Education: Introvert Personalities Go Mobile & Online

Half of all students are introverts

Which might explain a number of the voices missing in class discussions. But there are also the students who don't understand, who are afraid to risk embarrassment by voicing a new thought, or who don't want to broadcast to their peers that they're struggling.
 
Now that over 86% of college students carry a mobile device, every classroom has the tools to empower students to speak without fear, no matter why they're keeping quiet. Here's how educators are making the transition to tech-enabled discussions.

Tell them to get out their phones
Smart phones, tablets, laptops, anything works, as long as it can send SMS text messages, or access the Internet via WiFi or a data plan. If a small number of students do not have access to a phone or tablet, pair them with students who do have one. They can take turns submitting comments, questions, and answers to in-class quizzes and discussions.

Note: Not all devices are created equal. The recent ECAR study demonstrates that students strongly prefer mobile phones for class activities. This is welcome news to instructors who regularly deal with the "cone of distraction" caused by laptop screens. Also, allowing responses via SMS text messaging helps students avoid issues like slow Internet connection speeds.
 
Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple-choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

UnBouncePages: http://bit.ly/1K6fBbv

« Ukraine’s Power Grid Attacked By Russia
Cyber Questions Directors Should Ask CIOs (£) »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

BioConnect

BioConnect

BioConnect provide biometric access control solutions to verify a person’s identity across physical, IOT and digital applications.

Innovasec

Innovasec

Innovasec provide information security consulting and training services.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Ampsight

Ampsight

Ampsight specializes in enabling cloud integration, securing data, and navigating complications that drive critical-mission success.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.