Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Educational Technology

Conference

2020

Institution
Keyword
Publication

Articles 1 - 13 of 13

Full-Text Articles in Education

Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley Oct 2020

Introducing Seamlessaccess.Org: Delivering A Simpler, Privacy-Preserving Access Experience, John W. Felts, Tim Lloyd, Emily Singley

Charleston Library Conference

Managing access to subscribed services in an era of abundance is a major challenge for libraries. Users have come to expect a seamless, personalized experience on their mobile devices, but traditional approaches to access management force librarians to choose between the anonymous ease of onsite IP authentication or the access friction experienced by users authenticating across multiple resources with Single Sign-On. Building on the work of the RA21 initiative, a recent NISO Recommended Practice on Improved Access to Institutionally Provided Information Resources charts a way forward. It will enable libraries to provide seamless, privacy-preserving and one-click access to its subscribed …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Design And Implementation Of An Asynchronous Undergraduate Rcr Course, Jennifer Moses, Michelle Leonard Oct 2020

Design And Implementation Of An Asynchronous Undergraduate Rcr Course, Jennifer Moses, Michelle Leonard

Florida Statewide Symposium: Best Practices in Undergraduate Research

It is not only desirable for all undergraduate researchers to have training in the Responsible Conduct of Research (RCR), but it is also important for their professional development to have a firm understanding of RCR. The Center for Undergraduate Research at the University of Florida has partnered with Marston Science Libraries and the Research Integrity Officer to design a course specific for undergraduate students conducting research. This course consists of 8 modules in addition to a retrospective post assessment, totaling 8 hours of student commitment. Once the course is completed, students have the opportunity to print a certificate of completion …


Bury Me, My Love: (Non)Choosing Reading Paths, Eleonora Acerra Jul 2020

Bury Me, My Love: (Non)Choosing Reading Paths, Eleonora Acerra

Electronic Literature Organization Conference 2020

This contribution falls within the domain of children’s and young adults’ digital literature and, in particular, in that segment of the field aimed at exploring both the potential and the limits of reading digital literary works at school. In order to describe the actual reception process (and eventually to accompany the formal introduction of e-lit creations in the French literature school programs), a selection of literary apps was presented to eight groups of young readers, across different school levels: two adaptations of contemporary picturebooks were read in four primary school classes (I can’t wait [France Télévision, 2013] and With …


Systematic Literature Review Of Soft System Method Use In Information Systems Field, Abdurehman Ali, Shimelis Shiferaw Deneke Jul 2020

Systematic Literature Review Of Soft System Method Use In Information Systems Field, Abdurehman Ali, Shimelis Shiferaw Deneke

African Conference on Information Systems and Technology

Information system (IS) papers are published in different Journals and conferences using various methods focusing on different problems. IS is an interdisciplinary field and contains information related to technology, human and organizational issues. Problems related to this are most of the time messy and confused ones and these needs soft system methodology (SSM) uses because this methodology basically emphases on activities inside the organization and allows a participation of heterogeneous groups like IS discipline do. Therefore, the study focuses on how SSM uses in IS field.

SSM help to construct complex structural and governmental conditions and delivers a possible change. …


Synchronous Online Teaching Of English As A Foreign Language With Young Learners: How Do Teachers Do It?, Ruford Cross Apr 2020

Synchronous Online Teaching Of English As A Foreign Language With Young Learners: How Do Teachers Do It?, Ruford Cross

INSPIRE Student Research and Engagement Conference

Education has been greatly enhanced by technology. Instructors and students can now interact in real time via synchronous communication. However, previous research investigating synchronous language teaching all but neglects young learners. Therefore, this research study aims to fill that gap. The study concerns itself with synchronous technology being used to teach English as a Foreign Language (EFL) to young learners in China via an online learning platform and describes the practices of current online EFL teachers. Questions about common teaching approaches, techniques, and tools were administered via an electronic survey to a sample of five respondents who currently teach online …


Using Music As A Teaching Tool To Teach Social Emotional Learning (Sel), Patrick Mcmanus, Christina Jensen Mar 2020

Using Music As A Teaching Tool To Teach Social Emotional Learning (Sel), Patrick Mcmanus, Christina Jensen

National Youth Advocacy and Resilience Conference

Social Emotional Learning (SEL) is the foundation for academic achievement. Using music to teach makes it easier for students to gain knowledge on topics such as empathy, self-management, self-awareness, social awareness, relationship skills, and responsible decision making.


Behavioral, Cognitive, And Health Benefits Of Walking While Listening To Educational Podcasts, Debra D. Ives Mar 2020

Behavioral, Cognitive, And Health Benefits Of Walking While Listening To Educational Podcasts, Debra D. Ives

National Youth Advocacy and Resilience Conference

This session will highlight the behavioral, health and cognitive benefits of walking while listening to educational podcasts. Improvement is learning, mood and healthy habits result. Attendees will get to experience these benefits first hand when they go for a walk listening to a Walking Classroom podcast. Attendees will Walk. Listen. And Learn.


Differentiated Instruction That Works For “At Risk” Students: Reaching And Meeting The Need, Henry Tellis Mar 2020

Differentiated Instruction That Works For “At Risk” Students: Reaching And Meeting The Need, Henry Tellis

National Youth Advocacy and Resilience Conference

Are you looking for differentiated instructional strategies that reach every student? Come hear how I have learned to meet the learning styles of students in my classroom. This session will provide research-based strategies on how to effectively implement center-based instruction and practical strategies to use in a risk school classroom. Learn how to reach and meet the needs of learners.


Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D. Mar 2020

Integrating The 1st Person View And The 3rd Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh Ph.D., Myunghoon Oh Ph.D.

National Training Aircraft Symposium (NTAS)

Many virtual reality (VR)-based flight simulation programs provide pilots the enhanced reality from the 1st person-view to make themselves immersed in the cockpit. Using the VR simulations, pilots can take flight training in many challenging situations that are hard to create in real environments due to its natural entropy and safety concerns such as severe crosswind or engine fire. Mixed reality (MR) technology provides three-dimensional graphics so that users can effectively see all 360 degree-vertical and horizontal aspects of an object while they freely move around to see the graphics maintaining the consciousness of real space. Flight instructors may …


Preliminary Results Of A Study Investigating Aviation Students' Intentions To Use Virtual Reality For Flight Training, Stephanie G. Fussell Mar 2020

Preliminary Results Of A Study Investigating Aviation Students' Intentions To Use Virtual Reality For Flight Training, Stephanie G. Fussell

National Training Aircraft Symposium (NTAS)

Educators have incorporated technology into flight training for decades. These devices have increased in complexity since the Link trainers of the early 20th century, resulting in aviation training devices, full flight simulators and other technologies currently used in flight training programs. Acceptance has also increased since developers shifted the design of video games to incorporate educational aspects as is demonstrated by the popularity of computer based training. Recently, educators have developed more immersive simulation technologies for training purposes such as virtual, augmented, and mixed reality (VR, AR, MR). Leveraging these technologies can positively impact learner motivation and skill acquisition …


Improving Information Literacy Through Embedding, Kelly M. Wilson, Rachel Hooper, Jay Brandes Feb 2020

Improving Information Literacy Through Embedding, Kelly M. Wilson, Rachel Hooper, Jay Brandes

Georgia International Conference on Information Literacy

How do you reach and assist students who are halfway around the world? How can we ensure they are receiving library training that increases their information literacy skills? Join us for this presentation and conversation about how one university used embedding to reach the “unreachable,” and then expanded to reach online domestic students, and eventually those on the home campus. What began as a project between two librarians on five online courses has now grown to include additional librarians and tripled the number of classes over a few months. We will discuss the reasoning behind embedding in the Canvas Learning …


An Alternative To The One-Size-Fits-All Approach To Isa Training: A Design Science Approach To Isa Regarding The Adaption To Student Vulnerability Based On Knowledge And Behavior, Thomas Jernejcic Feb 2020

An Alternative To The One-Size-Fits-All Approach To Isa Training: A Design Science Approach To Isa Regarding The Adaption To Student Vulnerability Based On Knowledge And Behavior, Thomas Jernejcic

SDSU Data Science Symposium

Any connection to the university’s network is a conduit that has the potential of being exploited by an attacker, resulting in the possibility of substantial harm to the infrastructure, to the university, and to the student body of whom the university serves. While organizations rightfully “baton down the hatches” by building firewalls, creating proxies, and applying important updates, the most significant vulnerability, that of the student, continues to be an issue due to lack of knowledge, insufficient motivation, and inadequate or misguided training. Utilizing the Design Science Research (DSR) methodology, this research effort seeks to address the latter concern of …