article thumbnail

7 ways to support learner-teacher interaction

Learning with e's

That never worked in the student bar and it won''t work on Facebook. Student groups tend to set up their own Facebook groups anyway, without any prompting from their teachers. Student groups tend to set up their own Facebook groups anyway, without any prompting from their teachers.

article thumbnail

How to Build an Online Community in 2024

learnWorlds

LinkedIn or Facebook group), membership sites , professional networks, virtual events or webinars , podcasts, and online courses with community components. Some free community platforms include: Quora, LinkedIn, Facebook, X, YouTube, Discourse, Glassdoor, or Slack. Why Build an Online Community?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Virtual (Learning) Reality

CLO Magazine

In late 2011, ON24 conducted another study evaluating the use of virtual communication and training tools compared to traditional in-person methods. When confidential information is being shared, however, social learning does not occur through social media.

article thumbnail

Free learning & development webinars for August 2022

Limestone Learning

PT: Five Phases of Training Program Evaluation That Will Help You Know How Your Training Programs Are Working Program evaluation is about applying systematic methods to collect, analyze, interpret and communicate data about a program to understand its design, implementation, outcomes or impacts. Tuesday, August 2, 2022, 12 p.m.–1

article thumbnail

How to Build an Effective Channel Partner Programme – A Guide

Wahoo Learning

Confidentiality obligations – To give your partner(s) a real picture of the business and situational analysis, there will be a level of confidential information shared. It is important to communicate what is confidential and not. Here you can describe the partnership and roles, as well as any goals or objectives.

article thumbnail

Cybersecurity Training for Employees: Ultimate Guide

WhatFix

Share on facebook. Attackers try to get employees to click on a malware link or use fraudulent communications to obtain confidential information and passwords. Reinforce confidentiality. Team members well-trained in cybersecurity measures must understand the importance of confidentiality and the measures necessary to protect it.

article thumbnail

Is Your m-Learning Secure? The Threat and How to Avoid It.

Trivantis

Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. It’s important to choose an extremely secure delivery method for your m-Learning, such as Lectora® Mobile, the new mobile learning solution from the makers of Lectora.