Technology can assist instructional designers and teachers in meeting the needs of learners in traditional classrooms and virtual course environments. During the COVID-19 pandemic, many teachers and instructional designers began looking for resources they could use for hybrid and online course delivery. Many found that the cost of some technology tools was well outside of their financial means to assist them in meeting student learning outcomes. However, some digital tools provide free access for educators and are beneficial to students. In this article, the authors shared five tools they have used in developing and teaching online and traditional technology courses at the college level. They share how they used a learning management system tool, a collaboration tool, a search engine tool, a content creation tool, and a content sharing tool to engage students in their courses. As teachers look for alternatives to use as they move content from classroom teaching to online instruction, this article can help them consider the recommended tools for instruction. Teachers, instructors, and instructional designers may explore the free digital tools in this article and do further research on other digital tools to support student learning in their disciplines.
more »
« less
Returning to the digital world: Digital technology use and privacy management of women transitioning from incarceration
Based on interviews with 75 women transitioning from incarceration, our research identifies technology access and skills barriers facing this population and their underlying concerns and motivations in navigating privacy online. Our results suggest precarious housing and financial situations, concerns about ex-partners, mental health issues, and lack of self-efficacy pose challenges for their access to and use of digital technologies and influence their online privacy perspectives. Many participants reported relying primarily on cellphones for various tasks including job applications. Closing public places including libraries amid the COVID-19 pandemic put them at an even greater disadvantage, as many of them depend on computers or Wi-Fi available in those places. Nothing-to-lose attitudes were salient among this group resulting in many not taking precautionary measures online or choosing to go offline. Our research highlights the importance of building academic-community partnerships to provide technology and privacy education tailored for this population’s particular needs and desires.
more »
« less
- Award ID(s):
- 1907002
- PAR ID:
- 10337461
- Date Published:
- Journal Name:
- New Media & Society
- Volume:
- 24
- Issue:
- 3
- ISSN:
- 1461-4448
- Page Range / eLocation ID:
- 641 to 666
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
null (Ed.)Older adults are increasingly becoming adopters of digital technologies, such as smartphones; however, this population remains particularly vulnerable to digital privacy and security threats. To date, most research on technology used among older adults focuses on helping individuals overcome their discomfort or lack of expertise with technology to protect them from such threats. Instead, we are interested in how communities of older adults work together to collectively manage their digital privacy and security. To do this, we surveyed 67 individuals across two older adult communities (59 older adults and eight employees or volunteers) and found that the community's collective efficacy for privacy and security was significantly correlated with the individuals' self-efficacy, power usage of technology, and their sense of community belonging. Community collective efficacy is a group's mutual belief in its ability to achieve a shared goal. Using social network analysis, we further unpacked these relationships to show that many older adults interact with others who have similar technological expertise, and closer-knit older adult communities that have low technology expertise (i.e., low power usage and self-efficacy) may increase their community collective efficacy for privacy and security by embedding facilitators (e.g., employees or volunteers) who have more technical expertise within their communities. Our work demonstrates how both peer influence and outside expertise can be leveraged to support older adults in managing their digital privacy and security.more » « less
-
Abstract The recent development and use of generative AI (GenAI) has signaled a significant shift in research activities such as brainstorming, proposal writing, dissemination, and even reviewing. This has raised questions about how to balance the seemingly productive uses of GenAI with ethical concerns such as authorship and copyright issues, use of biased training data, lack of transparency, and impact on user privacy. To address these concerns, many Higher Education Institutions (HEIs) have released institutional guidance for researchers. To better understand the guidance that is being provided we report findings from a thematic analysis of guidelines from thirty HEIs in the United States that are classified as R1 or “very high research activity.” We found that guidance provided to researchers: (1) asks them to refer to external sources of information such as funding agencies and publishers to keep updated and use institutional resources for training and education; (2) asks them to understand and learn about specific GenAI attributes that shape research such as predictive modeling, knowledge cutoff date, data provenance, and model limitations, and educate themselves about ethical concerns such as authorship, attribution, privacy, and intellectual property issues; and (3) includes instructions on how to acknowledge sources and disclose the use of GenAI, how to communicate effectively about their GenAI use, and alerts researchers to long term implications such as over reliance on GenAI, legal consequences, and risks to their institutions from GenAI use. Overall, guidance places the onus of compliance on individual researchers making them accountable for any lapses, thereby increasing their responsibility.more » « less
-
Abstract Student-organized activism and obfuscation respond to intrusive surveillance in digital assessment within higher education. This article explores privacy surveillance disconnects and the emergence of protests against antinormative practices. Employing qualitative and quantitative methods, including content analysis of subreddits focused on higher education, student privacy, and specific university campus communities, the study considers multiple stakeholders’ perspectives. The findings illustrate the creative avenues students have adopted to counter online assessment tools. Emphasizing the significance of privacy and autonomy in higher education, this work sheds light on the challenges faced by students and provides insights into their strategies for addressing privacy concerns.more » « less
-
null (Ed.)The rapid growth of facial recognition technology across ever more diverse contexts calls for a better understanding of how people feel about these deployments — whether they see value in them or are concerned about their privacy, and to what extent they have generally grown accustomed to them. We present a qualitative analysis of data gathered as part of a 10-day experience sampling study with 123 participants who were presented with realistic deployment scenarios of facial recognition as they went about their daily lives. Responses capturing their attitudes towards these deployments were collected both in situ and through daily evening surveys, in which participants were asked to reflect on their experiences and reactions. Ten follow-up interviews were conducted to further triangulate the data from the study. Our results highlight both the perceived benefits and concerns people express when faced with different facial recognition deployment scenarios. Participants reported concerns about the accuracy of the technology, including possible bias in its analysis, privacy concerns about the type of information being collected or inferred, and more generally, the dragnet effect resulting from the widespread deployment. Based on our findings, we discuss strategies and guidelines for informing the deployment of facial recognition, particularly focusing on ensuring that people are given adequate levels of transparency and control.more » « less
An official website of the United States government

