Effective use of technology for asynchronous learning to elevate students’ knowledge and problem-solving ability

2017 ◽  
pp. 149-158
Author(s):  
Madhu Mahalingam ◽  
Elisabetta Fasella
Mathematics ◽  
2021 ◽  
Vol 9 (8) ◽  
pp. 793
Author(s):  
Manuel Santos-Trigo ◽  
Fernando Barrera-Mora ◽  
Matías Camacho-Machín

This study aims to document the extent to which the use of digital technology enhances and extends high school teachers’ problem-solving strategies when framing their teaching scenarios. The participants systematically relied on online developments such as Wikipedia to contextualize problem statements or to review involved concepts. Likewise, they activated GeoGebra’s affordances to construct and explore dynamic models of tasks. The Apollonius problem is used to illustrate and discuss how the participants contextualized the task and relied on technology affordances to construct and explore problems’ dynamic models. As a result, they exhibited and extended the domain of several problem-solving strategies including the use of simpler cases, dragging orderly objects, measuring objects attributes, and finding loci of some objects that shaped their approached to reasoning and solve problems.


Author(s):  
Joyce W. Gikandi

This chapter focuses on how innovative use of electronic portfolios (e-portfolios) can contribute towards meeting the needs of 21st century learners by promoting competence-based learning and assessment. The author explores various strategies and functionalities of e-portfolio application in higher education. Further, fundamental issues that relate to successful implementation of student academic e-portfolios are examined. Specifically, the relevance of congruent theoretical perspectives and teacher's involvement in the process of e-portfolio development are articulated among other key issues. Based on the emergent perspectives elucidated through this chapter, best practices to inform innovative and effective uses of e-portfolios are identified. The chapter illuminates how the effective use of e-portfolio can promote meaningful learning experiences and development of core competences including interactive collaboration, creativity, critical thinking, digital literacy, problem solving and self-efficacy.


2011 ◽  
pp. 234-248
Author(s):  
Enid Mumford

Participative systems design has, in the past, been seen as a positive group process of thinking through needs and problems and arriving at solutions for making the situation better. This improved situation then continues until new technology or new solutions provide an opportunity for making the situation better still. So far this book has concentrated on how to make the best use of the positive factors assisting change, especially change that involves the introduction and use of technology. It has described the importance of getting a clear understanding of the change problem and its complexity, of developing effective strategies to address this complexity, and of the creation of structures, often organizational, to facilitate the subsequent use of the new system. This last requires always keeping in mind the need to meet the dual objectives of achieving operating efficiency and a good quality of working life. This is often described as job satisfaction. Most of all there has been a continual stress on the importance of participation. This involves sharing the design tasks with those who will be affected by them and taking account of their opinions in design decisions. This chapter addresses the reverse of this positive objective. It considers the negative factors in a change situation which are likely to cause problems and to threaten the success of the change programme and of the new system. There are very many of these kinds of problems and it is only possible to discuss a few here. The ones I have selected are criminal threats which affect the future viability of the company, technical problems which reduce efficiency, unpleasant and stressful work that threatens employee health, and problems of morale which affect the individual’s happiness in the workplace. A consideration of negative factors brings us into the challenging areas of uncertainty and risk. Uncertainty is when we do not know what is going to happen and often contains an element of surprise. This is especially true today when so many decisions depend on forecasts of the future. A contributing factor here can be an overemphasis on the present as a means of forecasting the future. Uncertainty is also often a result of the behaviour of others rather than of events. This is hard to predict. Experts tell us that today we are living in a risk society (Beck, 1992). Complex design problems can have a high degree of uncertainty and easily become risks. They often have a subjective element, for what one person considers a problem or a risk, another will see as an opportunity. Complex problems also require information for their solution and this may be difficult to find. It requires the ability to search for, analyse and synthesise, relevant intelligence and relate it to past, current and future events. Threats to important institutions from terrorists are of a different nature and scale to those that have been experienced before. Many will take us completely by surprise. Bernstein (1996) suggests that the essence of risk management lies in maximising the areas which we have some control over while minimising those areas where we have no control over the outcome and the linkage between cause and effect is hidden. When we take a risk we are making a bet that a particular outcome will result from the decision we have made although we have no certainty that this will happen. Risk management usually starts with risk analysis, which attempts to establish and rank the most serious risks to be avoided so far as these are known. Here many companies attempt to achieve a balance between the benefits of greater security and the costs involved. Too high a level of security, while providing good protection, can result in a system that is both difficult to use and expensive to operate (Mumford, 1999). Risk analysis next moves on to risk assessment. This is an analysis of the seriousness of different risks by determining the probability and potential damage of each one. For example, major risks can come from a large concentration of data in one place that is accessed by many different people, not all of whom are known. There can be relationships between risks. Clifford Stoll’s (1990) book The Cuckoo’s Egg shows how the ability of a German hacker to enter a university laboratory computer made it possible for him to later enter into the computers of United States military bases. Risk analysis identifies the risks; risk assessment tries to estimate how likely they are to happen and how serious the consequences will be. Risk priorisation recognises that all companies cannot be protected from all risks and choices must be made. Risk impact is the likely magnitude of the loss if a system break-in, fraud or other serious problem occurs. Risk control involves further actions to reduce the risk and to trigger further defensive actions if a very serious problem occurs. Risk control also covers the monitoring of risk on a regular basis to check that existing protection is still effective. This can lead to risk reassessment. Very serious risks such as those coming from terrorist attack or criminal activity require monitoring. This, together with the detailed documentation of any problems or illegal activities when they occur, is essential to avoid complacency. An effective system must both prevent problems and detect when they have occurred. All of these activities to design security into a system require human vigilance if they are to be effective. All employees should accept some responsibility for checking that the system they work with continues to maintain its integrity and security. This chapter will place its main focus on protective problem solving and design directed at avoiding or minimising very serious risks. Today, it is unwise for managers to neglect this. Because of its growth in recent years and its prevalence today criminal activity will be examined first in some detail. Particular attention will be paid to how the involvement of employees in problem solving can play a part in reducing or avoiding this.


Author(s):  
Charmine E.J. Härtel

Knowledge is the currency of the new economy and consequently information is power. For this reason, it is a business imperative to grow and shape intellectual capital. Human resource management (HRM) plays a pivotal role in creating and growing intellectual capital and embedding it within organizational systems. Previous studies in HRM have demonstrated the connection between technological innovation and HRM in two conspicuously different ways. Specifically, some have illustrated how HR strategies can enhance technological innovation in organizations (Gloet & Terziovski, 2004; Jiménez-Jiménez & Sanz-Valle, 2005) while others have shown ways in which HR functions can be aligned and made more efficient by the effective use of technology (Ashbaugh & Miranda, 2002; Broderick & Boudreau, 1992; Bussler & Davis, 2001/2002). In this article, a more holistic approach is taken in viewing technology as both an input and an outcome of effective HRM. To this end, the aim here is to provide a description of some of the key ways in which HRM can enhance the development, implementation, and success of new technologies as well as how HRM can enhance its own value through the use of new technologies.


Author(s):  
David Judkins ◽  
Youmei Liu

This chapter shares the experiences from a faculty member who teaches an online course-Shakespeare’s Major Plays, and from an instructional designer who helps the faculty design the course. It also relates the effective use of Course Management Tool-WebCT, to facilitate teaching activities and to engage student learning. This chapter concludes that a successful online course depends on two important factors, learner-engaged teaching and effective use of technology. The balance between the two enhances the efficacy of education and technology.


2011 ◽  
pp. 1759-1762
Author(s):  
Sally M. Johnstone

In 1989 the Western Interstate Commission for Higher Education (WICHE) located in Boulder, Colorado, founded the Western Cooperative for Educational Telecommunications (WCET) as a resource for the 15 western states. At the first annual meeting, delegates from outside the WICHE states petitioned to join. The original membership agreed. By 2004, WCET had over 250 members representing 43 states and seven countries. WCET had become an international, member-driven service agency.


2014 ◽  
Vol 21 (3) ◽  
pp. 177

How do you use technology to develop students' understanding, stimulate their interest, and increase their proficiency in mathematics? Share your ideas about the effective use of technology in pre-K—grade 6 mathematics classrooms.


Sign in / Sign up

Export Citation Format

Share Document