Re-using 2 minutes guides

Last term we added a 2 minute guide to our comprehensive online  support site. This site has always been designed for the least technically confident user imaginable, as we know from our support calls that they are the ones who need the help.  However in  the last couple of years it has become clear that the  majority of our students are competent IT users who didn’t look at our support site because it was too large.  Paradoxically this meant they missed out on the information even a confident IT user really did need –  hence our 2 minute guide.

In developing the guide I decided to take the OER route as surely we were not the first to write such a thing.  The nadir of this process was finding a 2 minute guide as a 5 minute video.  However,  in the end, old fashioned non OER reuse was the solution – I asked permission and paraphrased something someone else in the Department had written.

So an everyday story of pragmatic reuse.  Something I have recently been reminded about both in the context of our OER Impact work and our recent google analytics report which showed that the average time spent on the 2 minute guide page was 2.02 minutes – shall I let the person who originally wrote the content know?

Image: 1305 Seconds / Rob Lockhart / CC BY-NC-ND 2.0

VLEs at the heart of curriculum innovation

In the latest JISC e-Learning Focus they are discussing VLEs at the heart of curiculum devlivery showcasing among other work our development of Moodle for online assignment submission during the Cascade project.  Inspired by the wordle used in the e-Learning Focus article, I decided to create one from the Cascade final report.  While this is obviously a very simplistic technique it does provide a surprisingly useful overview of the work of Cascade as below.  I think I may be using this again.

Cascade Wordle

Cascade Wordle

OpenAttribute tool

Happy woman

Jubilation / Keith Kristoffer Bacongco (http://www.flickr.com/people/kitoy/relationship/) / CC BY 2.0 (http://creativecommons.org/licenses/by/2.0/)

Today we are very excited in the TALL office because David Kernohan has drawn our attention to the very cool OpenAttribute tool, available from http://openattribute.com.

As the site says:

The problem: Creative Commons licensed content is awesome, but attributing it properly can be difficult and confusing. The first rule for re-using openly licensed content is that you have to properly attribute the creator. There are specific requirements for what needs to go into that attribution, but those requirements can be confusing and hard to find.

It is in no way an exaggeration to say that a tool which addresses this challenge has caused jubilation from the project team at TALL, who while we frequently use OERs are always worried we have inadvertaintly attributed things wrongly.

As you can see from the example of the picture here, we can generate attributions from this tool in plain text (as in the caption) or in html (Jubilation / Keith Kristoffer Bacongco / CC BY 2.0) which is clearly more elegant, but not always an option.

Maximizing effective use of technology in new programmes

Aimed at academic staff developing new courses and e-Learning managers and learning technologists seeking to encourage wider uptake of technology by teaching staff, this case study draws on the JISC-funded Cascade project’s experience of designing tools, systems and resources to enable academic staff to more effectively incorporate the use of technology in new programmes.

Using technology to support new course models that move a programme either fully or partially, online can allow for a much more flexible offerings to students.  However, to ensure this is done in an appropriate and sustainable fashion, staff have to be supported effectively in this process.  This can be done by:

  • Ensuring technology use is considered at the right point in the course design process;
  • Identifying where and how technology really addresses your needs;
  • Providing support and guidance for those designing new programmes and wanting to take a more strategic approach to using technology in order to achieve maximum benefits;
  • Providing information on the cost effectiveness and efficiency of different choices so that those designing new programmes can ensure their course is sustainable.

Read the full case study at:  Cascade Case Study 5: Maximizing effective use of technology in new programmes.

Enabling staff to easily use a VLE to support course delivery

Aimed at e-Learning developers, this case study draws on the JISC-funded Cascade project’s experience of designing tools, systems and resources to enable academic and administrative staff to easily use a VLE to support course delivery.

This suggests that using technology to support a course delivered either fully online, largely face-to–face or via blended learning, can provide real value to both staff and students.  However, it is easy to do this in such a way that it creates more work without fully delivering on the potential benefits.  Avoid this by:

  • Identifying where and how technology really adds value;
  • Developing tools and procedures that make it easy for all staff to set up and use a VLE;
  • Embedding support within existing cycles of work, wherever possible;
  • Ensuring adequate support and guidance is available to prevent basic barriers;
  • Providing cost- and time-effective options to ensure services are sustainable.

Read the full case study at:  Cascade Case Study 4: Enabling staff to easily use a VLE to support course delivery.

OER and the curriculum

Flower made from 5 spoons and a marble

AttributionNoncommercialShare Alike Some rights reserved by kcolwell

Last Wednesday I attended the latest in the very useful series of Elluminate sessions organised by the JISC Curriculum Design and Delivery programme.  Entitled “Academy/JISC OER Programme: implications for curriculum design and delivery”.  This session gave a really valuable overview of the JISC OER initiatives so far in this context.  For our study the following questions posed by Helen Beetham particularly resonated.

  1. What kinds of OERs do we see being adopted and re-used, and how? What new skills/expertise are required?
  2. How can OERs be integrated sustainably into curriculum processes? In what ways are curriculum processes challenged/contested/changed by use of OERs?
  3. How does the use of OERs impact on (e.g.) Student engagement? Student autonomy? Student achievement? Staff workload? Pedagogies in use?
  4. What kind of communities (e.g. Subject-based)benefit from OER sharing/reuse? How can OERs enhance existing open practices in learning/teaching communities?

If you want to experience this for yourself a recording is available at https://sas.elluminate.com/mr.jnlp?suid=M.73C03453269CFD3F84F16CCF8C0322&sid=2009077 .

Using technology to support prospective students

Aimed at staff responsible for coordinating the marketing of courses and managing student enrolments, this case study draws on the JISC-funded Cascade project’s experience of using technology to support the very first stage of the curriculum delivery process by making it easy for prospective students to find the course they wish to study and, where possible, to enrol and pay for their chosen course(s) online.

The project found that to encourage students to choose your institution, you should:

  • Make finding courses as easy as searching on Google;
  • Provide easily accessible information about all aspects of a course and the institution, and offer answers to common questions about what a course involves, both in pedagogical terms and practical ones;
  • Provide testimonials or case studies of previous students’ experiences of studying your courses;
  • Make enrolling on and paying for a course as easy and straightforward as possible, using online enrolment and payment wherever possible.

Read the full case study at:  Cascade Case Study 3: Using technology to support prospective students.

The Social Threshold

Society is constantly negotiating the boundaries between the public and the private. Surveillance, comments made in private but at work and exposing private lives in the papers are just some of the areas under permanent discussion. Back in days-of-yore the threshold between the public and the private was commonly the door-step. We talk of ‘Crossing the threshold’ as in stepping in from the public space of the street to the privacy of a dwelling. All cultures have always had back channels which circumnavigate the formality of this type of threshold, of being ushered into the front parlour, but it generally used to be possible to assess the level of privacy of a given situation by the walls it was taking place within and who was in the room.

Front Door

Social Threshold (some rights reserved: http://is.gd/rofJl0)

The integration of technology into society and the new forms of interpersonal connections it can facilitate erodes the ‘who is in the room?’ or ‘what room am I in?’ systems of assessing privacy. This stretches from snail-mail all the way through to security cameras. We can easily be caught out by technology which makes socially demarked spaces leaky. For example:

  • Discovering the mobile phone in your bag has dialled someone and left a 5 minute voice message of the private conversation you were having with a colleague.
  • Realising that the baby monitor has projected the lullaby you were singing to your child into the living room and probably the living rooms of a number of neighbours who also have young children.
  • Finding out after the fact that the conference session in which you made an offhand comment at about your institution was being live streamed onto the web.
  • Stumbling across tagged photos of you at a party posted in Facebook by others.

These are examples of where the public/private character of a physical space is disrupted by technology. When the primary ‘space’ is online the situation becomes more complex. Here are a few examples from my own experience:

  • Discovering that my ‘Can someone please make it lunchtime?’ tagged tweet in a small parallel conference session was being projected in a Twtterfall on a huge screen behind an eminent panel in the main hall.
  • Being told in an online meeting room that all private text chat messages were visible to moderators, after having made slightly disparaging remarks about the session in ‘private’ to a colleague.
  • Essentially being told-off on the phone by my very Scottish mother for using the American spelling of ‘whiskey’ in a tweet about 30 minutes after I posted it.

In all these cases assumed levels of privacy had to be reassessed in an uncomfortable moment of disjuncture. My imagined social map of the spaces had to be quickly redrawn as the original boundaries were shown to be permeable.

Researchers investigating Massively Multiplayer Online games or Virtual Worlds understand this type of disjuncture which in these cases is forgrounded by the presence of an avatar. The potential embodiment of the individual’s identity and form within the virtual space highlights the fact that he or she is existing simultaneously across two worlds. It’s the shifting nature of the extent to which the individual is in the physical or the virtual world which can cause suspicion and unease to the uninitiated. The boundary between the online and offline worlds has been described as a ‘semi-permeable membrane’ with influences passing in both directions.

I suggest that these membranes or social thresholds not only exist between online and offline spaces, but also between online platforms and constantly need to be redrawn as we attempt to map our own sense of the public and the private. In my case I was technically aware that my tweets were open to Google but it was only at the point at which I discovered my mother Googled for them that the threshold shifted. A wall had been knocked down in my public/private landscape.

My ‘Digital Visitors and Digital Residents’ continuum focuses on the importance of the social perceptions and motivations of individuals as they approach the web. A shift from Visitor to Resident activity involves crossing a social threshold. The position and width of the threshold along the Visitors and Residents continuum will be different for each individual, dependant on their perception of when a platform or online activity becomes social or public (with a small or large P). This is the point at which a platform changes from being a ‘tool’ to a ‘space’ in the mind of the individual, when the mode of engagement takes on a social edge. Google Docs is a good example; for me it is simply a word-processing tool until I notice that others are editing, at which point the public/private boundaries shift slightly and the tool has became a social space; it has moved one step closer to being public. My behaviour changes as I begin to cross the social threshold.

Google Docs

Word processing becomes social

Social media platforms, with their inherent hyper-connectivity require the user to hold highly complex multi-dimensional maps of them as social spaces, with many thresholds of differing permeability. It’s a long way from closing-the-front-door type methods of creating privacy boundaries. Some people are very skilled at managing the ‘edges’ of these social maps and manage their digital identities with great skill and to great effect. The rest of us have come to expect occasional moments of disjuncture.

I would argue that our notions of the public and the private don’t yet account for the width of these social thresholds or for the speed at which they can shift. We constantly negotiate the boundaries between the public and the private but we have an expectation that these boundaries, while moving, will remain sharp. The web and especially social media platforms defocus our understanding of these boundaries. Our ability to map and remap our relationship with these social thresholds is a key form of digital literacy, and possibly a new life-skill (if I can call it that).

What intrigues me is the possibility that those growing-up with these technologies may have a different perception of what privacy means and different approaches to managing their social landscapes. We now generally agree that the Digital Native does not exist as defined by age, but other generational nuances may exist, not in access and skill but in terms of managing and accepting shifting social thresholds.

Customizing open source software: benefits and pitfalls

Aimed at e-Learning developers, this case study draws on the JISC-funded Cascade project’s experience of customizing the Moodle assignment module, to highlight the benefits and pitfalls of working with open source software.

This aspect of the Cascade project had two key challenges: (a) to specify requirements for enhanced assignment-handling functionality in Moodle; and (b) to develop the code itself.  Both proved far more challenging than anticipated.

The experience of the project suggests that customizing open source software to meet the institution’s bespoke curriculum delivery requirements can result in the development of a robust system offering improved services to stakeholders, however there can be pitfalls.  Key recommendations for other developers considering similar projects are:

  • Define the processes involved before working on the development of software; a broken or unclear process cannot have an effective technological solution;
  • Keep all stakeholders informed of what the final result will be, providing updates when the requirements/functionality change;
  • Have everyone concerned with functionality and bug identification use an issue management system from the start of the project;
  • Use version control to manage code, but keep it simple;
  • Learn and work with the norms of the open source community for maximum wider benefit.

Read the full case study at:  Cascade Case Study 2: Customizing open source software: benefits and pitfalls.

OER reuse landscape

We started our investigation into reuse of OER by reviewing both the relevant research literature and a less formal, but equally important debate, in the blogosphere. The purpose was to:

  • Understand what issues associated with reuse have already been covered in the research and what still needs to be explored; and
  • Identify things that we haven’t thought about but might want to explore in our own research.

Below we give a brief summary of our observations; however, at the end of this post you will find a mindmap with the OER reuse landscape as it has presented itself to us in the literature that we have reviewed. The map has been published and is available for anyone to edit. We envisage it as a living document, so please contribute – for example, by adding new nodes, restructuring the old ones, or adding notes or new references.

Now, some of our general observations:

  • There are many beliefs as well as context-, position-, and perspective-sensitive opinions about the benefits that sharing and reuse might bring to society, education, teaching and learning in general, as well as to specific groups of users.
  • Something, but not enough, is known about who reuses what. Although quantitative data on downloads and hits tell us little about a particular user and their preference for specific types of OER, there is some qualitative evidence that particular user groups have preferences for specific attributes of reusable resources: e.g. teachers tend to prefer materials made out of loosely coupled assets that one can pick-up and incorporate into a new whole (see JISC Synthesis and Evaluation Report).
  • Almost nothing is known about the how and the why of reuse, but we were able to identify some interesting case studies with evidence of reuse and related benefits (e.g. Greaves et. al. 2010) (we are looking for more so please contact us if you have one or know of one).
  • More and more voices are now advocating a shift from the supply-driven concept of OER towards an understanding of their place in current teaching and learning practice, and whether (and how) they might contribute to changes in this practice. In this respect, they suggest discarding the concept of an ‘open resource’ and focusing on the concept of an ‘open person’ instead.
  • The areas defined as most challenging to the successful uptake of OER in educational community are: quality assurance, teaching culture and tradition, and the conflicting agendas of different stakeholders, e.g. institution promotes sharing and reuse of OER but at the same time only excellence in research is being rewarded.
  • Although our research is about reuse, nonetheless we should keep the notion of sharing at the back of our minds, as there seems to be a close link between the former and the latter in several aspects (for more about this, see our mindmap).
  • The OER “umbrella” seems to cover a huge range of resources (as shown on the mindmap), which may not make it a very useful concept from the user’s perspective. Certainly, it makes evaluating the impact of OER on teaching and learning practice very difficult. What we intend to achieve, however, is to broaden our understanding of the area to an extent where it will be possible to make suggestions about where further, in-depth investigations are needed.