Education: Introvert Personalities Go Mobile & Online

Half of all students are introverts

Which might explain a number of the voices missing in class discussions. But there are also the students who don't understand, who are afraid to risk embarrassment by voicing a new thought, or who don't want to broadcast to their peers that they're struggling.
 
Now that over 86% of college students carry a mobile device, every classroom has the tools to empower students to speak without fear, no matter why they're keeping quiet. Here's how educators are making the transition to tech-enabled discussions.

Tell them to get out their phones
Smart phones, tablets, laptops, anything works, as long as it can send SMS text messages, or access the Internet via WiFi or a data plan. If a small number of students do not have access to a phone or tablet, pair them with students who do have one. They can take turns submitting comments, questions, and answers to in-class quizzes and discussions.

Note: Not all devices are created equal. The recent ECAR study demonstrates that students strongly prefer mobile phones for class activities. This is welcome news to instructors who regularly deal with the "cone of distraction" caused by laptop screens. Also, allowing responses via SMS text messaging helps students avoid issues like slow Internet connection speeds.
 
Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple-choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

UnBouncePages: http://bit.ly/1K6fBbv

« Ukraine’s Power Grid Attacked By Russia
Cyber Questions Directors Should Ask CIOs (£) »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Infosequre

Infosequre

Infosequre builds up your security awareness culture and turns your employees into the first line of defense against cyber risks.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

Hubify

Hubify

Hubify is an experienced, service-driven technology company specialising in business connectivity across mobile, data, voice, cloud, & cyber security solutions.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Occentus Network

Occentus Network

Occentus Network is a telecommunications service provider specialized in High Availability Servers & managed Cloud services.

Certera

Certera

Certera is a modern and affordable SSL Certificate, Code Signing Certificate, and Cyber Security Services provider.

Spirit Technology Solutions

Spirit Technology Solutions

Spirit Technology Solutions is a modern workplace services provider committed to delivering solutions that embody our core principles of security, sustainability, and scalability.

LevelBlue

LevelBlue

LevelBlue simplify cybersecurity through award-winning managed security services, experienced strategic consulting, threat intelligence and renowned research.