Education: Introvert Personalities Go Mobile & Online

Half of all students are introverts

Which might explain a number of the voices missing in class discussions. But there are also the students who don't understand, who are afraid to risk embarrassment by voicing a new thought, or who don't want to broadcast to their peers that they're struggling.
 
Now that over 86% of college students carry a mobile device, every classroom has the tools to empower students to speak without fear, no matter why they're keeping quiet. Here's how educators are making the transition to tech-enabled discussions.

Tell them to get out their phones
Smart phones, tablets, laptops, anything works, as long as it can send SMS text messages, or access the Internet via WiFi or a data plan. If a small number of students do not have access to a phone or tablet, pair them with students who do have one. They can take turns submitting comments, questions, and answers to in-class quizzes and discussions.

Note: Not all devices are created equal. The recent ECAR study demonstrates that students strongly prefer mobile phones for class activities. This is welcome news to instructors who regularly deal with the "cone of distraction" caused by laptop screens. Also, allowing responses via SMS text messaging helps students avoid issues like slow Internet connection speeds.
 
Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple-choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

UnBouncePages: http://bit.ly/1K6fBbv

« Ukraine’s Power Grid Attacked By Russia
Cyber Questions Directors Should Ask CIOs (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NextPlane

NextPlane

NextPlane provide secure real-time B2B unified communication and collaboration solutions within and across business systems.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Netsafe

Netsafe

Netsafe is an independent, non-profit New Zealand organisation focused on online safety. We help people stay safe online by providing online safety education, advice and support.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Mindgard

Mindgard

The Mindgard Security Copilot platform secures your Artificial Intelligence, GenAI and LLMs.