Note for Reviewers: Start Here
View more
Note to Students:
View more
MLW's LTEC Portfolio
UNT LTEC Portfolio
My research interests span a wide range of topics, including: technology proficiency, information security, technology-based learning environments, connectivism, artificial intelligence, machine learning, human resiliency, cognitive psychology, human performance improvement, ethics, conditional logic, instructional design, adaptive learning systems, and failure points in learning.
Connectivism: A Networked Learning Theory for the Digital Age
View more
14:16
YouTube
Should we let students use ChatGPT? | Natasha Berg | TEDxSioux Falls
The emergence of ChatGPT in November of 2022 took the world by storm: particularly the world of education. With this technology able to generate complex pieces of writing, solve advanced math equations, generate code, and more with the push of a button, educators across the country have entered a state of panic. How are educators supposed to teach students when they have this technology at their literal fingertips? For too long, the field of education has been teetering at the precipice of serious change, and the widespread accessibility of generative AI may just be the catalyst education needs in order to progress in tandem with the rest of the world. But first, educators need to reevaluate their answer to the tough question: why do we teach? Natasha Berg, M.Ed. works as the Multimedia and Technology Integration Specialist at a local high school in South Dakota. She has spent her career learning about and developing her skills in education and educational technology. Berg believes that new and emerging technology should be integrated into classrooms as it fully prepares students to enter the 21st century workforce and helps make learning accessible to students of all abilities. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx
15:37
YouTube
How AI Could Save (Not Destroy) Education | Sal Khan | TED
Sal Khan, the founder and CEO of Khan Academy, thinks artificial intelligence could spark the greatest positive transformation education has ever seen. He shares the opportunities he sees for students and educators to collaborate with AI tools -- including the potential of a personal AI tutor for every student and an AI teaching assistant for every teacher -- and demos some exciting new features for their educational chatbot, Khanmigo. If you love watching TED Talks like this one, become a TED Member to support our mission of spreading ideas: https://ted.com/membership Follow TED! Twitter: https://twitter.com/TEDTalks Instagram: https://www.instagram.com/ted Facebook: https://facebook.com/TED LinkedIn: https://www.linkedin.com/company/ted-conferences TikTok: https://www.tiktok.com/@tedtoks The TED Talks channel features talks, performances and original series from the world's leading thinkers and doers. Subscribe to our channel for videos on Technology, Entertainment and Design — plus science, business, global issues, the arts and more. Visit https://TED.com to get our entire library of TED Talks, transcripts, translations, personalized talk recommendations and more. Watch more: https://go.ted.com/salkhan https://youtu.be/hJP5GqnTrNo TED's videos may be used for non-commercial purposes under a Creative Commons License, Attribution–Non Commercial–No Derivatives (or the CC BY – NC – ND 4.0 International) and in accordance with our TED Talks Usage Policy: https://www.ted.com/about/our-organization/our-policies-terms/ted-talks-usage-policy. For more information on using TED for commercial purposes (e.g. employee learning, in a film or online course), please submit a Media Request at https://media-requests.ted.com #TED #TEDTalks #education #AI #khanacademy
03:55
YouTube
Kahn and Cerf on why the ARPANET was built
Robert Kahn, winner of the Association for Computing Machinery's A.M. Turing Award, discusses the original motivations behind the creation of the ARPANET. This clip is taken from an interview conducted with Kahn by Vinton Cerf (his co-awardee) for the Computer History Museum on September 30, 2006 in McClean, Virginia. Video of the full interview is available as part of Kahn’s ACM profile at https://amturing.acm.org/award_winners/kahn_4598637.cfm.
arxiv.org
arXiv.org e-Print archive
arXiv is a free distribution service and an open-access archive for nearly 2.4 million scholarly articles in the fields of physics, mathematics, computer science, quantitative biology, quantitative finance, statistics, electrical engineering and systems science, and economics. Materials on this site are not peer-reviewed by arXiv.
1
2
3
1
2
3
CYBERSECURITY, TECHNOLOGY AND SOCIETY
CYBERSECURITY, TECHNOLOGY AND SOCIETY |
Students will explore how technology is related to cybersecurity from an interdisciplinary orientation. Attention is given to the way that technologically-driven cybersecurity issues are connected to cultural, political, legal, ethical, and business domains.
1
2
3
4
5
6
7
8
DigitalCommons@Kennesaw State University
Applying High Impact Practices in an Interdisciplinary Cybersecurity Program
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university’s undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and electronic portfolios. This paper reviews the literature on these practices, highlights the way that they were implemented in our cybersecurity program, and discusses some of the challenges encountered with each practice. Although the prior literature on high impact practices rarely touches on cybersecurity coursework, the robust evidence of the success of those practices provides a sound rationale for applying them across the curricula. Challenges confronted included developing partnerships, introducing students to new learning strategies, and gaining buy in from faculty. Despite these challenges, the authors’ experiences with the efforts also support using high impact practices in cybersecurity programs. Recommendations for other cybersecurity programs seeking to expand the use of high impact practices include integrating experiential learning throughout the curricula, developing campus-wide partnerships, embracing the interdisciplinary nature of cybersecurity, demonstrating the purpose of the practices, providing faculty development, emphasizing writing, and embracing failure.
Old Dominion University
Research
A primary mission of ODU's Center for Cybersecurity Education and Research (CCSER) is to develop high-impact, cross-disciplinary research initiatives that center on cybersecurity and be a source of cybersecurity expertise to the University, the Hampton Roads region, and the Commonwealth of Virginia.
1
2
3
Cybersecurity Framework & Policies | Microsoft Cybersecurity
View more
Psychological Techniques Used by Threat Actors
View more
40:22
YouTube
Cyber Resilience
This session was part of the 2022 Aspen Cyber Summit. You can learn more about the Summit here: https://www.aspencybersummit.org/ The idea of cyber “resilience” is not new, but it has taken on a new meaning in the wake of ransomware attacks on critical infrastructure and Russia’s further invasion of Ukraine. Leaders from government and the private sector will discuss how the idea has evolved, what it means to them today, and how it should impact security going forward. Adam Bromwich, Vice President R&D, Symantec, by Broadcom Software Valerie Cofield, Chief Strategy Officer, Cybersecurity and Infrastructure Security Agency Sean Joyce, Principal, Global and US Cybersecurity and Privacy Leader and US Cyber, Risk and Regulatory Leader, PwC Iranga Kahangama, Assistant Secretary for Cyber, Infrastructure, Risk, and Resilience, Department of Homeland Security with Jeff Greene, Senior Director of Cybersecurity Programs, Aspen Digital, The Aspen Institute
The White House
National Cyber Workforce and Education Strategy
The Biden-Harris Administration unveiled the National Cyber Workforce and Education Strategy (NCWES), a first-of-its-kind comprehensive approach aimed at addressing both immediate and long-term cyber workforce needs. Filling the hundreds of thousands of cyber job vacancies across our nation is a national security imperative and the Administration is making generational…
The White House
Connecting Americans to Good-Paying Jobs in Cyber | ONCD | The White House
To keep all Americans secure and boost the next generation of innovation in the U.S., we must drastically scale up the cyber workforce across the country. The Office of the National Cyber Director (ONCD) developed the National Cyber Workforce and Education Strategy (NCWES) and Fact Sheet to address this national security and economic imperative. The…
udlguidelines.cast.org
UDL: The UDL Guidelines
The UDL Guidelines are a tool used in the implementation of Universal Design for Learning, a framework to improve and optimize teaching and learning for all people based on scientific insights into how humans learn. Learn more about the Universal Design for Learning framework from CAST. The UDL Guidelines can be used by educators, curriculum developers, researchers, parents, and anyone else who wants to implement the UDL framework in a learning environment. These guidelines offer a set of concrete suggestions that can be applied to any discipline or domain to ensure that all learners can access and participate in meaningful, challenging learning opportunities.
SpringerLink
Social cybersecurity: an emerging science
With the rise of online platforms where individuals could gather and spread information came the rise of online cybercrimes aimed at taking advantage of not just single individuals but collectives. In response, researchers and practitioners began trying to understand this digital playground and the way in which individuals who were socially and digitally embedded could be manipulated. What is emerging is a new scientific and engineering discipline—social cybersecurity. This paper defines this emerging area, provides case examples of the research issues and types of tools needed, and lays out a program of research in this area.
Theoretical Framework
View more
1
2
3
4
5
1
2
3
4
5
Connectivism Learning Theory
View more
Introduction
View more
Research Questions
View more