Universities and other education institutions are increasingly turning to technology for the delivery of their courses and programmes. But what happens when their learners are incarcerated?
Introducing digital technologies into prisons: Issues and challengesHelen Farley
• Working with jurisdictions to introduce technologies: Sceptics and advocates
• Winning hearts and minds: Working with custodial
• Security considerations: Learning what can be dangerous
• Third party security certifications
• What can go wrong and how to prevent it
• The role of dynamic security
• Making it sustainable
More than employment: The benefits of education in correctionsHelen Farley
It is easy to focus on how education prepares learners for employment upon release from custody. Yet the benefits go far beyond this. This presentation examines some of the changes we see in prisoners engaged with education.
The role of education in reducing recidivismHelen Farley
In juvenile justice, detainees are often suffering from multiple layers of disadvantage. This presentation presents a potential project to help address some of these issues and help keep people out of detention.
I was asked to present a presentation on "How cautious should we be when adopting digital technology in Education?" We should remain very cautious. Even the that which is presented as the best, remains nothing more than content replication.
Breaking away from the Industrial Revolution model of teaching isn't easy, but you don't have to do it alone. Find – and provide – curriculum advice, instructional guidance, and even social-emotional support with a professional learning network. Maybe that's on campus, but it doesn't have to be.
Introducing digital technologies into prisons: Issues and challengesHelen Farley
• Working with jurisdictions to introduce technologies: Sceptics and advocates
• Winning hearts and minds: Working with custodial
• Security considerations: Learning what can be dangerous
• Third party security certifications
• What can go wrong and how to prevent it
• The role of dynamic security
• Making it sustainable
More than employment: The benefits of education in correctionsHelen Farley
It is easy to focus on how education prepares learners for employment upon release from custody. Yet the benefits go far beyond this. This presentation examines some of the changes we see in prisoners engaged with education.
The role of education in reducing recidivismHelen Farley
In juvenile justice, detainees are often suffering from multiple layers of disadvantage. This presentation presents a potential project to help address some of these issues and help keep people out of detention.
I was asked to present a presentation on "How cautious should we be when adopting digital technology in Education?" We should remain very cautious. Even the that which is presented as the best, remains nothing more than content replication.
Breaking away from the Industrial Revolution model of teaching isn't easy, but you don't have to do it alone. Find – and provide – curriculum advice, instructional guidance, and even social-emotional support with a professional learning network. Maybe that's on campus, but it doesn't have to be.
At the Center of Academic Innovation: Two Examples from UCLAAnnelie Rugg
A presentation to the 2017 Computing Services Conference (UCCSC) at UCSD on August 9, 2017. I propose the importance for technologists in higher education to be in the important discussions of academic innovation in teaching and research BEFORE decisions are made, to ensure that the innovation is better. I provide two examples of ways to create communities where technologists and academics work as partners on innovation and gradually change the culture of innovation to be more inclusive of IT sooner in the discussion.
Designing Accessible Cyberlearning: Recommendations & Lessons Learned3Play Media
This webinar shares recommendations for how cyberlearning researchers can address accessibility issues in their research and for how instructors and designers can employ accessible technology and pedagogy in their practice.
A walk through the many methods being used in the university's Health faculty to make teaching and learning richer by using iPads and apps. Robin was accompanied by staff (Melanie Lindley, Mandy Braisford and Dave Ridley) and students (Lizzie May and Ryan Morton) who talked about their many experiences of using this technology and their ideas for the future.
Creative approaches to curriculum design in networked spaces. Keynote given by Helen Keegan at Middlesex University's Annual Learning and Teaching Conference 2014.
8 building blocks for a high performance school IT networkModrus
With more use of interactive lessons, BYOD, remote access from home and greater network and internet security within Schools, IT departments are feeling the pressure. Here are 8 key building blocks to put in place to help keep your networks performing well.
Enhancing the User Experience with Smart TechnologiesJustin Denton
Everyone is talking about Smart Home this and Smart Home that, but how and why would I want to put something like this in my home? And how can I take advantage of this technology in the library? Through this webinar we will explore how to implement Smart Home technologies in the library to drive increased patron experience, drive return visits, and continue to increase overall engagement of the visitors.
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
Smartphones, socialmedia, downloading MP3music files,watchingmovies on tablet computers—these are the types
of activities that our students are constantly engaged in. However, these are the same activities that attackers are
targeting today, yet very fewof our students knowhowto protectthemselves fromthese targeted attacks. In this
presentation we will look at practical security instruction that can be added to any computer course in order to help
our students stay secure.
PresIDIo 1 & 2 WhAT shoulD I geT ouT
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action"
Learn from those in the trenches who have deployed effective cyber strategies in their organizations, foiled attacks and managed breach situations. Learn approaches for success and pitfalls to avoid by exploring the experience of others with deployment and management of cyber security strategies and plans.
Learning Objectives:
Identify successes, challenges and lessons learned with implementation of cyber strategies
Identify success strategies for gaining the C Suite support and ways cyber security can be integrated into the organization's culture and work processes.
Identify best practices with anticipating new and emerging threats and ways to maintain a proactive position instead of reactive
Identify approaches for breach preparation and breach management
Featured Speakers:
Neal Ganguly, MBA, FCHIME, FHIMSS, CHCIO
VP & CIO
JFK Health System
Miroslav Belote
Director of IT – Infrastructure and Information Security Officer
JFK Health System
Nassar Nizami
CISO
Yale-New Haven Health System
Heard about federated single sign-on but not sure what it is, how it works or what the benefits are? Our Back to Basics webinar explains in a simple, easy to follow presentation.
At the Center of Academic Innovation: Two Examples from UCLAAnnelie Rugg
A presentation to the 2017 Computing Services Conference (UCCSC) at UCSD on August 9, 2017. I propose the importance for technologists in higher education to be in the important discussions of academic innovation in teaching and research BEFORE decisions are made, to ensure that the innovation is better. I provide two examples of ways to create communities where technologists and academics work as partners on innovation and gradually change the culture of innovation to be more inclusive of IT sooner in the discussion.
Designing Accessible Cyberlearning: Recommendations & Lessons Learned3Play Media
This webinar shares recommendations for how cyberlearning researchers can address accessibility issues in their research and for how instructors and designers can employ accessible technology and pedagogy in their practice.
A walk through the many methods being used in the university's Health faculty to make teaching and learning richer by using iPads and apps. Robin was accompanied by staff (Melanie Lindley, Mandy Braisford and Dave Ridley) and students (Lizzie May and Ryan Morton) who talked about their many experiences of using this technology and their ideas for the future.
Creative approaches to curriculum design in networked spaces. Keynote given by Helen Keegan at Middlesex University's Annual Learning and Teaching Conference 2014.
8 building blocks for a high performance school IT networkModrus
With more use of interactive lessons, BYOD, remote access from home and greater network and internet security within Schools, IT departments are feeling the pressure. Here are 8 key building blocks to put in place to help keep your networks performing well.
Enhancing the User Experience with Smart TechnologiesJustin Denton
Everyone is talking about Smart Home this and Smart Home that, but how and why would I want to put something like this in my home? And how can I take advantage of this technology in the library? Through this webinar we will explore how to implement Smart Home technologies in the library to drive increased patron experience, drive return visits, and continue to increase overall engagement of the visitors.
Course Tech 2013, Mark Ciampa, Helping Students Stay SecureCengage Learning
Smartphones, socialmedia, downloading MP3music files,watchingmovies on tablet computers—these are the types
of activities that our students are constantly engaged in. However, these are the same activities that attackers are
targeting today, yet very fewof our students knowhowto protectthemselves fromthese targeted attacks. In this
presentation we will look at practical security instruction that can be added to any computer course in order to help
our students stay secure.
PresIDIo 1 & 2 WhAT shoulD I geT ouT
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security Strategies into Action"
Learn from those in the trenches who have deployed effective cyber strategies in their organizations, foiled attacks and managed breach situations. Learn approaches for success and pitfalls to avoid by exploring the experience of others with deployment and management of cyber security strategies and plans.
Learning Objectives:
Identify successes, challenges and lessons learned with implementation of cyber strategies
Identify success strategies for gaining the C Suite support and ways cyber security can be integrated into the organization's culture and work processes.
Identify best practices with anticipating new and emerging threats and ways to maintain a proactive position instead of reactive
Identify approaches for breach preparation and breach management
Featured Speakers:
Neal Ganguly, MBA, FCHIME, FHIMSS, CHCIO
VP & CIO
JFK Health System
Miroslav Belote
Director of IT – Infrastructure and Information Security Officer
JFK Health System
Nassar Nizami
CISO
Yale-New Haven Health System
Heard about federated single sign-on but not sure what it is, how it works or what the benefits are? Our Back to Basics webinar explains in a simple, easy to follow presentation.
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
Thinking about allowing students to bring their own devices to school next year? Join us as we discuss how to make this innovative approach work. Discussion will include the advantages and pitfalls of such an implementation, revising policies, classroom management, and helping teachers to adapt.
Similar to Using emerging digital technology for learning in prisons (20)
Beyond standards: reimagining acoustic design in prisonsHelen Farley
Drawing insights from the emerging field of sensory criminology, this paper delves into the distinctive
acoustic requirements within prisons, shedding light on the differences that exist between the acoustic
needs of incarcerated individuals and those outside the prison walls. The study emphasizes the crucial role
acoustics play in the daily experiences of both incarcerated individuals and corrections staff. Those in
prison rely on acoustics for communication and information gathering, while corrections staff use auditory
cues to assess the prevailing tension within the prison environment. The intricate dynamics of prison
cultures, often overlooked by acousticians, are brought to the forefront through the lens of sensory
criminology. This paper advocates for a multidisciplinary approach, suggesting that acousticians
collaborate with complementary disciplines to design spaces that encourage positive communication and
simultaneously address the risks associated with undesirable social dynamics. By integrating insights from
sensory criminology, acousticians can create purposeful designs that benefit both incarcerated individuals
and corrections staff, ensuring a well-informed and effective acoustic environment.
Introducing technology for learning in prisons: meeting challenges and realis...Helen Farley
Individuals responsible for the management and administration of prisons often show a willingness to adopt innovative technologies for operational efficiency. However, in cases where a choice must be made between prioritizing security measures and the rehabilitation of people in prison, the former tends to take precedence, sometimes at the expense of the latter. The emergence of COVID-19 lockdowns, which confined individuals to their cells for extended periods and disrupted educational programs, has prompted jurisdictions to reevaluate the advantages of educational technology. Drawing from our involvement in these kinds of initiatives, we present key insights to enrich this ongoing dialogue.
This presentation looks at neurodiversity within corrections in New Zealand. Neurodiversity is often viewed negatively, yet it is often the hallmark of original and creative thinkers.
Virtual Worlds in Higher Education: The Challenges, Expectations and DeliveryHelen Farley
Virtual worlds (VWs) are providing welcome opportunities for the development of innovative curricula for tertiary educators. These environments potentially allow them to give their students authentic learning experiences that resemble real life tasks and scenarios. In addition, virtual worlds are extremely useful when training students to perform tasks that are too expensive or dangerous to perform in real life (Adams, Klowden, & Hannaford, 2001). Well-designed simulations implemented in these environments can provide risk-averse and cost-effective simulations of authentic contexts that can facilitate optimal learning, especially when enhanced with the capability for tactile precision and haptic feedback.
This chapter, while acknowledging the enormous potential of virtual worlds for higher education, will investigate the range of challenges also associated with implementing these environments into curricula. These include the use of appropriate pedagogical models and the large learning curve for novice users. The chapter will conclude with a discussion of how these challenges can be mitigated, taking into account the latest technical developments in virtual worlds and associated hardware.
Evaluation of mobile teaching and learning projects, introductionHelen Farley
In the decade and a half since the beginning of the new millennium, mobile computing technologies have evolved rapidly, enabling increasingly sophisticated methods of communication and interaction. As a result of the incremental improvements in design, tendency towards reduced size, increased functionality, improvements in data storage capability, and the reliability and ubiquity of the networks that support them, mobile technologies are increasingly perceived as essential to the conduct of people’s everyday lives (Evans-Cowley, 2010).
Mobile learning initiatives in nursing educationHelen Farley
Mobile learning is a very exciting approach to learning that has the possibility of changing nursing education, providing learning to nurses when and where they need it and in a manner that will achieve positive learning outcomes. Coming from an apprenticeship model in the military, nurses have traditionally learnt by seeing and then doing. Mobile learning through means such as You Tube and augmented reality offer the best of this traditional way of learning combined with time and cost efficient means of technology use and greater theoretical knowledge. Reaching nurses in rural and isolated communities is also possible through these means. This is achieved through the use of SMS and online learning, that is able to be used at a time and place suitable for the nurse, enabling them to include learning within their lives in a way that suits them. Many isolated trials have occurred in nursing education over the years, starting with the use of PDA’s and although many have shown success there is not a great deal of research been conducted in the use of mobile education in nursing. Considering this research was conducted using a grounded theory approach that investigated nurse’s current use of mobile technology and their beliefs around mobile learning. The study also explored how and when nurses are undertaking continuing education, with the discovery of how they personally resource their learning. When looking at trials of mobile learning within nursing education, it is apparent from these trials and the study that nurses are ready for mobile learning and that mobile learning shows great potential as a method for education within the nursing profession.
Mobile learning in Southeast Asia: Opportunities and challengesHelen Farley
Mobile learning has been adopted to a varying extent across the countries of Southeast Asia. Though mobile learning initiatives in the UK, Europe, the United States and Australia are well-documented, much less in known is known about mobile learning initiatives in Southeast Asia. This region is culturally and economically diverse, containing both developed countries such as Singapore and developing countries including East Timor. This range of economic development means that the penetration of telecommunications technologies, including infrastructure to support mobile and internet networks, varies vastly and the extent to which this technology is used for learning, similarly varies. This chapter begins with an examination of the mobile device market penetration in the various countries of Southeast Asia and the particular demographics of those users. Internet censorship potentially will impact on mobile learning initiatives in some countries and this is examined briefly. The status of mobile learning in a cross-section of Southeast Asian countries will be examined, with a particular focus on government policies, critical infrastructure and notable mobile learning initiatives. The chapter concludes with a review of the enablers and barriers to mobile learning in Southeast Asia and a look at future directions.
Moving towards the effective evaluation of mobile learning initiatives in hig...Helen Farley
Mobile learning is viewed by many institutional leaders as the solution for a student cohort that is demanding an increasingly flexibility in study options. These students are fitting study around other aspects of their lives including work and caring responsibilities, or they are studying at a geographical location far removed from the university campus. With ubiquitous connectivity available in many parts of the world and with the incremental improvements in design and affordability of mobile devices, many students are using mobile technologies to access course materials and activities. Even so, there are relatively few formal mobile learning initiatives underway and even fewer evaluations of those initiatives. This is significant because without a rigorous evaluation of mobile learning, it is impossible to determine whether it provides a viable and cost-effective way of accessing courses for both the student and the institution. This chapter examines the broad groupings of uses for mobile devices for learning, before considering the evaluation frameworks that are currently in use. The characteristics, affordances and issues of these frameworks are briefly discussed. A project to develop a Mobile Learning Evaluation Framework is introduced, which will consider evaluation from four aspects: 1) Pedagogical (Learning); 2) Pedagogical (Teaching); 3) Technical; and 4) Organizational.
The healthcare industry is rapidly evolving in tandem with a demand for increased flexibility in the delivery of education in our fast-paced society. As a result, the passive reception of content by students, delivered by an expert from the front of the class, is becoming increasingly redundant. Students are now being taught, ubiquitous connectivity allowing widespread access to online materials (Collier, Gray, & Ahn, 2011). Programs such as nursing are often offered in an external, online delivery mode (Wright, 2013). Due to an increasingly aging population, healthcare is by far one of the fastest-growing industries, and graduate job seekers choosing to enter healthcare, will need to ensure they have developed sound digital literacies, particularly as they apply to professional communication. It is imperative that students develop and leverage emerging communication technologies as part of their portfolio prior to seeking employment (Clark, 2009; Hargittai & Litt, 2013).
Tarot is central to the philosophies of the New Age. If you look in any of the numerous popular books about tarot, you will read that ancient Egyptians encoded their secrets into these mysterious cards when they were threatened by brutal invaders. Yet others say that tarot were invented by the Gypsies, then thought to be Egyptians. Alas, neither of these theories are true!
This final volume of Religion, the Occult and the Paranormal is mostly concerned with how the supernatural is finding form in popular culture, in everyday life and among the youth with their apparently insatiable appetite for all that is different, macabre, alien or sitting outside of normal society. Film franchises based on paranormal themes are among the biggest grossing films of all time. The Harry Potter franchise appeals to both adults and children alike, as does the Lord of the Rings franchise. These movies are invariably released at holiday time so parents can take their children, buy them some themed merchandise and escort them to various dress-up events populated by hundreds of small Harry Potters and Hermione Grangers. Religious and supernatural ideas are integral to the appeal of these movies. Several chapters of this volume explore that unlikely relationship. The current also flows in the other direction with popular culture providing the stuff of emerging religions. Most are familiar with Jediism, drawing its inspiration from the Star Wars franchise and the noble ideals of the Jedi Knights.
The first volume of this series has equipped us with the methodological tools for examining the occult and paranormal. The second has shown us that these themes have been present since the earliest times. This third volume of the Religion, the Occult, and the Paranormal provides examples of some of the rich diversity of ideas, practices and groups engaged in various ways with these supernatural considerations. Occult practices and ideas around the paranormal are found within each of the major world religions, often in connection with the more mythical aspects of those traditions. Bibliomancy, or divination using books, thrives within many forms of Christianity, Islamic theology is resplendent with jinns that can intervene in everyday life, and no process is more mysterious than the divinatory practices that foretell the next Dalai Lama in the “Yellow Hat” school of Tibetan Buddhism. Some of the chapters presented herein will explore just some of those crevices in South Asian religions.
Freud’s Primal Horde: Fact or Fiction?Helen Farley
The existence of the 'primal horde' is central to Sigmund Freud's theories on the beginnings of totemism and incest taboo in humankind. In this paper we begin by considering Freud's theory and examining his sources namely J. J. Atkinson and in particular Charles Darwin. By Freud's own admission, the 'primal horde' had never been observed. We investigate the possibility that such a structure ever existed. We consider the evidence as sourced from Charles Darwin and examine the possibility that Darwin's words were misinterpreted. Freud's idea of the 'primal horde' was generally accepted in anthropological circles in the early twentieth century as evidenced by Geza Roheim's enthusiastic support. We review how this theory lost favour in later times by considering the opinion of William Schmidt.
The Evolution of the ‘Mother’ in TarotHelen Farley
The first tarot decks, beautifully hand-painted in the courts of
Northern Italy in the fifteenth century, boasted wonderful images of cherubim and angels, mysterious landscapes and many enigmatic figures wearing glorious robes of gold. At first glance, it would appear that the image of the mother was absent from these original decks. Though maternal images and themes were not explicit, I will argue that the mother has always been present in the tarot deck in some form, though admittedly a portrayal of maternity was not the foremost purpose of these cards. In the trumps, women appeared as
feminine personifications of the moon and astrology, the Theological and Cardinal Virtues, as the Popess (in more recent times known as the High Priestess), and as the Empress. Further, it was usually a woman who ruled over the World trump, typically the most powerful card in the deck. It was for the game of tarot that Queens were first added to the all-masculine court of King, Knight and Jack. By examining the likely identities of the female figures illustrated in Renaissance and subsequent decks, their status in the trump hierarchy and their subsequent divinatory meanings, I will argue that over nearly five hundred years, the role of the 'mother' in tarot has
become increasingly significant. In conclusion, I will demonstrate how the image of the mother has become explicit and integral in any New Age divinatory tarot decks, some entirely focused around the idea of the archetypal 'mother'.
Editorial 28(3): Preface to the Special IssueHelen Farley
Virtual worlds (referred to by some as multi-user virtual environments or MUVEs) have generated much attention and interest among tertiary education practitioners and researchers in recent years, with many universities and colleges making use of commercial platforms like Second Life or building customised platforms using open tools and resources to suit the particular needs of their staff and students. While a number of other journals have published special issues centred around the topic of virtual worlds in education (e.g. Bell, Savin-Baden & Ward, 2008; Chandler,
Collinson, Crellin & Duke-Williams, 2009; de Freitas & Veletsianos, 2010; Hunsinger & Krotoski, 2010; Rea, 2009; Salmon & Hawkridge, 2009; Steinkuehler & Squire, 2009; Twining, 2010), a noticeable majority of the articles published in those issues have emanated from the United Kingdom and United States. In recognition of the considerable innovation, experimentation and dialogue that has been taking place in the virtual worlds arena across the tertiary education sector in Australasia (see Dalgarno, Lee, Carlson, Gregory & Tynan, 2011 for a snapshot), this special issue called for contributions from within the Australasian region, as well as from those
farther afield able to position their work against the Australasian context. Articles were requested that addressed theory, research and practical issues related to the
use of the technology in both higher and vocational education.
Machinima as a Discussion Support System for Sugar Cane FarmersHelen Farley
This machinima was produced to function as a discussion support system, modelling the sorts of conversations sugar cane farmers need to have in order to make good farming decisions in light of climate information. The script was written by Neil Cliffe, a PhD candidate working on the discussion support system project, and recorded by professional sound engineers at the University of Southern Queensland. Top Dingo created the environment and avatars and shot the visuals, bringing it all together in this high quality machinima. This machinima challenges conventional views relating to the use of video in agricultural extension.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Using emerging digital technology for learning in prisons
1. Dr Helen Farley
Practice Manager Education and
Training Southern Region,
Department of Corrections New
Zealand
Adjunct Associate Professor
University of Southern Queensland
2.
3. We estimate,
of the people
in our care …
• 57% require numeracy
and literacy support
• 66% have no formal
qualifications
compared to 23%
general population
• 4.4% have Autism
Spectrum Disorder
• 40–50% of youth have
ADHD
• 91% have a life time
diagnosis of mental
health or substance
abuse disorder
4. That results in • Emotional age not equal to physical age
• Poor impulse control – anger
• Challenges with processing information
• Poor working memory
• Challenges retaining knowledge
• Challenges with fine motor control
• Challenges with understanding
instructions
• Challenges reading and writing
6. Why is education
important?
• Integral to rehabilitation
• Significant impact on recidivism
rates
• Better mental health outcomes
• Post-release employment (but does
that matter?)
• Dynamic security
• Education is transformational
7. A technology quiz …
• Who looked at Facebook before they got out of bed?
• Who has conducted an online financial transaction today?
• Who has emailed the boss?
• Who has fed a virtual animal today?
• Who bought online concert tickets in 2020?
• Who has looked me up on Linked In?
• Who has a qualification earned entirely online?
• How many mobile devices do you have?
8.
9. Why is
technology
important?
• Improve digital literacies
• Interactive learning materials
• Address learning challenges
• Provides for opportunities beyond the classroom
• Providers are increasingly online
• Reintegration
• To improve employment prospects post-release
10. 90% of employers rate
operating a digital device
as important to the
majority of roles in their
organisation. Today almost
every job relies on some
aspect of technology:
whether it’s sitting at a PC
in an office, working at a
checkout or delivering
parcels.
Chartered Institute of IT
http://www.bcs.org/category/17854
11. Two main models
• Computer or
education labs
• In-cell technologies
• But also consider
instructional
technologies
12. Computer labs
• In New Zealand, Secure Online Learning
• Limited internet with white-listed sites
• Other materials made accessible from server loaded
centrally
• Biometric log in
• Mostly for numeracy and literacy, driver’s licence
• Challenges with third party providers
13. Computer labs
USQ’s Making the Connection
• Server-based solution – ‘USQ
Enterprise Platform’
• 8 – 10 computers
• Access to learning management
system, Libre Office and courses
• Added to existing lab via network
switch
14. Virtual reality at Otago
Corrections Facility
• Virtual mechanic’s workshop
• Embedded numeracy and literacy
15.
16. Challenges with
computer and
education labs
• Difficult to get prisoners there
• Movement issues becoming worse with overcrowding
• One or two labs for hundreds of prisoners
• Limited time with computers or VR
• Content can be expensive to produce
• But … can be cheap and secure through supervision
17. In-cell technologies in
prison
• Focus on tablet
technologies or thin
clients
• Education often an add-
on after everything else
• User pays system
sometimes exploitative
• Little user testing
• Screen real estate
compromised by
keyboard
18. But …
• Can work with the right learning
materials
• Choose the right tool for the job
• Afterthought better than no
thought at all
• Can supplement written materials
– Remand project in Central
Region, NZ
19. The right tool …
Learning graphic design
• At Otago Corrections Facility and
partnering with Methodist
Mission
• Using Socrates 360 tablets and
looking at alternatives
• Māui Studios
• Colour/design/animation
courses
• Then learners contribute to
existing projects
• Māori stories, te reo
20.
21.
22. In-cell technologies:
Making the Connection
• Two technologies: Server-based solution and
notebook computer solution
• A fleet of around 700 Offline Personal Devices
• Completely offline
• Learning Management System, Device Manager
Software, Libre Office, and higher education
courses
• Deployed in Queensland, Tasmania, Western
Australia and the Northern Territory
• Pilot in Matawhāiti Residence at Christchurch
Men's’ Prison
23.
24. What we’ve done … Device Manager Software
• Two log ins: Education officer and
Student
• Group policies
• Wi-Fi, Bluetooth, network, camera,
recorder, ports disabled
• Device Manager Software constantly
scans for attempts at re-enabling
• Constantly scans for illegal file types
• Automatically disables everything upon
sleeping
• Limits visibility for student of drives:
Can’t hide anything
• Tick or cross in task bar
25. AI in Finland
• Criminal Sanctions collaborated
with the start-up technology
company Vainu.
• Vainu offers inmates a chance to
work by classifying data to train
artificial intelligence algorithms.
• Prisoners can take a course in
basic Artificial Intelligence.
• https://www.elementsofai.com/
26.
27. Coding
• Looking at it in New Zealand – Take 2
• Next Chapter in California
• Code 4000 in UK
28. Code 4000
• Stage 1 is a training phase, and begins with teaching prisoners the
basics of HMTL, CSS, and Javascript, before moving on to more
advanced concepts such as Git, TDD, MVC, databases and full stack
development.
• Stage 2 allows successful graduates of Stage 1 to then work on real-
world projects for external clients, which will also provide a modest
income to the project.
• Stage 3 will then see them working for clients in the real world on
temporary day release.
• Stage 4 aims to help them find full time employment as developers.
29. Open University
• Virtual Campus
• L7 platform (LMS) on
laptops
• 1800 students across
120 prisons
• OpenLearn courses
• OU courses
31. Technology planning considerations
• Work closely with providers as partners
• Content is expensive to modify/create
• Copyright is tricky
• Simple is best
• Human factors
• Support is key