LabR Learning Resources

Improving Group Collaboration in the Online Learning Environment

We have released our second book to the Apple iBooks store. This book, “Improving Group collaboration in the Online Learning Environment”, is work done in one of my Masters of Information Technology in Courses courses.

From the book abstract:
Collaborative group projects in the online learning environment pose different challenges than collaborative group projects in a traditional classroom environment. Apart from the collaborative technologies used , other factors affect the success of the effort including cohesiveness, coordination, group size and the assigned task. However, the selection of the appropriate technology affects the success of the group as the technology can either inhibit or enhance the collaborative process and the success of the endeavor.

Posted in Education, Technology Tagged with: , , , ,

What is Human Computer Interaction?

This video, which is about 5 years old, is a good way to understand what HCI is why it is important.

Posted in Human Computer Interaction, Technology Tagged with: , , ,

PAEI Update

The PAEI is operating again. We did a number of updates over the last couple of days, including fixing some code which was causing intermittent problems for people. We also added a new feature, where you can now search for a previous assessment. If you know the email address you used, or the assessment number, just fill out the form with either of those values, and your assessment is retrieved. If you enter just your email address, then a list of your previous assessments is retrieved.

You can also enter your name and email address to perform a search. Both values must match to get a list of your assessments.

Thanks for visiting our site! If you like it, please let your friends know. Almost 10,000 people have taken the PAEI online inventory!

Posted in Adult Education Tagged with: , , , ,

PAEI

The Online Philosophy of Adult Education is still here.  We are performing a migration of the site, and some things are not done yet.  The visuals/images in the HTML portions of the PAEI are not displaying correctly.  There also appears to be an intermittent problem with the generated report not being sent via email.

We are working to address these issues as we work through the migration.

Thanks for using the PAEI.

Posted in Adult Education Tagged with: , , , , ,

Schema Theory

The term schema, means an organization and orienting attitude that involves active organization of past experiences.  Here is a humorous explanation of schema theory from the perspective of a discussion with a fictional 14 year old nephew after he read something about schema theory.

Well, if he is reading magazines that discuss schema theory, then he is clearly reading things that his peers are not 🙂  (Clearly, Hot Rod magazine would not likely be discussing schema theory!)  So, fund his college education!

“Well Nephew, have you ever wondered why you can remember how to greet someone you have never met before?  Well, your parents started that process by teaching you to say things like “Hello, How are you”, or “It’s once to meet you”. When you meet new people in other places, like school, work or social settings, how would you great them?  Well, you will likely remember what your parents taught you.  This is an example of schema.  You learned how to greet someone, and your brain saved that information.  When you meet someone, your brain realizes that you have the information on how to greet them, and your brain recalls that information.  That is an example of a schema — the process or method of greeting someone.  When you can do it almost without thinking about it, it becomes what is called and automated schema.”

“But how do we get them Uncle Chris?”

“We learn schemas in lots of different ways.  When we read new information, our brain is figuring out how to best store that information and relate it to information we already know.  We can learn things that define how we behave in various situations, like the one I just mentioned.  Our parents, friends, teachers, books, magazine, almost anything we interact with can provide the start of a new schema or make one we already have better.”

“Okay, I get it.  Because we are even talking about this, you are helping me to build a schema.  Maybe I can explain this to someone someday.  So, why do we need schemes?  How do they help us?”

“Those are good questions Nephew.  Schemas are important to learning.  When we need to learn something new, like why is the sky blue during the day and black at night, we can rely upon something simple like the sky is blue when the sun is out and black when the is not.  That is acceptable for a lot of people we meet every day.  But that isn’t enough to answer the question for a scientist.  They need to understand the reasons why the sky is blue because that information can be used in other problems the scientist deals with.

We would call that basic explanation a generalization, or a pretty basic schema.  As we learn information in our science classes, we will start to modify or expand upon that basic schema until we know what we need to know to answer the question.  That means, different people can have more developed schemas on the same topic.  That is why you know more about cars than I do, and why I know the reason why the sky is blue and you don’r — yet.

Your teachers present information to you in certain ways because they are helping you to build an understanding about a topic, and therefore develop the schema for that topic.  Then, when you need to recall it, or be able to use it in different situations, you can.  Does that help?”

“Thanks Uncle, that helped a lot.  I am going to go back to my reading now.”

 

Posted in Education Tagged with: ,

Cognitive Information Processing and Memory

As a learning theory, Behaviorism dominated American psychology for half a century, but it suffered from not being able to describe the challenges associated with information recall.  Cognitive Information Processing (CIP) was not new to psychology, but its use as a learning theory allows us to address issues that behaviorism cannot.

The cognitive information processing model portrays the mind as possessing a structure consisting of components for processing (storing, retrieving, transforming, using) information and procedures for using the components. Like the behaviorism, the cognitive information processing model holds that learning consists partially of the formation of associations between new and stored information.

In the CIP model, learning occurs when information is input from the environment, processed, stored in memory, and then output in the form of some learned capability.  The question is to understand how the environment modifies human behavior, bearing in mind there is an intervening variable between the environment and the subsequent behavior; specifically, the information processing system of the learner.

CIP proposes a three stage memory system:  sensory memory, short-term memory, and long-term memory.
Sensory Memory
Sensory memory is associated with the senses including vision, hearing, tech (haptics) etc.  Sensory memory functions to hold this sensory information in memory very briefly, just long enough for the information to be processed further. There is a separate sensory memory corresponding with each of the five senses, but all are assumed to operate in essentially the same way.

When dealing with visual stimuli, it appears sensory memory is temporarily, rather than visually limited. That means that a great deal of visual information registers, but it decays very rapidly without further processing.
Relatively little information is known about sensory memories corresponding to the other senses, but they are presumed to function in a similar way.  Visual information is called Icon.

Unlike visual information, auditory information remains in sensory memory longer.  This is presumed to be because of the time it takes for speech processing to occur.  Auditory information is known as Echo.

Working or Short-term Memory

In this memory, further processing is carried out to make the information ready for either long-term storage or response and action at that time.  Working memory is generally thought to have independent processors for each sensory module.  Additionally, working memory has been likened to consciousness. If you are actively thinking about ideas, they are in working memory.  One important aspect of working memory is the relatively small amount of information it can contain and the short period of time it is available, typically 15 to 30 seconds.  (Have you ever wondered why you can walk from one room to another and forget why you went to the other room?)  This limited storage and short access time leads to practices like chunking to break complex tasks into simpler ones which can be more easily processed thorough sensory and working memory.

Information selected for further processing comes from sensory memory to working memory.  At this stage, concepts from long-term memory will be activated for use in making sense of the incoming information.  However, there are limits as to how much information can be held in working memory at one time, and for how long that information can be retained.  It is believed that working memory capacity can be increased through creating smaller bits of information to process, which are known as chunks.  The process of creating chunks is known as chunking.

Consequently, learning should be organized to allow activities to be easily chunked by the learner.  The current hypothesis is that as new chunks come into memory, they push out chunks that were previously occupying the available spaces in working memory. This is the now accepted explanation for the serial position known as recency. This is why people can remember with a higher degree of certainty the things that they heard most recently.

Research has shown that unrehearsed information, that is information which has not been selected for additional processing or storage into long term memory, will be lost from working memory in about 15 to 30 seconds.  To prevent the loss of information from working memory and to ensure its transfer to long-term storage, two processes are necessary: rehearsal and encoding.

Long-term Memory
We consider long term memory as the permanent record, or information storehouse.  It is currently assumed that once information has been processed into long term memory, it is never truly lost.  As far as we know, long-term memory is capable of retaining an unlimited amount and variety of information.  However, we forget things not because the information is lost, but only because the association or pathway to the information has deteriorated.

Episodic memory is memory for specific events, such as when you remember the circumstances surrounding how you learn to read a weather map, or perform some other task. Semantic memory, refers to all the general information stored in memory that can be recalled independently of how it was learned.   Sometimes we may not be able to remember how we learned something, because the circumstances surrounding the event were not particularly memorable. As far as educators are concerned, the emphasis is on semantic memory.

Representation of Information Storage as a Network
One way to conceive of long-term memory is to think of it as a sort of mental dictionary where concepts are represented according to their associations to one another.  A network model assumes the existence of nodes in memory, which correspond to concepts.  These nodes are thought to be interconnected in a vast network structure, representing the learned relationships among concepts.

Feature Comparison Models of Long-term Memory
In this model, concepts and memory are stored with sets of defining features.  The association to other concepts is then accomplished through a comparison of overlapping features.  The defining features are those an object must have in order for it to be classified in a category.  Characteristic features, are those that are usually associated with typical members of the category.  One challenge with the feature comparison model is that it does not take into account the issue of context as it relates to a specific concept.

Attention and Memory
Invariably some information is lost due to the excuse that the individual was not paying attention. Attention, has been conceptualized in a number of ways. Attention, is not an all or none proposition. Rather it serves to attenuate, or tune out, stimulation. We can see examples of this such as when we are attending a party and are involved in one conversation, and hear our name or a topic of interest elsewhere and our attention shifts. This means enough information was being processed about the other conversation to prompt us to react.

Ongoing research regarding attentionI speculates it is a resource with limited capacity to be allocated and shared among competing activities. This suggests learners have some control over the process, and can selectively focus attention to meet certain ends. This also suggests the tasks that require relatively little attention may be accomplished effortlessly or automatically.

Propositional Models of Long-term Memory
A proposition is a combination of concepts that have a subject and a predicate. In this model, instead of concept nodes comprising the basic unit of knowledge, the basic unit is now set to be the proposition. Because memory recallIs are often structured around propositions, propositions have been used for many recall experiments.
The propositional model is also a network model, like the Representation model we saw earlier.

Parallel Distributed Processing Models of Long-term Memory
Parallel processing is distinguished from serial processing in that multiple cognitive operations occur simultaneously as opposed to sequentially.  Network memory models have come to include the assumption of parallel processing, but this assumption is at the very core of this model.  This model is also known as a connectionist model.

The model proposes that the building blocks of memory are in fact connections. These connections are sub-symbolic in nature, which means they do not correspond to meaningful bits of information, like concepts or propositions. Instead the units are simple processing devices and connections describe how the units interact with each other.  Consequently, this forms a vast network, across which processing is assumed to be distributed.  The parallel distributed processing model seems to account for the incremental nature of human learning.
This model also allows for incorporating goals into the dynamics of the information processing system.  There has been limited evidence supporting the parallel distributed processing model as a mirror of neural processes in the brain.

Dual Code Models of Long-term Memory
Imagery is often called “images in my mind”.  Imagery could be tactile, auditory, visual or others such as olfactory or kinesthetic in nature.  There are challenges in memory with words that are more abstract in nature than words that are more concrete. For example people find it much easier to remember words like sailboat, apple, and zebra rather than words like liberty and justice.

According to the dual code or dual systems view, there are two systems of memory representation, one for verbal information and the other for nonverbal information. The theory currently suggests that mental images are not exact copies of visual images.  Images tend to be imprecise representations, with many details omitted, incomplete, or in some cases accurately recorded.

Retrieval of Learned Information
After information has been stored in long-term memory, it needs to be recalled for later use.  Previously learned information is brought back into working memory, either for the purpose of understanding some new input or for  making a response.  To recall information, learners must both generate an answer and then determine whether it correctly answers the question.  In recognition, however, potential answers are already generated, and the learner must only recognize which one is correct.

In free recall situations, learners must retrieve previously stored information with no clues or hints to help them remember.  Because there are no cues to potentially bias the retrieval of information, the theory is that the output of free recall is assumed to accurately represent what is in memory.  However providing learners with cues raises the overall amount the individual is able to remember.  Cued recall tasks are those in which a hint or cue is provided to help the learner remember the desired information.

Unlike free recall, recognition involves a set of pre-generated stimuli presented to learners for a decision or judgment.  One factor affecting recognition is the strength of the memory. Stronger memories will be more accurately recognized than weaker memories. Another factor affecting recognition is based upon the context surrounding the recognition task. High risk conditions lead to a more stringent criterion than low risk conditions, even though the memory trace in both situations is equivalent in strength and match the test stimulus.

The encoding specificity principle states “that whatever cues are used by a learner to facilitate encoding will also serve as the best retrieval cues for that information at test time”.  Information retrieval is very much influenced by the context of encoding the information into long-term memory. This suggests for instruction, that many different contexts or examples may be important to discuss during the presentation of concepts. In this way, students will have many cues available to assist in encoding.  These cues cal be used later  for recall.

Forgetting
The failure to encode simply means that the information sought during retrieval cannot be found.  The concept of encoding failure emphasizes once again the importance of activating relevant prior knowledge in learning.  The failure to retrieve information that has been encoded in memory is a second cause of forgetting and refers to the inability to access previously learned information.

There are methods to support or inhibit encoding.  One factor supporting encoding is note taking.  Taking notes provide an external retrieval mechanism, as it provides memory storage which is external to the learner.  Students who elaborate on their notes also tend to perform better than those are simply reread them.  The process of taking the notes and elaborating upon them forces the learner to recall what they have learned and supports associating the new information with other knowledge.

Interference, such as other events or information get in the way of effective retrieval.  Interference has occurred when numerous events and competing information has interfered with the retrieval of the desired information.
Interference can also occur from information that was learned either before or after the desired information affecting the recall of the desired information.  Retroactive interference occurs when newer information interferes with the retrieval of previously learned information.  Proactive interference occurs when previous learning interferes with the recall of later learning.

Using the Cognitive Processing Model for Instruction
If learners are supposed to understand new information in particular ways, then the instruction must be organized to help them.  Instructional tactics such as signaling what information is important and drawing learners attention to specific features of that information, can facilitate selective attention and appropriate pattern recognition.

Using imagery and representing information in multiple ways can help encoding and retrieval, as well as counteract the effects of interference.  Additionally, arranging extensive and variable practice is important.  The saying “practice makes perfect” is not exactly an accurate statement.  While automaticity is a desirable educational goal, it is not just the amount of practice that makes things perfect. It is also the type of practice. So the dictum should really say “perfect practice makes perfect”.

Posted in Education Tagged with: , , , , ,

Short term or Working Memory

Working memory is the “bridge” between the information collected using our senses and stored in sensory memory, and long-term memory where information can be later retrieved.  Working memory is commonly associated with consciousness, and is where we can work on multiple activities simultaneously.  While not part of long term memory, by applying a computer model to working memory we would arrive at a parallel processing model because of this “multi-tasking” nature.

Working memory is the portion of memory which sensory data enters from the various sensory memory areas.  For example, when information is seen visually, it is stored in the visual sensory memory area, and then brought into working memory for processing before it is determined if the information should be encoded into long-term memory.

Working memory is that part of the brain’s memory system where information is stored for a relatively short period of time, between 15 and 30 seconds, and where the brain can process pieces of information in more than one way or accomplish several tasks at once.  This is why we can be listening to music, reading and still hear our spouse call our name.

The current research theories suggest that working memory has approximately seven information “slots” that can each accommodate some discrete piece of information, with each piece being of the same or different types of data.  However, with this low number of available positions or slots, working memory cannot handle much information.  Consequently, the theory of chunking was introduced based upon ongoing research.

Chunking is the process of grouping information into chunks or pieces that make sense to the learner.  This allows us to handle much larger pieces of information than we might otherwise be able to handle.  We can see this type of approach in computer technology.  The basic element of data is called a bit, which can be either a 0 or a 1.  We chunk bits together to form a byte (8 bits) and we chunk bits together to form words.  (A word in the computer area is a construct based upon the processing width of the CPU.  Words nowadays are often 64 bits or 8 bytes long.)

The question then is why do we care about working memory?  By organizing learning in such a way as to be easily chunked, or for separate pieces to be easily identified as related, we can help working memory more quickly process the information and determine its relationship to information already stored in long-term memory, assisting the long-term memory encoding process.

Additionally, presenting the information in smaller sections helps the learner rehearse the information in working memory, which assists with the encoding of that information for long-term storage and makes it for easier recall of that information.   Depending upon which model of long-term memory you want to subscribe to, this could increase the number of nodes, connections, or concepts that are created, which also makes it easier to recall the information later.

How we process information in working memory has an impact from a behaviorism perspective.  Recall that with behaviorism, we are attempting to make some change in the learner’s behavior through a variety of methods like positive and negative reinforcement, shaping, fading, chaining, etc.

By presenting information to the learner in more easily processed chunks, we can improve their ability to process the information, establish relationships with previously learned information recalled from long term memory, and promote understanding of not only the new information but that previously learned information.  We know that creating new relationships between information not only promotes further understanding, but strengthens relationships between discrete concepts and enhances recall.

Because we have utilized these pathways, we can expect to see a change in the learner’s behavior, all things being equal.  If the learner decides that our assumptions are invalid from their perspective, they may choose to not assign the same weight or importance to the information that we did, thereby breaking down the learning and memory processes.

It is important to understand both behaviorism and cognitive information processing for the reasons already presented, but also because it helps us as instructional designers consider what behavior we want to change, which could be a demonstration of newly acquired knowledge, and therefore how the information should best be presented to the learner to assist them in integrating the new knowledge into long-term memory and therefore be capable of exhibiting the desired behavior.

Posted in Education Tagged with: , , ,

Is My Website Password Encrypted?

With all of the ongoing security breaches and people having their passwords compromised, it has to make you wonder how some websites can give you your actual password and other sites send you a link to create a new password after sending you a temporary password to use.

In this article, we are going to explain how you can determine if a website you frequent is storing their password securely. Before we do that, let’s briefly discuss how website authentication works.

How Authentication Works

When you access a website, sometimes you are required to login with a username and password to access specific website features. To do this, the website has to store your username and password so when you provide them, it can verify if you entered the correct information.

The username and password you provide is usually sent to the web server using a web form and hopefully using some form of good security, such as SSL.

When the username and password is received by the web server, it looks up the username and password you provided in its files or database and then compares them to determine if the information is correct. If not, then the login attempt fails.

Sometimes you need to recover or reset your website password because you can’t remember what it is. What happens when you do this can provide you with hints as to how secure their application is storing your username and password information.

Basically — if the website can provide you with your actual password, whether or not it asks you some security questions, then:

  • The website is possibly storing your password information unencrypted; or,
  • The website is storing the password encrypted, but knows how to unencrypt the password.

The Website Can send Your Actual Password

When you forget your password and access a website’s “I forgot my password” link, the webiste may ask you some security questions, if it was set up to do that. Whether or not the website does this is not important to our discussion. If the website can either:

  • Can show your actual password on the screen; or,
  • Send your password to you via email;

then it is highly likely the website either stores the password unencrypted or knows how to decrypt the password. If the website can give you your actual password, then it is very likely that should the website be compromised, an attacker will have access to all of the usernames and passwords for all of the users.

The Website Sends me a Temporary Password to my Email

When a website uses this approach, they have no ability to look up or retrieve your existing password. This is a good sign, but there is no way to tell if the website is using unencrypted passwords and implemented this method to obscure that fact. This approach at least doesn’t send your password back to you through normally insecure communication methods.

Most reputable websites that implement this form of password recovery likely are storing the passwords in an encrypted format, ,aking it difficult if not impossible for an attacker to recover the passwords if retirved.

The Website sends me a Reset Password link to my Email

The same caveats as mentioned in the previous section exist here, because you can’t be sure if the passwords are actually stored encrypted. However, since they won’t provide the existing password, it is more likely that your passwords are encrypted.

The Role of Security Questions and Answers

Websites that ask you to provide some security questions and answers are using this information to help prove it is you when you either forget your password or want to perform some highly protected request. If you can provide your own questions and answers, this is a better choce than using the standard questions and answers most sites use.

If you are concerned about how well a website protects the answers to your security questions, you might want to come up with a set of alternative responses to the various questions and use them instead of the real responses — the more paranoid user takes this approach. Paranoia is not a bad thing in this case.

Posted in Information Security Tagged with: , , , ,

Reflections of a Adult Education Administrator

(This is a work of fiction.)

I had no idea when I took this job of managing this adult education center of the challenges I would experience. It has been a marvelous growth opportunity, but I must say there are days when I almost admit defeat. I thought managing this center would be mostly about providing high quality courses and instructors to my clients. I had no idea I would be spending so much time on budgets, making decisions about facilities, equipment or even making recommendations on how the courses are taught.

When I look back at this history of adult education, times have changed – or have they? The “problem” of adult education is nothing new, although maybe it is new to the generation of teachers I am working with. I guess from an experience perspective, I cannot really hold the teachers all at fault; I have not been doing this for very long either. When I go back and look at the writings of Dewey and Knowles, I can see how their thinking applies still today. Consequently, I have to draw the conclusion that while the demands of the students, the capabilities of the teachers and technology have all changed, the basic philosophy has remained more or less consistent.

Providing all the services we offer to our adult students creates a vast number of challenges. I have to make sure we have adequate facilities and classrooms to accommodate all of our students including basic services such as refreshments and restrooms. Because some of our students are on site all day, we needed to install a small cafeteria since the local restaurants are overcrowded with the local workforce and cannot accommodate the students.

Students want relevant courses to satisfy their particular situation and do not want to deal with the esoteric. The basic literacy and GED courses are not so much a problem, but the courses for our associate and bachelor degree programs must be competitive and up to date. Sometimes, we need to even be slightly ahead of the “curve” in parts of the course content because of the proximity of some high tech companies and either interest in our facility and students by those companies, or interest in working for those companies by the students.

The content and course management is only part of the challenge I am faced with. The overall day-to-day administration and organization of the center is similar to operating a small company. We have organizational culture issues affecting staff morale, and teachers who prefer to “look down” at their students than see them as equals. This is one area I know there has been a lot of research on, but it would be beneficial to conduct some long-term studies with some adult students to understand their perspective over the longer period.

Knowing the longer-term impact of decisions make from an organization perspective would have a significant impact on my ability to know if the decisions were the right ones. Too often, we do not see the expected benefits quickly and programs are pronounced failures without giving them a fair shot at success. More research on the expected time to see a specific set of benefits from program, and course material changes would improve change and increase the probability of success.

The second part of that same research would include how to address teacher adoption of new programs and bring them on board so they can have a positive impact on the program. I frequently have to deal with situations where teacher respond that they have seen similar things fail, and I am almost at my wit’s end trying to help them understand the positive benefits from their perspective.

Coupled with the ongoing administration challenges is managing my financial and budget targets. Even though we are part of a school district and are allocated funds from the district, we are expected to use tuition as a major component of our financial management and be almost fully self-supporting. The once a year allocation from the school district is not enough to run the operation and there are no handouts from the district over the year. This means any additional improvements must be funded through grants.

Despite the challenges with the budgets, bringing state of the art technology into the classrooms is the biggest challenge I have. I have a fully equipped computer lab with the latest computers, network equipment, and software. However, I would like to see more research on how effectively apply this technology across a wide variety of educational programs so every student can benefit. Currently, the students getting the most use of the lab are in technology and science programs, leaving the arts, humanities and other areas with little opportunity or unclear ideas on how they can best apply this technology to their programs.

The students and faculty also want to expand the wireless network and support portable digital assistants (PDA) and tablet computers in the classroom for note taking, presentations, and data collection. While there has been a lot of research published, it often consists of highly specialized situations, case studies, or software implementations that do not cover our needs. Broader based research on integrating leading edge technology into the program and providing the faculty with the inservice training and support necessary to use it is an absolute must.

In many respects, our technology program could benefit from onsite technology coordinators and instructional design support staff, but the budget is not there to provide those support roles at this time.
This brief paper reflects upon my role as an adult education administrator and highlights some of the challenges I face on a daily basis. It also highlights the need for continued research into areas such as administration and technology implementations. Only through continued research and application of that research in practical situations can education centers such as ours really demonstrate the vast capabilities and services we have to offer the community.

Posted in Adult Education Tagged with: , ,

Welcome Back

The old site has been migrated to this new one, which we think will offer better functionality, and it looks nicer too.

Posted in Uncategorized