Education: Introvert Personalities Go Mobile & Online

Half of all students are introverts

Which might explain a number of the voices missing in class discussions. But there are also the students who don't understand, who are afraid to risk embarrassment by voicing a new thought, or who don't want to broadcast to their peers that they're struggling.
 
Now that over 86% of college students carry a mobile device, every classroom has the tools to empower students to speak without fear, no matter why they're keeping quiet. Here's how educators are making the transition to tech-enabled discussions.

Tell them to get out their phones
Smart phones, tablets, laptops, anything works, as long as it can send SMS text messages, or access the Internet via WiFi or a data plan. If a small number of students do not have access to a phone or tablet, pair them with students who do have one. They can take turns submitting comments, questions, and answers to in-class quizzes and discussions.

Note: Not all devices are created equal. The recent ECAR study demonstrates that students strongly prefer mobile phones for class activities. This is welcome news to instructors who regularly deal with the "cone of distraction" caused by laptop screens. Also, allowing responses via SMS text messaging helps students avoid issues like slow Internet connection speeds.
 
Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

Display a web-based poll question
Many instructors like to open the session with a question about the material from the day before. Then they might scatter two or three more into the class period, to gauge understanding, collect anonymous questions, or give a quick quiz.

Let responses guide the flow of instruction
It makes a big difference when everyone feels safe and comfortable responding to questions in class. But the second best benefit of incorporating technology is that you have so much new data at your fingertips. You can find out instantly who understands, who needs more time and instruction, when to review, what to review, and when to move on.

Some educators even use poll responses to choose which rabbit trails to pursue once the day's material has been covered. You can get creative and make your polls your own, then decide how best to apply the results to your courses.

Use a multiple-choice poll that instantly checks for understanding: "Which of the following was not a factor in the decision to join WW2?"

Use an open-ended poll to host an anonymous class discussion: "Why do you think bullying goes unreported on our campus?"

Use a clickable image poll to let students quickly map their thoughts on a coordinate axes graph, number line, painting, or flowchart.

Use a ranking poll to let students arrange a set of options in the correct (or preferred) order, for example, "Rank the causes of air pollution from greatest to smallest."

UnBouncePages: http://bit.ly/1K6fBbv

« Ukraine’s Power Grid Attacked By Russia
Cyber Questions Directors Should Ask CIOs (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Cydome

Cydome

Cydome offers full-spectrum cybersecurity solutions tailored for the maritime industry.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

MonsterCloud

MonsterCloud

MonsterCloud is a leader in managed cyber security services. Our cyber security team constantly monitors and protects businesses from cyber threats.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Epoch Concepts

Epoch Concepts

Offering a full line of IT services, solutions, and integration capabilities, Epoch Concepts is the trusted partner of the US military, federal agencies, private enterprises, and systems integrators.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

Praxis Security Labs

Praxis Security Labs

Praxis Security Labs is a research driven cybersecurity company that helps our customers to reduce risk and improve security.

Safe Data Storage

Safe Data Storage

Safe Data Storage offer a fully managed, professional, secure UK-based online backup service to businesses, education and charities.