What is LDT? The Learning, Design & Technology Program prepares professionals to design and evaluate educationally informed and empirically grounded learning environments, products, and programs that effectively employ emergent technologies in a variety of settings. Program Overview
More colleges and universities are exploring how to better use the trove of data they're collecting on their students to improve teaching and learning.
Gameful learning is a pedagogical approach that takes inspiration from how good games function, and applies that to the design of learning environments. Game...
I chose this video because it highlights how technology can be used to differentiate instruction and of course assessment. I think this is one of the biggest areas where technology can be a game changer in terms of presenting material in different manners and allowing students to show their knowledge and application in different ways. The comments about day to day feedback and self assessment was a theme I found in several of the clips and articles.
In this paper I identify some current elaborations on the theme of participation and digital literacy in order to open further debate on the relationship between interaction, collaboration and learning in online environments. Motivated by an interest in using new technologies in the context of formal learning (Merchant, 2009), I draw on in-school and out-of-school work in Web 2.0 spaces. This work is inflected by the new literacies approach (Lankshear & Knobel, 2006a). Here I provide an overview of the ways in which learning through participation is characterised by those adopting this and other related perspectives. I include a critical examination of the idea of “participatory” culture as articulated in the field of media studies, focusing particularly on the influential work of Jenkins (2006a; 2006b). In order to draw these threads together around conceptualizations of learning, I summarise ways in which participation is described in the literature on socially-situated cognition. This is used to generate some tentative suggestions about how learning and literacy in Web 2.0 spaces might be envisioned and how ideas about participation might inform curriculum planning and design.
Looking at how teaching and learning needs to become more advance in terms of technology. We need to be addressing and creating our lessons using the technology that is readily available to us and that our students are using on a regular basis.
M. Griselda. International Journal of Trend in Scientific Research and Development, Special Issue (2nd International Congress of Engineering):
P26 - P32(October 2017)
H. TARIQ, W. YANG, I. HAMEED, B. AHMED, and R. KHAN. IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XII):
01-07(December 2017)1 Hugh A. Chipman, Edward I. George, and Robert E. McCulloch. “Bayesian CART Model Search.” Journal of the American Statistical Association, Vol. 93(443), pp 935–948, September 1998. 2 Sujata Garera, Niels Provos, Monica Chew, and Aviel D. Rubin. “A framework for detection and measurement of phishing attacks.” In Proceedings of the 2007 ACM workshop on Recurring malicious code - WORM ’07, page 1, 2007. 3 Abhishek Gattani, AnHai Doan, Digvijay S. Lamba, NikeshGarera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, AnandRajaraman, and VenkyHarinarayan. “Entity extraction, linking, classifica- tion, and tagging for social media.” Proceedings of the VLDB Endowment, Vol. 6(11), pp 1126–1137, August 2013. 4 David D. Lewis. Naive (Bayes) at forty: The independence assumption in information retrieval. pages 4–15. 1998. 5 Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. “Learning to detect malicious URLs.” ACM Transactions on Intelligent Systems and Technology, Vol. 2(3), pp 1–24, April 2011. 6 FadiThabtah Maher Aburrous, M.A.Hossain, KeshavDahal. “Intelligent phishing detection system for e-banking using fuzzy data mining.” Expert Systems with Applications, Vol. 37(12), pp 7913–7921, Dec 2010. 7 AnkushMeshram and Christian Haas. “Anomaly Detection in Industrial. Networks using Machine Learning: A Roadmap.” In Machine Learning for Cyber Physical Systems, pages 65–72. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017. 8 Xuequn Wang Nik Thompson,Tanya Jane McGill. “Security begins at home: Determinants of home computer and mobile device security behavior.” Computers & Security, Vol. 70, pp 376–391, Sep 2017. 9 Dan Steinberg and Phillip Colla. “CART: Classification and Regression Trees.” The Top Ten Algorithms in Data Mining, pp 179–201, 2009. 10 D. Teal. “Information security techniques including detection, interdiction and/or mitigation of memory injection attacks,” Google patents. Oct 2013. 11 Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. “Design and Evaluation of a Real-Time URL Spam Filtering Service.” In 2011 IEEE Symposium on Security and Privacy, pp 447–462. May 2011. 12 Sean Whalen, Nathaniel Boggs, and Salvatore J. Stolfo. “Model Aggregation for Distributed Content Anomaly Detection.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec ’14, pp 61–71, New York, USA, 2014. ACM Press. 13 Ying Yang and Geoffrey I. Webb. “Discretization for Naive-Bayes learning: managing a discretization bias and variance.” Machine Learning, Vol. 74(1), pp 39–74, Jan 2009..
R. Kawase, P. Siehndel, and U. Gadiraju. Open Learning and Teaching in Educational Communities - 9th European Conference on Technology Enhanced Learning, EC-TEL 2014, Graz, Austria, September 16-19, 2014, Proceedings, page 193--206. (2014)
V. Kamtsiou, T. Koskinen, A. Naeve, and L. Stergioulas. Proceedings of the First European Conference on Technology Enhanced Learning EC-TEL'06,, Springer LNCS, Crete, Greece, (October 2006)
P. Bitzer, F. Weiß, and J. Leimeister. Eighth International Conference on Design Science Research in Information Systems and Technology (DESRIST), Helsinki, Finland, (2013)
P. Bitzer, K. Lehmann, and J. Leimeister. Proceedings of the Eighteenth Americas Conference on Information Systems (AMCIS), Seattle, Washington, USA, (2012)340.
C. Cox, S. Harrison, and C. Hoadley. Educating learning technology designers: guiding and inspiring creators of innovative educational tools, Routledge, New York, NY, (2008)