IEEE MultiMedia 12(3): 86–92.
Traxler J (2007) Defining, discussing and evaluating mobile learning: The moving finger writes and
having writ. The International Review of Research in Open and Distributed Learning 8(2).
Traxler J (2010) Distance education and mobile learning: Catching up, taking stock. Distance
Education 31: 129–138.
Twitter (2014) Geo Guidelines. Available at: https://dev.twitter.com/overview/terms/geo-developer-
guidelines (accessed 5 March 2016).
Twitter (2016) Twitter Usage. Available at: https://about.twitter.com/company (accessed 5 March
2016).
Vigna G (2003) Mobile agents and Security. Heidelberg, Germany: Springer.
Whyte G and Classen S (2012) Using storytelling to elicit tacit knowledge from SMEs. Journal of
Knowledge Management 16(6): 950–962.
Williams T (2008) How do organizations learn lessons from projects – and do they? IEEE Transactions
on Engineering Management 55(2): 248–266.
Wright N (2010) Twittering in teacher education: Reflecting on practicum experiences. Open Learning
25(3): 259–265.
Xu Y, Tan C and Yang L (2006) Who will you ask? An empirical study of interpersonal task infor-
mation seeking. Journal of the American Society for Information Science and Technology 57(12):
1666–1677.
Yang C and Chang YS (2011) Assessing the effects of interactive blogging on student attitudes towards
peer interaction, learning motivation, and academic achievements. Journal of Computer Assisted
Learning 28(2): 126–135.
Zhang J, Qu Y, Cody J, et al. (2010) A case study of micro-blogging in the enterprise: Use, value, and
related issues. In: Proceedings of the 28th International Conference on Human Factors in Computing
Systems, 10–15 April 2010, pp.123–132. Atlanta, Georgia: ACM.
Zhao D, Rosson MB, Matthews T, et al. (2011) Microblogging’s impact on collaboration awareness:
A field study of microblogging within and between project teams. In: Collaboration Technologies
and Systems (CTS), 2011 International Conference on Collaboration Technologies and Systems
(CTS), 23–27 May 2011, pp.31–39. Philadelphia, Pennsylvania: IEEE.
Author biographies
Simon Cleveland, is an information technology industry expert with two decades of experi-
ence in managing large (up to $30 million), medium (up to $10 million) and small (up to $3
million) software systems projects for NASA, Department of Education, MD Anderson
Cancer Center, Accenture, Avanade (joint venture of Microsoft and Accenture), General
Dynamics and AOL. Dr. Cleveland was awarded a Ph.D. in Information Systems from
Nova Southeastern University. He is professionally certified Six Sigma Green Belt, project
management professional (PMP), and ITIL expert. He is also a three-time recipient of the
prestigious Dr. Harold Kerzner Scholarship awarded by the Project Management Institute
Educational Foundation. Dr. Cleveland is a part time IS professor at Northeastern
University, Brandeis University, and Nova Southeastern University.
Barcus C Jackson, ITIL is the Director of Simulation and Instructional Technology at
Goldfarb School of Nursing at Barnes-Jewish College. In the past roles, Jackson was at
Alton Community Unit School District #11 where he worked as the Director of Data and
18 E-Learning and Digital Media 0(0)
by guest on October 13, 2016ldm.sagepub.comDownloaded from
19. Technology Services and University City School District where he served as Chief
Information Officer. He also has ten years teaching experience at the University level and
has served as an Assistant professor of Information Technology and Business and as an
adjunct professor for multiple colleges and universities. Jackson received his doctor of
education, leadership from Missouri Baptist University-St. Louis, his Doctor of Computer
Science from Colorado Technical University-Colorado Springs, Masters of Business
Administration from Fontbonne University-St. Louis and a Bachelor of Science in compu-
ters from Lane College-Jackson, Tennessee. Jackson is a member of the Association of
Information Technology Professionals, Educause, and the Project Management Institute.
Additionally, he holds the ITIL (formerly known as Information Technology Infrastructure
Library), CompTIA A+, Network+, and Security+ certifications.
Barcus C Jackson, is an Assistant Professor of Information Systems (Cyber Security) at the
College of Business Administration at University of Missouri- St. Louis with affiliation to
the Cyber-security and Information Technology Innovation Lab (CITIL). Visiting Professor
at the Polytechnic University of Puerto Rico, Visiting Professor at the University of Nairobi,
and a Senior Research Fellow at the American Leadership & Policy Foundation (ALPF).
Additionally, he was a Visiting Assistant Professor (Honorary) at the University of
Tennessee in the College of Engineering within the Department of Industrial and Systems
Engineering. Dawson has received a Fulbright Scholar grant to Russia in 2014. Dawson
served as a Visiting Scholar with the University of The Gambia from 2014–2015.
Cleveland et al. 19
by guest on October 13, 2016ldm.sagepub.comDownloaded from