130 likes | 215 Views
Cyberlearning. Opportunity and Challenge. Need. Students, in addition with teachers need to be taught how to properly manage large amounts of data whether through the scientific method or the student’s educational entire learning history. Research.
E N D
Cyberlearning Opportunity and Challenge
Need • Students, in addition with teachers need to be taught how to properly manage large amounts of data whether through the scientific method or the student’s educational entire learning history.
Research • The office of cyberinfrastructure and the NSF created the eight core strategies of cyberlearning. • These eight core strategies focus on promoting new talents and technological developments.
Development • Southwest Texas University used cyberlearning to implement its first virtual course for academic credit with help from James Andrews and his staff. • Today cyberlearning is has various applications: blogs, wikis and social networking sites to enhance the educational experience.
Commercialization • Blogspot, Facebook, Twitter, Wikispaces, Myspaceand Wikipedia.
Innovators & Early Adopters of Cyberlearning • Innovators: Computer and Software companies • Early Adopters: School Administrators, beginning teachers and students. • One strategy would be to incorporate the key members in the trial period. Key members include highly respected individuals in the school system, members of the school system that embrace innovation and students that have proficient computer skills. • Another strategy would be to incorporate incentives or awards to the key members in order to speed up the adoption rate.
Laggards of Cyberlearning Laggards: the veteran teachers ( 15+ years) One strategy would be to have a veteran teacher paired with a beginning teacher that embraces cyberlearning and is very proficient with computers. Another strategy would be to have a team of teachers form a group: 2 Beginners + 2 Veterans and have them collaborate with the concept of cyberlearning. These two strategies allow the veteran teacher to over come the fear of technology, be an effective teaching tool for their students and enhance their learning experience as well.
Perceived Attributes of Cyberlearning The perceived attributes that would help cyberlearning meet critical mass are the following: Compatibility Trialabiliy Observability These three attributes will work well with a small sample size in school districts. The three attributes can be incorporated, analyzed and provide feedback in a relatively short time. Also, minor attributes are knowing your audience, user friendliness and benefits gained from using cyberlearning.
Centralized or Decentralized approach to Cylberlearning A combination of both centralized and decentralized approach would work best to the adoption of cyberlearning. The centralized approach would be used nationally todecide the when, where and who for the trial period of cyberlearning. The decentralized approach would be used for after the trail period is over. The decision would be made by the local school districts and universities to incorporate cyberlearninginto their curriculum or certain aspects of cyberlearningto need their individual needs.
Key Change Agents The key change agents that I would recommend are the following: The college president. The department chairs. One faculty member from every academic sector. The three change agents I recommended have used all the seven roles of a change agent at one point in their careers. The three key change agents all understand that the student is the first priority and how can they provide the student with the best type of learning environment to be successful and effect positive social change. Also, these three key agents care about these students, they are a person to them and not just a badge number.
Cyberlearning= Critical Mass Distance learning continues to grow however increasing costs in all sectors of education should makes become more cognizant of the challenges that are in the near future. Cyberlearning has met critical mass and needs to closely monitored so that cyberlearning does not become ineffective, inefficient or costly and replaced by another type of technology.