Education: Introvert Personalities Go Mobile & Online

Half of all students are introverts

Which might explain a number of the voices missing in class discussions. But there are also the students who don't understand, who are afraid to risk embarrassment by voicing a new thought, or who don't want to broadcast to their peers that they're struggling.
 
Now that over 86% of college students carry a mobile device, every classroom has the tools to empower students to speak without fear, no matter why they're keeping quiet. Here's how educators are making the transition to tech-enabled discussions.

Tell them to get out their phones
Smart phones, tablets, laptops, anything works, as long as it can send SMS text messages, or access the Internet via WiFi or a data plan. If a small number of students do not have access to a phone or tablet, pair them with students who do have one. They can take turns submitting comments, questions, and answers to in-class quizzes and discussions.

Note: Not all devices are created equal. The recent ECAR study demonstrates that students strongly prefer mobile phones for class activities. This is welcome news to instructors who regularly deal with the "cone of distraction" caused by laptop screens. Also, allowing responses via SMS text messaging helps students avoid issues like slow Internet connection speeds.
 
Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple-choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

UnBouncePages: http://bit.ly/1K6fBbv

« Ukraine’s Power Grid Attacked By Russia
Cyber Questions Directors Should Ask CIOs (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

National Cyber Security Centre (CNCS) - Portugal

National Cyber Security Centre (CNCS) - Portugal

CNCS is the operational coordinator and Portuguese national authority in cybersecurity working with State entities, and digital service providers

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

SQNetworks

SQNetworks

SQNetworks provides a full range of cybersecurity consultancy, services and solutions.

Data61

Data61

Data61 is Australia’s leading digital research network offering the research capabilities, IP and collaboration programs to unleash the country’s digital & data-driven potential.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

SlowMist

SlowMist

SlowMist is a blockchain ecosystem security company providing cybersecurity audits and protection for leading digital asset exchanges, crypto wallets, public chains, and smart contracts.

European Cyber Security Conference

European Cyber Security Conference

EU Cyber Security Conference will debate what Europe’s response to evolving threats in a dynamic global risk landscape should look like and what the next steps for all actors of the ecosystem.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.