Join me at AECT 2019 in Las Vegas!

The word, Inspired, is written against a purple splash of paint.
AECT 2019 Inspired Theme logo

Association for Educational Communications and Technology

The Association for Educational Communications and Technology (AECT) is a fantastic professional organization for instructional designers, instructional technologists, educational technology support staff, instructors, and education researchers. Why? Because they do fun stuff like ‘Breakfast with Champions’ and ‘Game Night.’   I learned about it from my professors in my doctoral program who promoted AECT and their educational technology standards to their students. AECT’s 2019 international convention will be held in Las Vegas, NV from October 21st-25th at the Convention Center. This year’s convention theme is Inspired Professional Learning. Inspired Learning Professionals. Let me know if you plan to attend so we can network and attend sessions and events together.

Sessions

I’m excited to share that the following three presentations were accepted! I’m really happy to be able to lead an Inspire! session, which is a new format to provide 50-minute professional development without the extra cost.  I invite you to attend my sessions below.

Host: Design and Development (D&D) Division

Magis Instructional Design Model for Transformative Teaching, Dr. Sandra Rogers

Wed, Oct 23, 10:00 to 10:20am, Convention Center, Pavilion 6 (Note: I’m first in this concurrent session.)

Description. The Magis Instructional Design Model endeavors to transform teaching online through the lens of critical pedagogy to place the human in a real-world context as much as possible through learning experiences and reflection. The goal being transformative learning experiences instead of transmissive ones that use the antiquated banking model of education. The model includes instructional strategies from the cognitive and affective domains. The Author asks for input and feedback on this model.

Host: D&D: Instructional Design in Context – Service

Roadmap to Reentry Resources in Mobile County to Prevent Recidivism Service Project, Dr. Sandra Rogers, Dr. Demetrius Semien, & Aubrey Whitten

Wed, Oct 23, 2:20 to 2:50pm, Convention Center, Ballroom C (Note: We’re second in this session.)

Description. Would you like to start a service project? Consider creating a Google Map of service providers that meet a strong need in your community (food deserts, homeless shelters, or the previously incarcerated). Presenters will share their service project developing a reentry map of service providers to combat recidivism in their community. Learn to plot locations, draw pathways, and add information to a Google Map. Participants will also share what they are doing in their communities.

Host: Culture, Learning, and Technology (CLT) Inspire!

Safeguard Your Online Persona by Using Various Techniques and Technologies, Dr. Sandra Rogers

Oct 25, 9:00 to 9:50am, Convention Center, Conference Rm 1 (Note: Workshop format so bring your devices!)

Description. Have you googled yourself lately? What does the Internet search reveal about you? With each hashtag, blog post, tweet, and online project, you are building your online reputation whether you want to or not. In the absence of professional branding, your online persona brands you. Learn to curate your online personal data (e.g., Google Alert for keywords & reverse search images) and leave with an action plan.

Handouts

For AECT members, I’ll place my presentation and paper on the conference online portal. For my blog readers, I posted my presentations to SlideShare and embedded them here.

In closing, the sessions at AECT are really good. The organization’s special interest groups are dynamic. Conference-goers are very open to making new friends and learning, and this includes the big names in the field. You may find yourself sitting beside David Wiley, Curt Bonk, Lloyd Rieber, Amy Bradshaw, or George Veletsianos!

Breakfast table with invited guest and Wheaties box in the center
Breakfast with Champion, George Veletsianos

 

 

 

 

 

 

 

 

 

 

Curation of Your Online Persona Through Self-Care and Responsible Citizenship

Embed from Getty Images

 

I’m excited to announce my publication in this new K-12 book titled, Leveraging Technology to Improve School Safety and Student Wellbeing (Huffman, Loyles, Albritten, & Green, 2020). My contribution to the edited book is titled, Curation of Your Online Persona Through Self-Care and Responsible Citizenship (Rogers, 2020). It’s written for secondary teachers and their students. It started as a few lesson plans for an interdisciplinary course at Spring Hill College (IDS 394: Wired) and grew into blog posts and eventually this chapter. See my previous blog posts on the Recipe for Digital Curation of Your Online Persona and the Global Interdisciplinary College Course. Below is the abstract for my chapter.

ABSTRACT

With each blog post, tweet, and online project, Internet users are building their online reputation whether they want to or not. In the absence of professional branding, users’ online presence contributes vastly to what brands them. Through critical digital pedagogy, teachers and students question all technology practices (e.g., self, school, society). This chapter addresses the safety, security, and perception of their online data through self-determined prevention, weeding, and branding based on their short- and long-term goals. Methods, resources, and a lesson plan are provided as guidance to support students’ well-being pertaining to the online dimensions of their academic and personal lives. Strategies discussed include online identity system checks to review current digital footprint and data vulnerabilities, contemplation of technology usage in terms of self-care and responsible citizenship, and curation and development of their online persona. These participatory practices address two of the ISTE Standards for Students regarding digital citizenship.


The book’s release date was October 2019. There are many interesting chapters on school safety from many different perspectives including the marginalized. If interested in purchasing, let me know and I’ll provide you with a 40% discount coupon code.

I presented some of the curation strategies mentioned in the book at the Association of Educational Communications and Technology’s annual conference held in Las Vegas, NV this fall. My session was hosted by the Culture, Learning, and Technology special interest group in a new free workshop-style Inspire session. It was titled, Safeguard Your Online Persona by Using Various Techniques and Technologies. It was well received! See my AECT blog post with slidesI’ve learned so much from taking a deep dive into this topic to write this chapter and look forward to sharing it with you.

References

Huffman, P., Loyles, S., Albritton, S., & Green, C. (2020). Leveraging technology to improve school safety and student wellbeing. Hershey, PA: IGI Global. doi:10.4018/978-1-7998-1766-6

Rogers, S. (2020). Curation of your online persona through self-care and responsible citizenship: Participatory digital citizenship for secondary education. In S. P. Huffman, S. Loyless, S. Albritton, & C. Green (Eds.), Leveraging Technology to Improve School Safety and Student Wellbeing. Hershey, PA: IGI Global. doi:10.4018/978-1-7998-1766-6


Sandra Annette Rogers, Ph.D.

Teacherrogers Products
Pre-K, Kindergarten, First, Second, Third, Fourth, Fifth, Sixth, Seventh, Eighth, Ninth, Tenth, Eleventh, Twelfth, Higher Education, Adult Education, Homeschooler, Staff, Not Grade Specific - TeachersPayTeachers.com

Recipe for Digital Curation of Your Online Persona

Cartoon headshot of blogger, Sandra Rogers

Have you googled yourself lately? What does the Internet search reveal about you? With each hashtag, blog post, tweet, and online project at a time, you’re building your online reputation whether you want to or not. In the absence of professional branding, your online persona brands you. Curation of our online personal data is more important than ever. This is because our online information and interactions are being used to analyze us for commercial benefit, credit ratings, job selection, relationships, health care decisions, harassment, law enforcement, and machine learning (Matsakis, 2019).

I’m putting together a few basic curation tasks in the ‘recipe’ below for a class lesson. Curation, of course, will take ongoing effort. These are simple actions to get you started.

Tag words from my blog

RECIPE

Curating Your Online Persona 

Time: Ready in minutes based on diversity of digital tools used and length of your digital footprint
Serves: Average technology users
Calories: 0

TIPS

  • Log out of all accounts to fully see information that you publicly shared.
  • Use alphanumericsymbolic passphrases for strong login credentials (e.g., @T!mBuk2B42Long). Create different ones for different types of accounts.
  • Consider the long-term impact of posting or otherwise reacting online.
  • Subscribe to a technical news service that shares how to keep your data safe such as  Mashable, TechCrunch or Wired.

INGREDIENTS

Benevolent Intention
Critical Thinking
Persistence
Relevant Safeguards

PREPARATION

  1. Search for your name on different Internet browsers (e.g., Google Chrome, Firefox, Internet Explorer, Safari). View at least the first three pages of results to find older accounts that you may have forgotten about and should close.
  2. Use Google’s reverse image search tool to see if your shared photos (e.g., headshot, Facebook profile, or wedding pictures) are used elsewhere without permission. For example, did you know that FB profile photos are publicly available? Anyone could be reusing or repurposing them.
  3. Set short and long-term goals based on your findings and personal insight.

CURATION

  1. Set up a Google Alert on your name to stay informed of its mentions on the Internet.
  2. Cleanse unprofessional social media posts. For example, use GoCardigan to remove retweets and likes on Twitter. Why? Twitter users can delete their own tweets but not their reactions to others.
  3. Close compromised or unused online accounts to safeguard your data and reduce your digital footprint. Review Wikipedia’s list of data breaches. Recheck the list periodically.
  4. Tighten the privacy settings on your social media accounts.

Please share your techniques and issues in safeguarding your online persona. I’ll continue to add to this post as I dive deeper into this topic and as new technologies surface.


Recommended Readings

Bates, C. (2018). Take charge of your online reputation. Educause. Retrieved from https://er.educause.edu/articles/2018/10/take-charge-of-your-online-reputation

Internet safety and cyber security awareness for college students. (N.D.) Retrieved from https://www.cyberdegrees.org/resources/internet-safety-for-college-students/

Matsakis, L. (2019). The Wired guide to personal data collection. Condé Nast. Retrieved from https://www.wired.com/story/wired-guide-personal-data-collection/


Sandra Annette Rogers, Ph.D

Teacherrogers Products
Pre-K, Kindergarten, First, Second, Third, Fourth, Fifth, Sixth, Seventh, Eighth, Ninth, Tenth, Eleventh, Twelfth, Higher Education, Adult Education, Homeschooler, Staff, Not Grade Specific - TeachersPayTeachers.com