Monitoring informal learning with a Learning Record Store
Joitske Hulsebosch eLearning
JANUARY 17, 2016
Below in the graph you see an example where the data is collected in one place. practical example: children in a museum Ben Betts shared a few practical examples The first is the Ann Arbor museum , a children's museum in the US. The teacher may use this information to adapt his class teachings. Privacy and consent is an important issue on Learning Record Stores.
How to revamp your learning model
SEPTEMBER 7, 2010
and The ILE and the FLE in harmony , I advocate the development of a virtual Informal Learning Environment (ILE) to work in tandem with the Formal Learning Environment (FLE) to support both the learning process and its administration. Informal learning. believe in the power of informal learning. Informal Learning Environment. Self-directed, informal learning is great.
Social Learning in Financial Services – Tales from the Real World
NOVEMBER 10, 2011
Rob : Seems like a great opportunity for reps to share information – an internal wiki or portal. Advisors love to be receivers of the information posted, but don’t always want to contribute information. I’ve become this way myself. Rob : Are there any outside forces that make sharing information difficult? Shane : This is true. Rob : What do you attribute this to?
How Big Data Will Shake Up eLearning
MARCH 19, 2015
For example, learner data can provide real insight into which strategies and content are working for employees and which are not. For example, a skilled French employee with a solid grasp of English working in Paris may be transferred to fill a temporary or long-term skill gap in the company’s US subsidiary. Time to get personal. Delivering global learning standards.
2016 Top 10 LMSs
FEBRUARY 9, 2016
43 profiles, whereas each vendor responded to 12 questions – covering everything from setup fees to data centers to latest features to support/training to security/privacy. . c. Here is a brief Sample_Summary – Sample_Pages_EL247Report. it does not include an example of every page in the report nor does the summary include everything in it. . The solution is extremely slick with the marketplace built into the system – so when you buy a course for example, it is the “click” and whalla it is in the LMS. Based on 690 vendors.
An Introduction to Population Health: Part 1
SEPTEMBER 13, 2016
For example, let’s use the population of diabetes. The obvious issue will be working with HIPAA and patient privacy. However, one of the larger, more ambiguous challenges is how to have physicians utilize the data created from these EHR records to make informed decisions. However, the definition is still abstract and has not reached its full potential.
Are YOU HIPAA (TX HB 300) Compliant in Texas?
NOVEMBER 3, 2014
Federal and state laws require patient medical information be protected and secured. . Protecting sensitive medical information can be challenging with today’s security breaches. Anyone who has contact with protected health information must be trained on how to keep that information protected and out of the hands of a potential fraudster. Your Texas organization must know how to protect and secure sensitive medical information. Covered entities must ensure that employees have a signed statement verifying that they were trained on HIPAA Privacy and Security.
5 quick ways to pull learners into a course
MAY 20, 2014
If the title of the course is “Data Privacy,” then you can trust learners to understand that it concerns keeping data private. In my sacrilegious opinion, the best use for a narrator is to talk about a graphic that isn’t already self-explanatory, not to deliver information that could be more concisely and quickly delivered through text. What are some alternatives? 1.
Scenario-Based Learning in Higher Ed
OCTOBER 25, 2016
A reader asked a great question about the role of scenario-based learning in higher education. I’ve seen a number of good examples of storytelling and scenarios in university courses. For example, in this social psychology course, students were placed in the role of Director of Operations. Authentic Assessment. Here’s one of the assignments for that course. ”).
Interesting Information via eLearning Learning
DECEMBER 8, 2008
As an example, I can see that eLearning 2.0 Again, I'll be curious to see if people find patterns in this information. Mel Aclaro - Business Casual Mel has a lot of interesting topics, but clearly a lot around social topics ( Social Media , Social Networks , LinkedIn , Twitter , RSS , Social Network , Facebook ), but keep him in mind for Streaming , Privacy , and Internationalization. David Fair - Learning Journeys Talk to him about graphics ( PNG , JPG ) and staying organized ( Tagging , Information Overload ). I've listed a few of the terms that I saw.
Google Course Builder: Initial Review
SEPTEMBER 1, 2013
With so much information, it’s a bit hard to know where to start. It’s clear that Google has a specific target in mind with this page: developers (or at least very web-savvy). In other words, if you are relatively new to setting-up online training programs, then you will likely find the Google Course Builder page is not user-friendly. Data Privacy and Security.
eLearning Cyclops: Wicked, Cool Example of Augmented Reality
SEPTEMBER 29, 2011
“Learning should be fun!” But what’s “fun?”
SEPTEMBER 2, 2013
” “Let’s have them explore a haunted museum, clicking on silly things to learn about data privacy.” ” All of the above are examples of smearing “fun” lipstick on the pig of an information presentation. Many people will say that exploring the museum to reveal all the bullet points about data privacy is gamelike and therefore “fun.”
How to Grab and Keep Interest in Any Presentation
AUGUST 2, 2016
The topics are tedious, dense, and dry by nature, so creating and retaining interest throughout presentations is trying, but of paramount importance – if our students don’t engage with the lessons, they won’t attach to the crucial information we’re covering. Snagit enables me to grab, create and share the information and media that matters most in a fun, approachable way.
AUGUST 31, 2016
This of course, has caused there to be a lot of legal issues of ownership and privacy of data along with companies trying to discover ways to capitalize on utilizing their servers as “clouds.”. Google apps, for example, has your standard apps (like Microsoft Office Suite) that you once had installed onto your Mac or PC solely accessible from online. The “Cloud”. Benefits.
Big Learning Data
DECEMBER 23, 2013
• Variety : Big learning data connects the dots on a variety of information from talent, performance, demographics and business metrics. Collecting data through interviews with learners’ managers, for example, costs more but yields more data. • Privacy, security and transparency issues : Strategic, legal and codes of conduct elements. • Values sensitive : Alignment to an individual’s beliefs about privacy, openness and individuality. • Privacy : Organizations may want to define areas where privacy levels are different.
How to Create Rollovers, Pop-ups and Branching for Lectora e.
AUGUST 5, 2012
Compliance Training: Doing Something About the Least Popular Training on Earth
MAY 10, 2013
Once she had hard-fought answers to those questions, she turned to technology, assessments, pathways and branching to deliver both universal and personalized training, information and support. As Charles Jennings wrote in a blog post rich with examples, “The list of non-compliance incidents in highly regulated industries could go (on) almost ad infinitum.”. Meet the panel. It should.
Tips for Lectora e-Learning Software Screen Recordings
AUGUST 20, 2012
Sample Courses. Examples of Lectora Titles. -->. Helpful Information. -->. The best way to communicate detailed information with an audience is usually via video. Use these tips for screen recordings to highlight important information for learners: Title clips. Help learners pinpoint key details by marking the important information with a circle or box.
To BYOD or not to BYOD at work? That is the question
JULY 7, 2016
The mobile worker needs instant access to information and uses more than one device during the day in order to always stay connected. This keeps people more focused when looking for new information, which positively influences their productivity. How can data privacy of employees can be protected? This is called BYOD — Bring Your Own Device — at work. Why is that? Go BYOD!
xAPI, LRS – The Interview
JANUARY 12, 2015
Part of the problem though is that there is a lot of information out there, some of it erroneous in nature and honestly, equally confusing. In early December, I decided to present the real facts, the real insight and eradicate the confusion. This work informed the conversations with several current and former ADL friends. My next questions are related to privacy and security.
Tin Can: My First impressions from mLearnCon 2012
JUNE 21, 2012
Summary: Tin Can is designed to provide a common data storage for learning experiences across a number of devices/platforms/media/information systems. Also, going back to the point of Tin Can not being SCORM, this example very clearly explains that. What about data privacy? I attended a session by Aaron Silvers, Community Manager at Advanced Distributed Learning (ADL).
Presidential Thoughts on Innovation and Technology
AUGUST 28, 2008
Gordon Synder of Gordon's Information and Communications Technologies (ICT) Blog has a great post titled Obama on Technology and Innovation where Gordon summarizes Obama's policy. Ensure the full and free exchange of information among Americans through an open Internet and diverse media outlets: - Protect the Openness of the Internet. Improve America's competitiveness.
10 Social Media Tools For Learning
The eLearning Coach
NOVEMBER 16, 2009
Do you have a training or information need that could benefit from a social media strategy? Each tool fulfills at least one of these criteria: encourages collaboration; enables user-generated content or input; provides a way to share; and facilitates informal or formal learning. For example, there is a Moodle module for starting a Dimdim session directly from within Moodle.
Reflections on the ‘New Groupthink’ and lessons for asynchronous collaborative e-learning
The eLearning Nomad
JANUARY 11, 2017
Cain uses many interesting examples to explain how this influences our relationships as well as the way we work and learn. Another one of the many very interesting examples in the book is of Steve Wozniak, co-founder and ‘nerd soul’ of Apple. ” If this is true, then why don’t we give our employees and learners plenty of privacy and autonomy? Instead of distinguishing between online and in-person interaction, we used the lessons of one to inform our thinking about the other. “. The book explains ‘pseudo-extrovert’ adaptive tendencies really well). Not on a team.”
Top 11 Disruptive E-Learning Technologies For 2013
AUGUST 14, 2013
Big Data analytics can help us make well-informed decisions about the learning programs that we develop. It allows track informal learning experiences such as playing games and simulations, and also real-world activities (such as visiting web sites, attending conferences, etc.) ” ~ Forbes Magazine. INTRODUCTION. THE TOP 11 LIST. BIG DATA. TIN CAN API. and not just digital ones!
Here’s What You Need to Know About Informal Learning
MARCH 31, 2010
For example, the current rage in the training industry is informal learning. In turn, they will be unleashing a horde of ignorant and pesky co-workers who will be seeking you out for information. You’ll need a device like the Toot-N-Scoot™ to maintain your privacy and personal space so that you can remain productive. Is there anything that you can share with us today?
Twelve Ways to Add Value to Open Source LMS Systems
Vikas Joshi on Interactive Learning
NOVEMBER 29, 2011
Here we deal with problems such as grade data privacy, activation and deactivation of users for business reasons, and protecting sensitive business information arising from learning systems from prying eyes. 2. Examples include news, events, calendar, assignments, course list etc. Better structuring of information to be shown on landing page to facilitate users to quickly see needed updates and get access to other areas of the system 3. User Management User management is the starting point in making Moodle successful. What questions are learners failing consistently?
January 2010 Informal Learning Hotlist
Jay Cross's Informal Learning
JANUARY 29, 2010
Top Informal Learning links for the first month of 2010. This is an example. Facebook’s Zuckerberg Says The Age of Privacy is Over - ReadWriteWeb , January 9, 2010. The End of the Industrial Training Era - Informal Learning , January 2, 2010. Informal learning is like that. Tags: Informal Learning Yesterday’s #lrnchat was on crowdsourcing. The crowd picks this list, not I. Networking Reconsidered - HarvardBusiness.org , January 4, 2010. Tonight On CrunchGear: Live At CES - TechCrunch , January 7, 2010. Skinner Box?
ASTD #TK11 – Opening Keynote Kara Swisher
FEBRUARY 2, 2011
issues you need to be aware of (if you’re involved in delivery of information): Social Computers have traditionally been hard to use… Google is like giant yellow pages. Information is ever-changing When you apply social tools to information, it makes it more useful Quora as an example of information with social Everybody becomes a producer of content (people make Facebook useful by posting pictures, text, links, etc. People filter it, they provide good information. Once people can’t be anonymous, they stop saying bad/dumb things…) Privacy?
3 Ideas to Make Your Online Compliance Training Program Engaging
DECEMBER 7, 2016
So, when a learner retakes the course, irrespective of success or failure, information sticks for a longer time, allowing him to recollect at the time of need. Here is an example of how to incorporate a game-based training approach in your safety training – Gamified Safety Training Inspired by Counter Strike. 2. The human brain’s ability to process information is limited.
The Flexible eLearning Framework
JULY 12, 2016
He also presents some sample survey questions to determine the effectiveness of these dimensions in the existing eLearning infrastructure of an organization. 1. Ethical: This dimension relates to social and political influence, cultural diversity, bias, geographical diversity, learner diversity, information accessibility, etiquette, and the legal issues. What criteria are used?
4 Compelling Situations to Outsource Compliance Training
SEPTEMBER 6, 2016
The concern behind your dilemma is that you may not want to share sensitive information with a third party. If not all, you can outsource a part of the compliance training you think won’t cause much threat to your company privacy. When it comes to your online compliance training, you often face the dilemma of whether to outsource or not. Here comes outsourcing into the picture!
Making Sense of Research
MARCH 17, 2015
And low and behold, a massive example was revealed last week. The possibility is to use analytics that combine the power of large numbers with a bunch of other descriptive data to be able to investigate things at scale. In general, research like this is hard since it’s hard to get large numbers of subjects, but large numbers of subjects is a much better basis for study (for example, the China-Cornell-Oxford Project that was able to look at a vast breadth of diet to make innovative insights into nutrition and health). So, smartphones have lots of sensors. mobile technology