Significant learning experiences and implied students

2020 ◽  
Vol 28 (1) ◽  
pp. 55-62 ◽  
Author(s):  
David Starr-Glass

Purpose This paper reflects on and seeks to reconcile and to consolidate two bodies of literature. The first deals with course design in higher education, particularly with efforts to create significant learning experiences. The second body of literature, which is considerably less well-known, considers the implied student – the intended or preconceived student for whom these learning experiences are created. Significant learning experiences are created by instructors for students, not for themselves. Thus, a critical condition for success in course design is to examine and interrogate the implied student that instructors had in mind and to reconcile those preconceived notions with the actual students who populate the learning space. Design/methodology/approach The paper is a critical reflection on the literature and the author’s experience in designing college level business and economics courses and in attempting to create significant learning experiences in those courses. The study reflects on practice, reviews the relevant literature, and is speculative in nature. It is not empirically based and may well have limited generalizability. However, it is hoped that this paper will promote further exploration of the implied student construct and will lead to further research into the misalignment of expectations and outcomes between implied students and actual students. Findings The paper contends that there is inevitably a gap – for both the instructor and the learner – between the expectations and outcomes that are anticipated for implied students and realized by actual students. It suggests that recognition of this gap is a critical element in designing significant learning experiences for actual learners. The paper further suggests that success in creating these experiences is improved through reconsidering the implied student stereotype, engaging with actual students and instructor-led communication of the implicit goals and outcomes of the course. Originality/value Students are best served if they engage in learning spaces thoughtfully centered on significant learning experiences. However, learning environments are often constructed around envisaged students who are defined by the learning expectations, pedagogic philosophies and ideological biases of the instructor. This paper provides value by encouraging instructors to explore their preconceptions of the implied student and creating and facilitating learning environments that recognize, appreciate and respond to the actual students who will populate them. Further, the paper highlights “the implied student,” which has gained considerable traction in Nordic countries but only limited attention in the USA and UK.

2015 ◽  
Vol 116 (7/8) ◽  
pp. 358-368 ◽  
Author(s):  
Heather Michele Moorefield-Lang

Abstract – The purpose of this paper is to analyze the user agreements of makerspaces in public and academic libraries. User agreements, also known as maker agreements, user forms and liability forms, can be very important documents between library patrons, staff and faculty. User agreements are similar to the earlier creation of acceptable use policies for technology use in libraries. The author of this study will delve into the user agreements created for public and academic libraries across the USA. Design/methodology/approach – The researcher used content analysis to investigate 24 different user agreements written for public and academic library makerspaces. NVivo qualitative data analysis software was integrated into this research to aid in the breakdown of commonalities across terms, themes and purpose within the user agreements. Findings – Although makerspaces are a very exciting topic in the field of library science at this time, the implementation of a maker learning space is still new to many libraries. Creating a user agreement for a makerspace is newer still. Most user agreements in this study were six months to a year old. Some consistencies found across makerspace user agreements include liability waivers, permissions for minors, safety, copyright and technology replacement costs. Originality/value – At this time, most publications on makerspaces are held in the realm of popular publications (blogs, magazines, zines, etc.). The body of peer-reviewed and scholarly research on makerspaces is growing. Makerspace user agreements are new to this growing field of interest, and a content analysis of these documents will pave the way for the writing of future forms.


2021 ◽  
Vol 38 (2) ◽  
pp. 230-242
Author(s):  
Bulut Atay ◽  
Evren Sumuer

PurposeThe purpose of this paper is to investigate the components of college students' readiness for connectivist learning in technology-enhanced learning environments through the development of the readiness for connectivist learning scale (RCLS).Design/methodology/approachAfter the constructs of the scale had been identified, their items were created based on the relevant literature. In order to ensure the content validity of the items, a sorting procedure was implemented and they were reviewed by experts in the field. The construct validity of the scale was tested using exploratory factor analysis (EFA) with data from 718 students from a university in Turkey.FindingsThe findings of the current study indicated a four-factor solution, which includes information and communication technology (ICT) self-efficacy (seven items), autonomous learning (seven items), information literacy (eight items) and learning networks (five items). A significant, strong and positive correlation of students' scores on the RCLS with those of the online learning readiness scale (Hung et al., 2010) supported the criterion-related validity of the scale. The value of Cronbach's alpha coefficients for the RCLS showed good reliability for the scale.Originality/valueWith the assessment of college students' readiness level for connectivist learning, it is possible for them to anticipate their success in connectivist learning environments themselves and thereby to improve the knowledge, skills and attitudes necessary for their success in these environments.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Vivek Roy

PurposeSupply chain traceability and supply chain visibility have become a critical element for the effective management of contemporary complex supply chains. At their core is information sharing, which has been acknowledged as a key prerequisite for logistics and supply chain performance, but whose notional underpinnings have not been delineated fully, leading to interchangeable deployment of these terms. Addressing the shortcoming, this paper aims to establish a contrast between the two notions.Design/methodology/approachDrawing from systematic review protocols, a multi-disciplinary review scope is constructed wherein the synthesis is strategized to primarily channel implications for the scholarship of logistics and supply chain management. The review is aimed at addressing two research objectives: (1) how the notions of traceability and visibility in supply chain management develop contrast in terms of their thematic emphasis and (2) to attain an integrative understanding of the notional convergence and divergence between supply chain traceability and visibility for raising strategic recommendations.FindingsThe review outcomes help contrast both the convergence and the divergence between traceability and visibility in the supply chain environment, and the differentiated but fundamental role that information sharing plays within these notions to outline why they are not interchangeable.Originality/valueThe originality of the findings lies in the conceptual synthesis of the relevant literature from both technological and non-technological perspectives to ultimately draw logistics and supply chain management implications. The review also points out key strategic considerations to demarcate the notional boundaries of traceability and visibility in future research.


2019 ◽  
Vol 11 (6) ◽  
pp. 1009-1021 ◽  
Author(s):  
Dennis M. Patten

Purpose In this essay, the author reflects on the legitimacy theory in corporate social responsibility (CSR) disclosure research. Design/methodology/approach This is a reflection/review essay based on a review of relevant literature. Findings Although almost constantly under attack from a variety of scholars, legitimacy theory seems to hold on in the social and environmental disclosure arena. However, the failure of the recent wave of CSR-themed work published in The Accounting Review to even acknowledge, let alone engage with, the theory is problematic. Research limitations/implications We, in the CSR disclosure arena, need to do all we can to help emerging scholars (particularly in the USA) find the rich body of research the mainstream journals fail to discuss. Practical implications Legitimacy-based research can help move CSR disclosure at least closer to being a tool of accountability, as opposed to a tool for legitimation. Social implications Perhaps the critique of the mainstream North American literature’s failure to consider legitimacy theory can lead to the recognition of the need to focus on the harm to sustainability that a narrow, shareholder-centric focus leads to. Originality/value This reflection takes a unique look at the contributions of legitimacy theory to CSR disclosure research.


2020 ◽  
Vol 28 (2) ◽  
pp. 293-318 ◽  
Author(s):  
Pintu Shah ◽  
Anuja Agarwal

Purpose For a good number of Indians, their smartphone is their first digital computing device. They have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using other Internet-enabled devices such as laptop and desktop. Because of this, the inexperienced Indian smartphone user may be vulnerable to Internet-related security breaches, as compared to the citizens of developed economies. Hence, it is essential to understand the attitude, behaviour and security practices of smartphone users in India. Limited research is available about the security behaviour of smartphone users in India as the majority of research in this domain is done outside India. Design/methodology/approach In this empirical study, the researchers identified 28 cybersecurity behaviours and practices through a survey of relevant literature. An online survey of identified cybersecurity behaviours and practices was administered to 300 smartphone users. Frequency analysis of the respondent data was done to understand the adoption of recommended cybersecurity behaviours and practices. Pearson’s chi-square with 5% level of significance has been used to test the hypotheses. Post hoc analysis with Bonferroni correction was conducted for statistically significant associations. Findings Overall, the respondents did not exhibit good cybersecurity behaviour. Respondents have adopted some of the most popular security features of the smartphone such as the use of screen lock. However, respondents have not adopted or are not aware of the technical security controls such as encryption and remote wipe. Statistically significant differences were found between the cybersecurity behaviour and practices and independent variables such as gender, age, mobile operating system (OS) and mother tongue. Respondents reported high level of motivation to protect their device and data, whereas they reported moderate level of threat awareness and the ability to protect to their device and data. Results of the comparative analysis with a similar study in China and the USA are also reported in this study. Research limitations/implications The main limitations of this study are as follows: the respondents' perceptions about their cybersecurity behaviours and practices were measured as opposed to their actual behaviours and practices and the generalizability of the study is limited because the sample size is small as compared to the total number of smartphone users in India. Practical implications The findings of this study may be useful for the design of effective cybersecurity prevention and intervention programs for general smartphone users of India. Originality/value This study provides an insight about cybersecurity behaviour of smartphone users in India. To the knowledge of the researchers, this is the first study to collect such quantitative data of smartphone users in India for a better understanding of the cybersecurity behaviours and practices. This study identified 28 cybersecurity behaviours and practices, which smartphone users should follow to improve cybersecurity.


2019 ◽  
Vol 29 (1/2) ◽  
pp. 168-177
Author(s):  
Guanyan Fan

Purpose This paper aims to examine the situation of organizational information governance (IG) and its relationship with e-discovery in China. Design/methodology/approach This study collects laws, court opinions, cases and relevant literature as data and analyzes their content under the guidance of the framework of Information Governance Reference Model of the Electronic Discovery Reference Model (EDRM). Findings Inspired by discussions on the challenges of e-discovery and, in particular, the relationships between organizational IG and e-discovery in English literature, the present study attempts an examination of the relevant situations in China. It is the belief of the study that the connection between IG and the legal risk as framed in the EDRM is a necessary one for China as the country is opening its door wider and continues to seek multilateral cooperation. The study found out, through observations and analyses, the following distinctions of e-discovery and its relationship with IG in China. Despite the very similar US and Chinese digital technological environments and the similar acceptance of electronic evidence into litigations, the situations with e-discovery/electronically stored information (ESI) and IG are different within a Chinese context. Legal provisions regarding electronic evidence are brief and vague, litigating procedures rely on the explanations of the Supreme Court and the Supreme Procuratorate and, most relevantly, there is only a small portion of litigations that features a large quantity of ESI in the context of dramatically increased cases involving electronic evidence. The evidentiary qualifications of ESI, e.g. authenticity and reliability, are discussed intensively in academic writings, which, however, was done in a rather isolated manner, without referring to the relationships between and among them. The concept of proportionality, which was one of the key constructions in e-discovery discussions in English literature, was not found in these writings. As a result, organizational IG in China is not discussed in relation to e-discovery or electronic evidence, raising the question as to how e-discovery of a large quantity of ESI will be handled, should such cases emerge. Research limitations/implications Extracted mainly from available literature in legal and information fields, this study is necessarily neither exhaustive nor definitive. However, it can be used to further strengthen other empirical data studies. It could be extended within a Chinese context with interviews with legal and IG professionals. In this regard, the reasons that lead to the distinctions as exhibited in the findings could be explored in future investigations. This study does serve as a marker of the position in China compared to the USA. This research suggests that there is an opportunity for comparable studies at a national level, thus generating complementary knowledge for the IG and e-discovery community internationally. Practical implications The findings of the study may be instructive to countries with similar situations, that is, a weak linkage between IG and e-discovery. It may serve as a call for more comparable studies, thus generating complementary knowledge for the IG and e-discovery community internationally. Originality/value The study reported in this paper is the first of its kind in terms of exploring the relationships between IG and e-discovery in the Chinese context.


2017 ◽  
Vol 66 (4/5) ◽  
pp. 201-212 ◽  
Author(s):  
Robert Curry

Purpose The purpose of this paper is to start exploring the possibilities for makerspaces to function as a new learning space within academic library services in higher education (HE). This original research study ask two key questions: How is learning achieved and supported in makerspaces? What can academic library services bring to the effective organisation and support of makerspaces? Design/methodology/approach An extensive literature review is followed by a template analysis (King, 2012) of data from an online forum of three professionals operating makerspaces in academic library services in the USA and a discussion incorporating relevant educational theory and philosophy. Findings The three overarching learning themes found were: experiential learning (Dewey, 1909; Kolb, 1984), communities of practice (Lave and Wenger, 1991) and self-efficacy through social learning (Bandura, 1997). Research limitations/implications The one-week forum of three professional library staff provided detailed and informative data. Substantial field work with students will also be required to see how far this professional lens has provided insight into how students are learning and supported in these and other makerspaces. Social implications The wider cultural implications are examined, including the potential social value of makerspaces as transformative creative spaces empowering communities and individuals. Originality/value This is the first study to date on the potential educational value of makerspaces within HE, and the specific support academic library services can offer if they choose to host a makerspace (including teaching information, digital and critical literacies).


Author(s):  
Hongwei Zhang ◽  
Jihong Zhao ◽  
Ling Ren ◽  
Ruohui Zhao

Purpose – The purpose of this paper is to examine the determinants of juvenile attitudes toward the police (JATP) in Chinese social settings. More specifically, this study borrows from the wisdom of social bond theory and relevant literature developed in the USA to explain juvenile ratings of the police on specific job functions. Design/methodology/approach – The data were collected from a multi-stage cluster sample of 2,704 high school students in a city with a population of 3.8 million located in the southwest region of China. The analysis includes variables derived from social bond theory as well as traditional models commonly employed in US studies, such as demographic background and contact with the police. Findings – The findings suggest that both social bonds and traditional models have their respective utility to explain the variation in juvenile evaluations of the police. Originality/value – This study expands the scope of the investigation on JATP in China, a distinctively different cultural environment from the USA. More specifically, it explores the utility of the respective explanatory power of the social bond model and traditional models in relation to juveniles’ ratings of the police in China.


2015 ◽  
Vol 21 (1) ◽  
pp. 40-67 ◽  
Author(s):  
Bart J. Debicki

Purpose – This paper aims to present the work and contributions of Karol Adamiecki in comparison with Frederick Winslow Taylor and discusses the various contexts in which both scholars conducted their research. The purpose of this study is bring to light some of the main accomplishments of Adamiecki and contribute to the discussion of reasons why the work of some scholars draws wide acclaim, while similar work of others remains unnoticed. Design/methodology/approach – The background for the discussion is the work and ideas of Karol Adamiecki, a Polish engineer and manager, whose methods and findings were similar to those of Frederick Taylor and are contemporary, and, in some cases, precede those of the Father of Scientific Management. The methodology used in this study is a review of the original work of Adamiecki and Taylor to find the true meaning and purpose behind their writings, as well as a review of relevant literature regarding the context of the realities in which both scholars constructed their research. Findings – The concepts and inventions of Karol Adamiecki are, in many aspects, similar to those of Frederick Taylor and his followers. Several factors are identified and discussed which may have influenced the varied level of recognition of conceptually similar ideas evolved in different parts of the world. These factors are, among others, the socio-political reality of Eastern Europe and Poland under the influence of Russia and the Soviets as compared to that of the USA and the Western World and the support of various interest groups and government institutions, as well as the impact of the academic circles. Research limitations/implications – In today’s world of globalization reaching all aspects of life, it is necessary to recognize and acknowledge the developments emerging in different settings, regions and cultures. Furthermore, the social and political realities in which research is constructed may impact the future acceptance, dissemination and popularity of the findings and authors. Originality/value – Although some research exists outlining the work of Adamiecki, this study contributes to the body of historical management knowledge by focusing on the main accomplishments of Adamiecki based on his original writings and placing his accomplishments in a historical context in comparison to Taylor, thus analyzing the reasons for the lack of wider acclaim for Adamiecki’s contribution to scientific management.


2018 ◽  
Vol 8 (1) ◽  
pp. 58-98 ◽  
Author(s):  
V. Dao Truong ◽  
Timo Dietrich

Purpose Limited attention has been given to the study of social marketing at the graduate level. Such a study not only reveals research interests and trends, but also provides insights into the level of academic evolution or maturity of the social marketing field. This paper aims to examine social marketing as the subject of master’s theses. Design/methodology/approach A search strategy found 266 social marketing-focused master’s theses completed from 1971 to 2015. These theses were analysed by host countries, institutions, disciplinary contexts and degree programmes for which they were submitted. Findings Only four theses were submitted from 1971-1980 and eight completed in 1981-1990. The number of theses increased to 35 in 1991-2000, 118 between 2001 and 2010 and 101 in the past five years (2011-2015). The USA was the leading producer of social marketing master’s theses, followed by Canada, Sweden, China, South Africa, the UK and Kenya. A majority of theses were housed in the disciplines of business, health and communication, and none of them was submitted for a Master of Social Marketing degree. Originality/value This is the first study that investigates master’s theses with an exclusive focus on social marketing. Implications for the evolution, learning and teaching of social marketing are provided.


Sign in / Sign up

Export Citation Format

Share Document