This article is very insightful. It clearly explains and demonstrates the differences that have occured in education over the last 20 years, particularly in the context of technology. Mobile learning is becoming more prominent in classrooms and requires teachers to be active participants in the use of technology.
To cut to the quick, Schank thinks Higher Education is a con. You pay through the nose for not very much more than a three or four year vacation and a good social life. The courses are poor and the system designed to select researchers.
“And that's the grand dilemma of social networking: it's intended to allow participation, to let companies and individuals all engage and interact, but a...
As we have progressed, not only in our use of technology but also our understanding of effective leadership, we know that communication includes effective talking but, more importantly, listening. Being able to hear what is being said from those we serve is extremely important to how we develop our schools, and the conversation is extremely valuable. Yet, many schools and organizations use social media in the old fashion: sharing information but not having a conversation. In reality, just because you have ears doesn’t mean you are listening.
Bring Your Own Device (BYOD) is more complex than most people know, read further to learn… . .
Keywords for this free course: . motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management, risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics...
The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!
=> NOBODY is perfect! A security by 100% doesn’t exist! <=
With over 10 million users, Pinterest has rocketed to pop-culture fame since its launch in beta in March 2010. This rapid growth makes it the fastest growing social media site of the past year. Educators have caught on to Pinterest in a big way. From kindergarten to college, teachers, professors and students are using Pinterest creatively to organize and share ideas from all around the Web and even in their own classrooms and campuses.
. Naivety in the Digital Age means not realizing and accepting the dangers of the Internet, the ignorance of the need to secure its computer and any other device connecting to the Internet (smartphones + TV, fridge …), having no clue about Cyber-Security and people who think that Internet-Safety ALONE is enough!
===> Naif means ALSO thinking that a certain Operating System is secure and perfect! Nobody is perfect: <===
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.