1 / 43

Educational Technology Research Seminar

Educational Technology Research Seminar. Welcome!. September 2008. Agenda. Welcome to Technology Research Seminar Role of Technology and Relationship to e-Live Methodology Research Domains Building Academic Foundation Example: Technology Architecture for Content Creation and Delivery

hu-ball
Download Presentation

Educational Technology Research Seminar

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Educational Technology Research Seminar Welcome! MET ERT Seminar September 2008

  2. MET ERT Seminar Agenda • Welcome to Technology Research Seminar • Role of Technology and Relationship to e-Live • Methodology • Research Domains • Building Academic Foundation Example: Technology Architecture for Content Creation and Delivery • Teaching and Learning Practical Skills Example: Virtual Labs for Cryptography Courses • Developing Core Business Competencies Example: Social Bookmarking • Future Meetings, Topics and Participation • Closing remarks (Tanya)

  3. MET ERT Seminar Dichotomies of e-Live • Edu. technology is about blending, and blended programs depend on edu. technologies. • Much more than convenience or gas saving program. • E-Live, in fact, is about solving dichotomies: • What to teach online and what to teach in “offline” classrooms • What to teach collaboratively (sync) vs. self-paced (async) • When to use more structure vs. developing survival skills for the “unstructured” world • How to learn by developing new learning content vs. using “canned” content that quickly gets out-of-date • How to “blend-in” practical skills and business competencies into academic programs • Etc.

  4. MET ERT Seminar Classical Blended Framework Student services, academic affairs “While learning technologies and delivery media continue to evolve and progress, one thing is certain: organizations … favor blended learning models over single delivery mode programs.” Harvey Singh Match learning goals to delivery methods Tech. infra-structure & services e.g. showing face Usability, harmonization Effectiveness, learner performance Logistics for each delivery type (more work!); business model Facilitators, department coordinators

  5. MET ERT Seminar Business World Realities MS Degree + Practical Skills + Core Business Competencies Manager, Director MS Degree + Practical Skills (Certs) Sr. Programmer, Consultant, Project Lead, Subject Matter Expert MS Degree Jr. Programmer, Jr. Analyst, Jr. Researcher

  6. MET ERT Seminar Blended Learning - The Students’ Perspective e-Live Affordability Academic Foundation Accessibility Blended Learning – Student View Practical Skills Business Competencies By Leo Burstein

  7. MET ERT Seminar Does It Make a Difference? “I just wanted to let you know I was offered and accepted a position with the Space and Naval Warfare Systems Command down in DC. I wanted to thank you for the opportunity I had to learn from you, both the technical side with computer security, and the business side with the core competencies we talked about. Also to have my name on a publication, which my future employer has found to be very impressive. I hope all is going well with ERT, and I hope the students that you take on to help are able to benefit as much as I have.” Andy MacNeil

  8. MET ERT Seminar Methodology – Developing Evidence • “One of the challenges of offering guidance to teachers, in my experience, is striking the right balance between advice and evidence.” James M. Lang, A Week-by-Week Guide to Your First Semester of College Teaching (Harvard University Press, 2008) • Time constraints and priorities – use Champions? • Measuring Success – link survey questions to actions? • Students have different objectives (grades/career) – how can we manage them?

  9. MET ERT Seminar Methodology - “Idea To Launch” Decisions & Milestones Adopt Successful Initiative Management and Product Launch (SIMPL) process Approach Gillette and P&G are using to manage product innovation, with necessary modification for HE environment

  10. MET ERT Seminar Methodology tech While the seminar will cover a lot of technology topics, we will always remember that we are an academic institution. Therefore, our analysis will typically start with identifying challenges and opportunities related to teaching and learning in specific courses you are teaching. Then we will analyze current technology gaps, research, test, run demos, solicit feedback, and pilot in your courses specific technologies that might help us in addressing these challenges. Finally, we will discuss best practices and, if necessary, develop support services so these technologies can be rolled out for wider use.

  11. MET ERT Seminar Focus – Academic Knowledge ERT is working on a comprehensive architecture to help faculty develop and distribute rich online content in well defined in properly supported ways that can accommodate different faculty and students preferences. To achieve this goal, we will be looking for proper balance between standardization and academic freedom when managing technology introductions.

  12. MET ERT Seminar Heterogeneous Content Development and Distribution

  13. MET ERT Seminar Focus – Practical Skills “Studies show that students learn better when they understand practical applications of theoretical concepts.” Dr. Tanya Zlateva, 12th Infosec Symposium To succeed in complex modern workplace, students need solid academic knowledge and practical skills combined with key enterprise competencies Reinforcement effect: studies show that students learn better when they understand practical applications of theoretical concepts Properly designed Labs help students to develop important career-building skills (teamwork, passion to innovate, managing change, working in a global environment, building toolkits, etc.)

  14. MET ERT Seminar Focus – Practical Skills Dallas Slides Here Featured Technologies – virtualization, web infrastructure, PKI Example: “Virtual Labs for Learning Real World Security” – developing practical skills in cryptography courses

  15. MET ERT Seminar Choosing Topics, Scope and Technology Putting Cryptography in Context Crypto algorithms draw on the most abstract branches of mathematics while their correct (or incorrect) application decides vital problems ranging from security of nation’s critical infrastructure to privacy of personal information. Choosing the Scope Modeling complex end-to-end integrated practical scenario (vs. isolated concept-specific exercises) helps to “see the whole picture”, learn real-life scenarios, and emphasize human factors (process vs. technology). Virtualization as an Enabling Technology Minimize setup times and hardware requirements, promote role playing and team collaboration, implementation flexibility esp. simulating distributed environments, support for larger classes.

  16. MET ERT Seminar Scenario and Implementation Overview MS Server 2008 MS IIS/2003 WireShark IE Browser MS VS 2005 (Dell 16GB) Systems Admin Security Manager Hacker End User

  17. MET ERT Seminar Step by Step Walkthrough • Practice: Exploring Vulnerabilities of Typical Infrastructures • Web server security-related configurations • Common Internet protocols • Network traffic analyzers (not just a hacking tool) • Common vulnerabilities and countermeasures • Theory: Fundamental Security Properties • Authentication • Authorization • Confidentiality • Integrity • Non-repudiation ...110101011101010100101000 101 USERNAME 01110010101 01001101 PASSWORD 0110... App. Server Client Wstation Step 1 – Security Fundamentals, Setting Up the Stage

  18. MET ERT Seminar Step by Step Walkthrough Step 3: Public Key Cryptography and Public Key Infrastructure • Theory: Secret and Public Key Cryptography • Security Protocols • Public Key Infrastructure • Practice: Implementing PKI • Elements of Public Key Infrastructure • Anatomy of TLS negotiations – matching theory with practice App. Server Client Wstation

  19. MET ERT Seminar Step by Step Walkthrough Step 2 – Interplay of Crypto Theory and Internet Security • Theory: Crypto • Fundamentals of Group Theory • Encryption Algorithms • Hash Functions • Digital Signatures • Secret and Public Key Cryptography • SECURITY PROTOCOLS • Practice: Securing Internet Communications: • Configuring servers with TLS • Generating and exchanging keys and digital certificates

  20. MET ERT Seminar Step by Step Walkthrough Step 4 – Trusts, Signatures, Revocations – and Management Theory : Secret and Public Key Cryptography (cont.) Security Protocols • Practice: Managing Trust • Certificate Authority (CA) (and operational procedures!) • CA Hierarchies • Key Management nightmare • Out-of-bound communications • Emergencies • Revocation Lists (more procedures…) • Strong authentication and client-side configurations Discuss: technology vs. processes; collaboration – all levels; security vs. business objectives; risk management; controls; central/ mandate vs. distributed/grassroots • “Tools” + “Rules” < 100% • awareness • clearly seeing “the whole picture” •  knowing what we don’t know

  21. MET ERT Seminar Focus: Enterprise Competencies

  22. MET ERT Seminar Example: Building Strategic Relationships You are a Database Administrator in a large national bank. Close to the end of your shift you are getting an email from an application developer with a request to make an urgent change in a production database. What would you do? • How to handle this situation to build strategic relationships instead of creating enemies in a corporate setting • For MET, where many students are working full time, group discussions can have tremendous value, and more experienced students naturally share their insights • Offering this assignment in an online course (instructor/facilitator dynamics) • Student feedback (next slide) Featured Technology – interactive group discussions with feedback (Vista) Assignment from MET CS674 “Database Security” Course:

  23. MET ERT Seminar Students’ Response and Side Notes “I live and breathe security everyday at work and will take your comments with me.” -- Linda Reed “It was an immediate return on my investment.” -- Mark Emmett Feedback above is from an online course. Vista is a good communications platform. But can technology do it alone?

  24. MET ERT Seminar Example: Social Bookmarking Dao

  25. MET ERT Seminar Social Bookmarking: What we are trying to achieve? Help students to develop communication skills that they will need to succeed in academic environment and in business environment. Use this technology to enhance learning and teaching experiences for both learners and educators.

  26. Nowadays, it becomes less important of where the information was found, but rather how we can retrieve it using a framework created/shared by colleagues and peers. We need the tool that can help us to simplify the distribution of reference lists, papers, and other resources among students or peers Tagging information resources with keywords has the potential to changes how we store and find information. The opportunity to express and explore different perspectives on information and resources through informal organizational structures. Sometimes letting students try and find information on their own often leads to useless and inappropriate web pages. We need the tool that allow like-minded individuals to find one another and create new communities of users that continue to influence the evolution of ‘Folksonomies’ and common tag for resources. MET ERT Seminar Surviving in an unstructured world • Folksonomy • Known as collaborative tagging , social classification, social indexing, social tagging. • Classifying Web sites by the user community rather than by taxonomy professionals.

  27. MET ERT Seminar Introducing Social Bookmarking Social Bookmarking is the practice of saving bookmarks to a public website and ‘tagging’ them with keywords. To create a collection of social bookmarks, you register, store your bookmarks, add tags of your choice, and designate individual bookmarks as public or private. Social Bookmarking creates a true web of resources and connections – one that is not limited to individuals and their folders but represents the interests and judgment of a community of users.

  28. MET ERT Seminar Examples • Scenario 2 • Dr. Jones is an actuarial mathematics professor who continuously monitors websites related to his area of expertise. Most of the time he bookmarks the websites of his interest in his browser and organizes them in folders. At times he finds out that his essential bookmarks are on his home machine while he is at the office. Regularly Dr. Jones needs to share bookmarks with students and colleagues. Scenario 1 A group of students has to do a research project on using technology constructively in the classroom. There are 4 members in the group and all of them have been assigned to research the related articles of their topic. Whoever finds the interesting pieces on the internet, he or she will simply forward the website to one another. At times it becomes a barrage and the resources aren’t organized. It is so hard for them to continue to work on their project.

  29. MET ERT Seminar Using Social Bookmarking in blended learning environment • Example: using social bookmarking for the project in TM648: Introduction to e-commerce • Group project: Creating e-commerce website • Students use social bookmarking to collect group resources and leverage each other experiences in the process of creating research materials. • Students share and exchange their websites with other groups in order to expand their online resources easier and much faster. • Technology makes group collection and aggregation of information very easy.

  30. MET ERT Seminar Example of Social Bookmarking site

  31. MET ERT Seminar Future Meetings, Topics and Participation (All)

  32. MET ERT Seminar Received Requests (1) We need to start a discussion of problems and solutions for blended education. In Lou's and my paper (presented in Sophia) we noted several advantages and several challenges. (2) It will be useful if Leo demonstrates lot of stuff has been accomplished by him in the past year, and tools on his website. We will all benefit from a dummies tutorial of educational technology. (3) High on my agenda for this year is camtasia relay (it will essentially replace appraisso from my perspective). While I recorded several great sessions using appraiso I found it very complex to use. (4) Finally if someone can crack Drupal for me that will be great. It is a public domain content management system. Is it useful for us? Is it redundant with what we already have? (5) I realize it's heretical but my interest is in finding a platform for distance ed that doesn't use Vista. I am very interested in finding a search-based, strongly graphical system such as the one used, for example, for flickr. I wonder if the new Google Chrome, which is open source, can be used by our development team.

  33. MET ERT Seminar Closing Remarks Tanya THANK YOU!

  34. MET ERT Seminar SUPPORT SLIDES

  35. Virtual Laboratories for Learning Real World Security Future Work Offer choice of application platforms, browsers, CA, etc. to accommodate group preferences Optimize lab implementation for larger classes, online and blended programs Explore additional security protocols (e.g. IPSec) Introduce additional workplace scenarios (e.g. enterprise perimeter security, SCADA systems, database security) Introduce additional attack vectors, vulnerabilities and countermeasures, elements of network forensics Add case studies and simulations to emphasize importance of processes and promote experience sharing How to measure learning outcomes?

  36. Virtual Laboratories for Learning Real World Security Student’s PerspectiveAndy MacNeil,2008 BU Graduate, NSA Information Assurance Scholarship Program Participant

  37. Virtual Laboratories for Learning Real World Security Key Learning Points Reality of Basic Network Security Use of Encryption Algorithms Establishing relationships Building a valuable toolbox and skill inventory

  38. Virtual Laboratories for Learning Real World Security Basic Security Username and password concept is very simple Simplicity in exchange for security Initial thoughts

  39. Virtual Laboratories for Learning Real World Security Encryption Algorithms • Was unclear how encryption could be used to secure a transmission • Do we have to install a separate program to encrypt the data we send? • Cipher Suites • What is this? • How are they determined? • Ex. TLS_RSA_WITH_RC4_128_SHA (0x0005)

  40. Virtual Laboratories for Learning Real World Security Piecing It All Together • How can we be certain? • Where does the trust/mistrust occur? • Trusted Root Stores • What is this • What does it do

  41. Virtual Laboratories for Learning Real World Security My Toolset Useful tools and skills to jump-start my career Working with others and having fun! Learning through writing a manual to teach others … and getting respect for security processes for the rest of my life

  42. Virtual Laboratories for Learning Real World Security Questions & Answers

  43. 3. Education and Business Reality Harvard Business Review: "Business schools are on the wrong track. Some of the research produced is excellent, but because so little of it is grounded in actual business Practice, the focus of graduate business Education has become increasingly Circumscribed -- and less and less relevant to practitioners".[2] “We should aim to be the premier University in the United States where specialization is not an end in itself, but always part of a program that aims explicitly at higher goals and broader horizons.” Boston University, Report of the Task Force on Changing Landscape And leading universities are accepting the challenge: There is a real gap between higher education and today’s business realities

More Related