Who is still participating?

gsiemens on Nov 24th 2008

Mike Bogle asked a question last week. Being somewhat chaotically organized these days, I failed to answer him in time for his presentation - sorry Mike :(. 

His question - “I’m wondering if you have a guestimate on the current number of active participants” - is valuable as we move to wrap up mode in CCK08, so I’ll tackle it anyway.

First, my time. I have spend a minimum of 12 hours per week on CCK08. Some weeks, especially at the start, were likely closer to about 30 hours. On average, my time breakdown weekly is as follows:

 

  • Contribute to The Daily: 3-5 hours a week (this includes reading posts and including with short commentary in The Daily
  • Reading moodle forum contributions: 5-7 hours a week. This includes reading and posting. Self-organization on the part of participants has minimized this over the last few weeks. I still read all of the posts and would like to respond to many, many more than I do. 
  • Recording/wrapup/intro for next week - this ranges from zero some weeks to ~2 hours others
  • Live sessions: 3+ hours. This includes elluminate and UStream sessions.
  • Responding to email (when I’m actually punctual): 2-5 hours a week
  • Marking papers: ~1 hour min per paper - reading, reflecting, and trying to write something coherent and hopefully of value to the participants. Total marking time for the course (this is still ongoing, so I’m guessing): ~75 hours

I posted on my course prep time earlier - just can’t remember where. I should have kept slightly better notes, but my time spent in advance of the course in organization, pulling together readings, chats with Stephen, Dave, and others, planning interaction, creating the syllabus, setting up the site/blog/wiki are comfortably in the 60-80 hour range. 

Total time I spent on CCK08: between 375-425 hours.

Ok. On to Mike’s question: How many people are still active?

Well, The Daily still has over 1800 people signed up. This means they, a) don’t know how to unsubscribe or b) are at least somewhat engaged. The moodle forum has fairly active discussion, though their are likely less than 50 participants that have been regular participants. The Second Life group has met numerous times, but I don’t know the stats or attendance numbers or their recent activity. Fleep Tuque has some thoughts on SL, but doesn’t really provide information on numbers attending and frequency of meetings. Blogs are fairly wide ranging. There is some overlap with moodle contributions, but many are only blogging. Numbers are hard to guess, but I would say we have about 35 people who are still blogging. Others have not created their own blog, but have participated through comments to those who were blogging. Delicious shows almost 1200 tags for CCK08, Google Blog Search shows just under 9000 references to CCK08, and the list of small, fragmented contributions goes on across the multiple forums and sites that comprise “being online” today.

What has been the impact of CCK08?

I don’t know. I have spoken to people at conferences who have said “I’m a student in your course”. But I often don’t recognize their name. Since CCK08 started, I’ve had the same experience at every conference I’ve presented: ALT-C in Leeds, COHERE in Torontoa, Web 2.0 in Portugal, NW Elearning Conference in Pasco, multiple presentations in Australia, Corporate Learning: Trends and Innovations online conference, and last week at E-Learn in Las Vegas. The numbers I cited above - less than 200 active participants across multiple spaces - seems small in light of the number of learners we had sign up (about 2400 at one stage, I believe). This doesn’t take account of individuals that will access the course resources after the course is officially done. If the online conferences we ran last year at University of Manitoba are any indication, access after the event exceeds during-event participation.

By way of a final analysis, thousands came, less stayed, and even less contributed. Did we change the world? No. Not yet. But we (and I mean all course participants, not just Stephen and I) managed to explore what is possible online. People self-organized in their prefered spaces. They etched away at the hallowed plaque of “what it means to be an expert”. They learned in transparent environments, and in the process, became teachers to others. Those that observed (or lurked as is the more common term), hopefully found value in the course as well. Perhaps life circumstances, personal schedule, motivation for participating, confidence, familiarity with the online environment, or numerous other factors, impacted their ability to contribute. While we can’t “measure them” the way I’ve tried to do with blog and moodle participants, their continued subscription to The Daily and the comments encountered in F2F conferences suggest they also found some value in the course.

All in all. It was fun. I’ll try and pull together more cohesive reflections over the next few weeks. As will Stephen and the numerous participants, I imagine.

 

Filed in Uncategorized | 21 responses so far

Connections as Humanity

gsiemens on Nov 18th 2008

CCK08 has been a wonderful learning experience for me. As we move to wrapping up the course formally, I’m starting to shift into reflection mode. Not surprisingly, my main focus is on connections.

I’ve had an interesting three weeks where the importance of varying types of connections has been brought to the forefront.

First, I’ve discovered that Australia has very poor internet connectivity. My travel schedule included stops in Sydney, Mooloolaba, Brisbane, Adelaide, Melbourne, and Katoomba. Of the numerous hotels, only one in Sydney provided a sufficient quality internet connection for me to participate in weekly activities (Skype and Elluminate) in CCK08. For the bulk of the trip, I felt removed from the course activities. Fortunately, the course was in the very able hands of Stephen, Dave, and learners. Still, I found the inability to access discussions very isolating. Time is one barrier (Wed and Fri session happen at ~ 2 am in Australian time), but I was able to attend most of the sessions. The bigger barrier was the consistent inability to participate in the course at the level I would have liked. My habits and activities changed quickly as well – recording video, uploading large files, and posting podcasts were put aside. Access to technology determines how we are able to participate.

Secondly, space and location mean very little. I was physically presenting at conferences and conducting workshops, yet I was involved in most of what I would have been doing if I had been at my office at U of Manitoba (with the exception of high-bandwidth activities, of course). I managed to keep somewhat current with email, collaborate with Dave Cormier as we finalized plans for our Introduction to Emerging Technologies course, work with Jay Cross and Tony Karrer to finalize our corporate trends conference, started blogging for E-LEARN 2008 (this week in Las Vegas), etc. I basically functioned as if I was “there” (namely, wherever there is).

For example, I landed in Vancouver yesterday after at 15 hour flight from Sydney. After making my way through security, I delivered my presentation on adaptive strategy to the Corporate Trends conference and hosted a discussion with David Weinberger. And posted a few thoughts in the conference Ning site, replied to CCK08 discussions, followed up on discussions in a digital literacies course I’m teaching to Palestinian and Malaysian educators, and so on…

I can function as if space and location are not issues. Which raises a bigger question: can I use the technology well? While it’s interesting to communicate and participate in online conferences and conversations around the world and in different time zones, the blurring of space requires a growth in prudence and self-awareness. We (ok, I) need to be aware of our limits. While technology changes, human nature and our need for self-care does not.

Thirdly, being human is still requires face-to-face time (in contrast to my point above). While in Australia, I received the unfortunate news that my Grandmother – still living my birth country, Mexico – had passed away. News arrived to my siblings in Manitoba. And I was informed via email, SMS, and Facebook. A touching and heartfelt posting in Facebook by my sister served as a eulogy to mourn, to hope, to reflect, and to honour my Grandmother’s transition. Yet, for this instance, space and geography loomed large as barriers. I appreciated the ability to be able to be in direct contact online, but would have preferred to mourn together with family in physical contact. Perhaps part of what I’m learning from the blurring of space/time through the web is that perfect opportunities (such as to mourn together with others in the physical world) can at least be partly replaced with online opportunities. In this instance, my choices were not: perfect, partial replacement, or not at all. My choices were between partial replacement and not at all. I appreciated the partial, but longed for the perfect.

Filed in Uncategorized | 16 responses so far

Networks, Power and Ethics

sdownes on Oct 19th 2008

This is a few weeks ahead of when we will be looking at this in the course, but I wrote is as a response to a discussion post today and so I’ll post it here now.

> Could we separate out some issues?

OK, this post raises a number of great points. Let me work through them.

> 1. Is it not the case that if we respect: autonomy, diversity, openness and interactivity in any form or structure, its difficult to misuse power, but that’s the case by definition?

It is so by definition only if the definition of ‘power’ is something like ‘the limitation of autonomy, diversity, etc…’ And I’m not sure people woul want to define power that way. Usually power is defined not just as type of limiting behaviour, but also as a type of effective behaviour, that is, people wield their power to cause some sort of outcome.

Maybe it can be so by the definition of ‘autonomy’, ‘diversity’, etc? This isn’t clear. Clearly not for diversity. The cells in a leaf or the atoms in a lump of lead are all the same, but not by virtue of some sort of power. So non-diversity does not entail power. Similarly with non-autonomy. A pilot fish follows a shark around, or a barnacle attaches to the hull of a ship and goes where the ship goes - this is non-autonomous behaviour, but not a power relationship.

Interestingly, I think that because we define ‘power’ as the capacity to some sort of intervention, we can’t have ‘power’ without at least the possibility of autonomy, diversity, etc., if not the actual existence of them. The wielding of power is the violation of autonomy, diversity, etc., which means it is wielded in a situation where autonomy, diversity, etc., would normally be expected.

What, then, would make it difficult to wield power is not simply the existence of autonomy, diversity, etc., but rather, the degree to which they are entrenched - how stuubornly autonomous individual entities are by nature or temperament, how ‘power-wielding’ form of contact or interaction are available through the connections in a given network, the nature and inclination of given entities to wield power, etc., the number of connections (and therefore the extnt of power) that may be forged, etc.

This gives us a way of describing different types of networks in term of the degree to which power may be wielded in those networks. For example:

- person-to-person network: communication is exercised by physical contact, power can b wielded as the direct application of force leading to injury and possible fatality, versus
- electronic network: communication is exercised by electronic message, power can be wielded only by means of changing opinions through rhetoric or reason

Or:

- person-to-person network: communication only to people who are physically proximate, and therefore limited to a maximum audience of several thousand (tens of thousands with voice amplification), versus
- broadcast (radio or television): communication to people with receiver, limited only by the number of people that exist

> 2. What is it particularly about networks that tends to enhance autonomy etc? Or is it the case that networks inevitably enhance autonomy etc?

I don’t think there’s anything particularly about networks that tends t enhance autonomy, etc.

What it is about networks is that properties such as autonomy become important in a way they didn’t before. This is why I distinguished networks from groups.

In groups, the properties of autonomy, diversity, etc. tend to be thought of as inhibiting the function of the group. Notice how the person who has a different point of view, or who has different objectives (”their own agenda”) are depicted as obstacles to be overcome.

Nothing inherently in a network fosters autonomy, etc. and, depending on its make-up, a network can be used equally to promote or to eliminate autonomy. That is why it is possible for a network to effectively collapse into a group.

A reworking of this question would be, why are autonomy, etc., important? And I have tried to answer this in An Introduction to Connective Knowledge and elsewhere. Networks in which these values are promoted are robust, dynamic, stable, reliable - they are good knowledge engines. We can rely on them (the way we rely on scientific explanation and induction, as methodological paradigms, tweaked and adjusted over time).

Another way of stating the same thing is that networks in which autonomy, etc., are abridged are effectively dying. The resonation of connections from entity to entity will gradually cease. The network gradually becomes inert. If all entities are the same, there is nothing for them to communicate to one another. The network is dead - a dead lump of coal (100% carbon) rather than a living, breathing plant or animal.

> 3. The internet allows, and enhances all sorts of behaviours: grooming for child pornography and abuse, and for the grooming of disabled adults for terrorism, just for starters. Giving a child, or a disabled adult the autonomy to connect to anyone else on the Internet, within diversity, openness and interactivity is clearly a disaster.

I don’t think any of this is an argument against either the internet or networks.

First of all, the internet does not increase the possibility of exposure to these elements. Child abuse was common before electronic media - maybe even more common. The grooming of average civilians for military purposes was also common; witness the Crusades.

Second, internet technologies tend to make these things less dangerous, not more dangerous. Child abusers and terrorists cannot use the internet to impose direct control the way they can in person. You cannot kidnap a child or harm someone’s relatives online - you have to do it in person.

Third, the best defense against the ills of society is not sheltering, but exposure. It is the things children (and adults) have never seen before that really hurt them or kill them. Children who have been exposed have a better chance of survival, and if this exposure happens in a safe environment, such as the internet, so much the better.

Fourth, exposing children to the diverse nature of society shows them how rare some of these phenomena are. While broadcast television hammers into them the incorrect notion that violent crimes are prevalent and increasing, exposure to actual people shows the wide diversity of (mostly nice) people.

All of this is, in essence, an argument to the effect that network responses are a better remdy to the ills outlined in the comment than group responses. One of the most striking images I have of my visit to South Africa was of the walls that are everywhere. But nowhere were people less safe. Huddling together with people of your own kind, keeping those you fear at bay with fences and security and police, makes you less safe. You have the illusion of control - but it’s only an illusion.

4. So, can we distinguish:

a. Generic affordances of networks

That’s a good one. Autonomy, diversity, openness and connectedness are not properties o networks generically, they are properties of good networks.

I confess I don’t have a systemic list of the generic affordances of networks. I would be inclined to put things like ‘pattern creation’ and ‘emergent properties’ as the generic affordances. But I would have to think about it.

b. Distortions and misuses of networks

This is where I would place non-autonomy, non-diversity, etc.

c. The ethics and memes of positive social networks, and the value systems within which we make those judgment calls?

This should be the subject of a much larger discussion. So I will only attempt a summary of my views here.

First, there is a significant distinction to be drawn between personal ethics and public ethics (analogous to the distinction between personal knowledge and public knowledge).

Personal ethics (aka personal morality) is an emergent property of your own self (your own brain, your own body, whatever). Personal morality is like a sensation - it is based in what we in this course have been calling the passions, it is a feeling for what is right and what is wrong. Though reason and argumentation can augment it, as Hume says, “reason is, and must be, the slave of the passions.” In morality especially, if you don’t feel that something is good, it can never be believed by you to be good.

The arguments we see in ethical texts - from Kant’s description of the categorical imperative to Mill’s utilitarianism to Sidgwick’s methods - are, to my mind, rationalizations of the ethical impulses we feel as individuals. They are attempts to explain and justify the ethical values we already possess - and it is worth noting that such writings are singularly unconvincing to pople who do not feel the same way.

Such ethics can be taught, and a person’s personal ethics are very often a reflection of their parents’ ethics. But the manner of teaching is not to tell a child how to behave, but rather, to model and demonstrate ethical behaviour, which the child will practice, and reflect upon (forming ethical principles in his or her own mind as massive sets of connections between neurons formed via the principles of association).

Public ethics is the mechanism though which personal ethics are reflected in society as a whole. In essence, each person in a society is thought of as an ethical agent - an individualized sensor of ethical knowledge.

In terms of content, public ethics are whatever they are. What I man by that is that they are the emergent ethical properties that are produced though the interactions of a viable social network. We ma make various attempts to formulate them, but such attempts will be invariably limited by context and abstraction - they will be partial representations of a much richer phenomenon. The legal system is one such partial representation - it is an attempt to codify and prescribe punishments for serious ethical violations. Yet nobody would equate the legal system with the complete set of social ethics, an few people, if any, adopt the legal system as their own personal definition of ethics.

As such, and crucially, what constitutes ethical behaviour with respect to the creation of the social ethic is equivalent to whatever produces the best, most robust, richest, most reliable, and most reasonable social ethic. Behaviours that promote the development of such a social ethioc are ethical, behaviours that inhibit it are unethical.

Another way of putting the same point is what while personal ethics govern how we conduct our lives as individuals, social (or public) ethics govern how we interact with each other. Our motivations for acting in one way or another can and will be very different; what a public ethic amounts to is (roughly) the rules of engagement with each other - or, as Wittgenstein might say, the ethics game, or as computer scientist might say, protocols for a network infrastructure (the IETF and the W3C protocols are not standards, they are a set of protocols for ethical behaviour - that is, behaviour that best leads to the effective functioning of the internet, so far as we know).

What amounts to ethical behaviour, on such an account, is (very roughly) what amounts to reasonable or polite behaviour. In my own thinking, I identify different domains depnding on the different types of interaction. For example:

- principles of argumentation - ethical behaviour is rational behaviour - we interact using reason, rather than attempting to intimidate with force, we argue clearly and honestly, rather than attempting to misrepresent or fool through trickery. These principles align with qualitative knowledge.

- principles of explanation - we favour theories and mechanisms that are testable, that are robust, that apply in a wide range of disciplines; we reject explanations and mechanisms based on incomplete or misrepresentative information; we favour simplicity. These principles align with quantitative knowledge.

- principles of networking - we favour networks in which the entities are autonomous; we promote networks of diverse entities; we prefer networks that are open and undefined; and we prefer networks that produce knowledge as an emergent property, rather than mere repetition of some poperty or state of an individual entity. These principles align with connective knowledge.

d. Appropriate ways of regulating networks - both socially and ethically appropriate, and network/CAST (complex adaptive systems theory) appropriate, assuming that regulation of complex systems is not the same as regulation of predictable systems (see Kurtz and Snowden).

The connotation of ‘regulation’ is that it is the moderation of behaviour through a projection of power.

My reaction to that is that I have never seen an effective regulation through projection of power.

That is not to say that projections of power cannot prevent particular instances of prohibited behaviour. That is not even to say that the application of a significant amount of power cannot prevent most instances of a prohibited behaviour. Police states, whatever their faults, result in less crime. For a time.

If you convert your network into a perfect group, you will have achieved group identity, and hence, perfect regulation. At the cost of killing the network.

Mechanisms based on projections of power are temporary and ineffective, and that they will fail in the long run.

Ethical behaviour cannot be imposed. It can be enforced, but cannot be produced through the use of force.

Only behaviour that is freely chosen can become ethical behaviour, because only such behaviour can be relied upon even in the absence of constraint or force. Only such behaviour will survive the breakdown of social order. Only such behaviour will permit the rebuilding of a society in the event of disaster.

Such behaviour is not created by power, regulation or force, it is taught, and such behaviour is not taught by telling, it is taught by modeling and demonstrating ethical (read: ‘reasonable’) behaviour.

Regulations are a short-term mechanism intended to cope with a failure of teaching. Regulations are effective only for the perpetuation of a status quo while alternative teaching can effect long-term and substantial change.

All of that said - the practical question is, how should I, as an ethical actor, with an interest in promoting an ethical network, approach instances of unethical behaviour (defined for now as behaviour that would normally prompt calls for ‘regulation’).

And the answer, in a nutshell, is to make ethical behaviour a condition for network interaction. Ethical protocols are voluntary, and you can do something else if you want, but nobody will talk to you if you do not behave ethically.

This is something you cannot impose - you cannot effectively isolate a person from a network, because it has no boundaries. However, individual entities can refuse to connect with non-compliant entities. And this refusal to connect is something that can be modeled (and, more importantly, the conditions under which non-connection occurs) can be modeled.

That said, it should be understood that these are two gradations, not on-off absolutes. A person’s behaviour can be more or less reasonable (as defined above) and a response to that behaviour can be more or less exclusionary. There is room for moderation of response, and moderation of response is encouraged. The network principle “be generous in what you accept, strict in what you send out” applies here: it is better to encourage reasonableness by demonstrating it, but the effectiveness of demonstrating it exists only if communications are undertaken, at least some times, with people who are more or less unreasonable.

(I use the word ‘people’ but I actually intend to refer to ‘entities’ more generally.)

Filed in Uncategorized | 3 responses so far

Reflections half way through the course

gsiemens on Oct 15th 2008

I posted a 12 minute video today which includes some reflections on where we are at in the course…and where we go next. The video is here: mid-course reflections

Filed in Uncategorized | One response so far

Alec Couros Recording

gsiemens on Oct 15th 2008

The recording from Alec Couros’ first session is now available in various formats:

Elluminate file

Blip recording

mp3 file

Filed in Uncategorized | 3 responses so far

 

gsiemens on Oct 8th 2008

We’re continuing to experiment with ways to improve access to presentations. Terry’s presentation is available via mp3…and on blip here. (having some issues getting podpress to work…)

 

Filed in Uncategorized | No responses yet

Guest presenters…

gsiemens on Oct 8th 2008

Since you likely tire of hearing the viewpoints that Stephen and I present, we have arranged some excellent presenters to provide different perspectives. The list to date:

Oct 8: Terry Anderson

Oct 15: Alec Couros

Oct 22: Grainne Conole

Oct 29: David Wiley (tentative)

Nov 5: Nancy White

Nov 12: Howard Rheingold

Nov 19: Women of Web 2.0

All of the session can be accessed here (elluminate link). Some presenters can make both the morning and afternoon sessions (11 am and 7 pm CST). Please see the wiki for more info.

Filed in Uncategorized | One response so far

Concerns about, and arguments against, connectivism

gsiemens on Oct 5th 2008

Thoughtful dialogue has been prominent around many aspects of CCK08. The topics have ranged widely, allowing participants to sample and indulge where ever their interests or concerns exist. The debate has ranged from highly theoretical (knowledge and language) to practical (implementation in a classroom). As a young theory, many aspects of connectivism have not been fully explored and defined. Many strong critiques have been provided, questioning aspects of the theory or calling for greater clarity.

I’ve started a wiki page that captures some of the critiques and concerns expressed: Argument and concern catalogue. It’s not nearly complete. There are many additional threads that I haven’t captured…so consider this an invitation to contribute your outstanding questions to the page. My goal is to collect concerns/crtiques as the course progresses and then provide detailed responses toward the end of the course (though, I suspect, many responses will be offered by the larger group discussions, so it’s not something where Stephen and I will be the only contributors to clarification).

Filed in Uncategorized | 2 responses so far

History of Open Content

gsiemens on Sep 30th 2008

David Wiley reviews 10 years of open educational content. He concludes with an interesting comment (tongue-in-cheek I’m sure, but still worth thinking about):

I wonder if, somehow, we’ve stumbled into part of the answer for open accreditation. Of course, WGU still charges tuition, but D’Arcy’s right. Let’s talk more about this… Maybe instead of hacking Wordpress, we should be hacking degrees. Anyone up for a completely informal, completely open, homemade certificate-style diploma? A handful of courses offered by all of us - take intro open ed from me, connectivism from George and Stephen, media studies from Brian (you know you’ve always wished he would teach it), and then complete three cumulative edupunk projects under the tutelage of the Reverend, D’Arcy, and Tony. Maybe D’Arcy will also offer an elective in mobile video production? ;) Why not? I want my homemade edupunk diploma!!!

Accreditation is a value statement. It’s really someone saying “Yes, George has achieved the minimum in this field”. We trust the value statement because we have a process built in that assures it’s not just anyone making the statement. We trust University of Manitoba’s accreditation because it does so as part of a larger system of accreditation boards. Degrees aren’t simply manufactured randomly. They are developed as part of a process of analysis, review, and approval according to standards outside of the single institution. Accreditation has value because it is not only a university stating a learner is competent, but that it’s a whole system saying the university is competent to make such a judgment.

Obviously, this wasn’t always the case. Universities had to start somewhere. Expertise was previously determined by the person one had studied under. That model doesn’t scale well. Scaling a good idea and turning it into a systemic model has drawbacks. In fact, it changes the initial evaluation process. Even now, we attach high value to someone who has studied under Minsky, worked with Vint Cerf, and so on. Universities do not provide the only value statement, but the do provide the broadest. For example, if I’m in the learning and technology field and someone comes up to me and says, “Jay Cross is an expert in informal learning”. Well, I know that. I know of Jay. I’ve read his work. I know Jay. Validation from other sources is not required. I have familiarity and have made my own value judgments. That is a focused statement of competence. It can be validated by others in the field. However, when I’m a manager in a large corporation, I don’t have that familiarity with a field. I need to rely on broad statements of competence. Universities broad statements of competence are less accurate (for example, Jay has an MBA…but what does that say about his knowledge of informal learning?). Broadly, the degree is accurate, specifically it is not.

Well, that is very nice George. What are you trying to say?

My main point is this: providing a statement of competence is only value when the provider of the statement is also trusted. I like Wiley`s concept of hacking degrees. But it is a concept that is only going to be valued by those who have familiarity with the people doing the hacking. Our little edutech world is still a bit too small…but as it grows, who nows…

Filed in Uncategorized | 15 responses so far

How Much Time?

sdownes on Sep 29th 2008

Course Time

How much time should the course take?

For the full time learner only (see various participation modes below):

From the perspective of time, this course should not be occupying what a typical (lab) course would at a college or university. Consider:

Three hours of lecture or equivalent:
- Monday contributions from George and I (1 hour)
- Wednesday Elluminate session, often with guest (1 hour)
- Friday conversaton (1 hour)

Readings:
- papers listed in wiki (2 hours, give or take)

Lab (discussion, forums) - 2 hours

Assignments (blog posts, etc) - 1 hour

= 8 hours per week

(Consider - a ‘normal’ course load of 5 courses would be 40 hours per week).

– Stephen

Participation Modes

The participation modes have been interesting. I’ll provide a rough overview of participation:

1. For-credit learners have participated in forums, blogs, and through emails with instructors

2. Actively engaged in conversation participants: those that are highly engaged in conversations in moodle, often digging down into nuanced considerations of subject matter. These participants do not solely engage with material we have provided. They are also presenting their own views and frameworks of sensemaking. In certain cases, the question is “how does connectivism fit with _____?”. These learners may be trying to understand connectivism, but they are also trying to see how it “aligns” with their existing views

3. Actively engaged with course content participants - these are participants who are not engaged in the conversation, but who are reading the daily and providing fairly comprehensive weekly summaries (such as Dave Pollard - http://blogs.salon.com/0002007/categories/businessInnovation/2008/09/26.html#a2251 ).

4. Other modality participants - these participants are reading course literature, but are not active in the main forums. Discussions may be occurring in their preferred language, in Second Life, listservs, or other modes.

5. Peripheral participants - periodically posting in moodle/blog. Subscribed to The Daily, might follow blogs/postings, but are not directly engaged with others. It is also difficult to determine the degree of their engagement with course material as they are not posting reactions or comments. Their continued subscription to The Daily suggests involvement…but life situations, familiarity with content matter, interest or numerous other elements reduce their active involvement.

6. Disinterested/discontinued learners. For what ever reason, these are participants who signed up, but have since discontinued the course.

– George

Filed in Uncategorized | 7 responses so far