Professional Documents
Culture Documents
Created by:
James West
University of North Texas, Denton
Kashieka Popkin
University of North Texas, Denton
Tessa West
University of North Texas, Denton
Abdulrahman Alamri
University of North Texas, Denton
Table of Contents
Contents
Topic........................................................................................................................... 3
Audience.................................................................................................................... 3
Purpose...................................................................................................................... 3
Format........................................................................................................................ 3
Problem...................................................................................................................... 4
Theory........................................................................................................................ 4
General Learning Expectations...................................................................................4
Learning Goals and Objectives................................................................................... 4
Learning Activities...................................................................................................... 5
Activity 1. Online Literature Reading..........................................................................6
Activity 2. Collaborative or Team Blog........................................................................6
Activity 3. Social Networking...................................................................................... 7
Technology required................................................................................................... 7
Timeline...................................................................................................................... 8
Assessment................................................................................................................ 8
Appendix I Job Aid.................................................................................................. 10
An Augmented Reality Game (ARG) regarding online learning environments, online learning
tools, and digital citizenship.
Audience
Undergraduate or graduate degree seeking students who have not completed an online class at
the university level. These students will be placed in a new Foundations of Online Learning
blended course. Foundations of Online Learning (FOL) is a mandatory course for all students
planning to enroll in a 100% online learning course or taken during the first semester a student is
enrolled in their first 100% online learning course.
Purpose
Format
Problem
Students today are not given an introduction to online learning prior to being enrolled in a
completely online course. No online learning expectations are established and there is no
restriction against students enrolling themselves in 100% online learning courses. This leads
many students to elevated levels of frustration and difficulty handling time elements associated
with online learning.
Theory
The learning philosophy behind this instruction will be a Constructivist Philosophy with a focus
on Social Constructivism, Problem Based Learning, Inquiry Based Learning and others.
Learners will gain sufficient knowledge related to 100% online learning courses that will enable
them to become better online learning students.
Learning Activities
Students will participate in activities related to The Read, Reflect, Display, and Do (R2D2)
Model. The learning activities tied to goals and objectives are:
A1. Participate with other colleagues in the use of social media tools such as Twitter and
Facebook.
Skills:
1. Learner will explore, find personalized learning experiences via persoal
learning networks, socialize, share, and collaborate in the social media
tools.
2. Students will post to social media sites at least one reference or comment
about information learned for others to review, share and comment on.
Technology required
Instruction delivered through an Augmented Reality Game structure will cover a period no
longer than 3 weeks.
Assessment
Needs
Somewhat met
Met
Total
/5
/20
/30
/30
/5
/20
/30
/30
/2
/12
/20
/20
/2
/10
/15
/15
/1
/3
/5
/5
improvement
Original post accurate
with given topic
Original post length of
500 1000 words
Responses to 2 or
more peer forum posts
Response length
minimum 100 words
Follow-up to 1 or
more responses
Total points
/100
General feedback:
Student:
Needs
Somewhat met
Fully met
/30
/40
Total
improvement
Original post accurate
with given topic
/12
/40
/12
/30
/40
/40
/6
/10
/20
/20
/100
General feedback:
Foundations of Online Learning is a blended course. The first 3 weeks of the course are bended,
face-to-face (F2F) and online, classes. The remaining portion of the semester all meetings will be
conducted online with the exception of the final course meeting and it will once again be F2F.
The class will meet twice per week, once F2F and once online for the first 3 weeks.
Preparation
Prior to the start of the semester, instructor should:
LeArning
o Google+ - LeArning
o LinkedIn LeArning
she tells the instructor and the students that her name is Onli Nele Arning and she is with the
schools cybersecurity division. Ms. Arning goes on to tell that a horrible event has occurred. The
school has lost all of its data from the database. The database served as an important storage
location for all documentation related to online courses. The database was the backbone of the
online learning platform as it held important details necessary for running courses over the
internet. Through some speculation into the matter, it seemed that a hacker had gained
unauthorized access to the online learning database and stole or damaged all the data that was
being held by the system. After having undergone a major data loss, there is now the need for a
large collective effort to gather the information again so that the database can be recreated for
current and future students alike. The major re-creation of the database was required and required
soon.
Ms. Arning realized the data loss from the database came as a great disappointment for
the staff and the students. The incident not only meant a delay in the availability of online
learning materials, but lack of any details for their current course. It also meant that the data had
to be collected and compiled once again. The entire process could be long and tedious. A larger
number of individuals working to recover the lost data could greatly speed up the recovery
process. Ms. Arning requests the assistance from the entire class to help in gathering and
compiling all of the necessary data to rebuild the database. To aid in the information collection
process, the students were provided with a business card.
All the business card had was a QR code on one side and a URL on the other. At that point, Ms.
Arning thanked the entire class for their assistance
http://goo.gl/001ZDp
forward to working with everyone.
Working in groups to locate information within the Welcome email promotes cooperation and
scaffolding of information among peers.
Instructor will actively monitor the email address for the University Cyber Security
Division
Instructor will confirm the auto-response Welcome email is being sent to all registrants
Welcome and thank you for joining us in this effort to recover data regarding Online Learning.
Look deeply into the image above, it may contain hidden values. You may
This is a very trying time and our education system is in great need of this data in order to
need to use image analysis software, scaling, file compression and/or
continue to provide a proper level of education for online learning. This mission is of utmost
file decompression utilities to uncover the secrets within.
importance to everyone. Please divide into teams of 5 and share your contact information. This
is not a competition. All teams will be working collaboratively toward the end result of
rebuilding the database on online learning. However, teams will allow greater opportunities
for synchronous communication on a smaller scale while working through the mission. In
order to complete tasks at hand, you may have to learn how to read between the lines.
We greatly appreciate your assistance and look forward to working with you.
Sincerely,
Onli Nele Arning, Sr. Investigator, University Cyber Security Division
Files embedded in image on Welcome email from the Cyber Security Division
Education image
Student Activities
1. Class discussion regarding Welcome email
2. Class discussion over readings
3. Group discussion over readings
4. Group blogs 500 100 words
knowledge
Hello everyone and thank you for all the hard work you have been doing to assist us in
Groupdata
discussion
critical
thinking informant that may be a
recovering
from thegenerates
heist. Wecollaboration
received a tipand
from
a confidential
good lead to a suspect. Our informant gave us the following information:
Discussion enables social learning
Possible name: Enilno LeArning
Online presence: Social Media
Sketch of possible suspect:
Post-class Day 3 and Day 4 Day 7
Day 8 F2F
As the students begin arriving for class, they notice a huge wheel on the projector. There
is nothing around telling about it, but it looks really nice. The instructor comes in and greets the
class.
Instructor opens this class meeting with a discussion regarding the readings for the night
on Social Media and Social Media in Education. (see Canvas) The instructor acts as the
facilitator for the class discussion and uses the following questions to direct the discussion:
1. How do you use social media tools?
2. What are your preconceived feelings about using social media tools in a class?
Next, the instructor asks if everyone received the email from the Cyber Security Division
regarding the possible suspect. The instructor confirms everyone has been investigating the
information provided by the Cyber Security Division using their existing social media accounts
or by creating new social media accounts. It would be a good idea to check out some of the
major social media sites such as Twitter, Google+, Facebook & LinkedIn. Be sure to tweet all
your findings and include #ucidivision.
The instructor asks if anyone noticed the big wheel when they came in. What could it be
for? Did anyone have any ideas? The instructor tells them it is for a game they will be playing.
The Cyber Security Division was able to intercept 5 sections of an electronic transmission. They
were not able to read the transmission, but they believe there is valuable information in each
section and there may be a hidden clue. Each group will spin the wheel to see which module they
will be working on. Once each group has been assigned a module, the instructor will send the
groups out to the lab to begin working on their module located on the Cyber Security Division
website http://cybersecuritydivision.weebly.com/missing-data.html.
Student Activities
1. Class discussion over readings
2. Group selection of modules
3. Group work on modules
Did you know online learning takes more than registering and completing assignments?
If not, then this is the right class for you. There is a lot of communication in online learning.
Some courses use asynchronous communication, while others use synchronous.
Courses may use a blend of both to achieve their goals and objectives.
Online learning takes even more than communication to be successful.
...
...
Very often courses release assignments and modules at different times during the semester.
Each semester will be different and will take a different approach.
Requirements include self-discipline, dedication and understanding of time.
You may find weeks that are slow and allow you to get ahead and others that are very full.
Planning your schedule will greatly help you be successful in online learning.
...
...
All students in online courses must be self-motivated.
Revolving schedules in courses requires students to keep up with changing schedules.
Keeping up with all of this information can be difficult at times, but it is achievable.
Attention to detail and open communication will make your success much easier.
...
...
Giving you a foundation to build on, is the goal of this exercise.
Online courses utilize various learning management systems (LMS).
Regularly these systems are used to house the course content and forums.
Almost all online courses use an LMS such as Blackboard, Moodle, Canvas or some other.
...
...
Realizing the value of online learning is very important.
Online learning affords many potential students the opportunity to attend school.
Once you have realized the importance of online learning and the value it represents.
Motivation, self-discipline, dedication and timing should come easy.
ROT13
Qvq lbh xabj bayvar yrneavat gnxrf zber guna ertvfgrevat naq pbzcyrgvat nffvtazragf?
Vs abg, gura guvf vf gur evtug pynff sbe lbh. Gurer vf n ybg bs pbzzhavpngvba va bayvar
yrneavat.
Fbzr pbhefrf hfr nflapuebabhf pbzzhavpngvba, juvyr bguref hfr flapuebabhf.
Pbhefrf znl hfr n oyraq bs obgu gb npuvrir gurve tbnyf naq bowrpgvirf.
Bayvar yrneavat gnxrf rira zber guna pbzzhavpngvba gb or fhpprffshy.
...
. . . ROT9
Mvip fwkve tflijvj ivcvrjv rjjzxedvekj reu dfulcvj rk uzwwvivek kzdvj ulizex kyv jvdvjkvi.
Vrty jvdvjkvi nzcc sv uzwwvivek reu nzcc krbv r uzwwvivek rggifrty.
Ivhlzivdvekj zetcluv jvcw-uzjtzgczev, uvuztrkzfe reu leuvijkreuzex fw kzdv.
Pfl drp wzeu nvvbj kyrk riv jcfn reu rccfn pfl kf xvk ryvru reu fkyvij kyrk riv mvip wlcc.
Gcreezex pfli jtyvulcv nzcc xivrkcp yvcg pfl sv jlttvjjwlc ze feczev cvriezex.
...
. . . ROT17
Juu bcdmnwcb rw xwurwn lxdabnb vdbc kn bnuo-vxcrejcnm.
Anexuerwp blqnmdunb rw lxdabnb anzdranb bcdmnwcb cx tnny dy frcq lqjwprwp blqnmdunb.
Tnnyrwp dy frcq juu xo cqrb rwoxavjcrxw ljw kn mroorlduc jc crvnb, kdc rc rb jlqrnejkun.
Jccnwcrxw cx mncjru jwm xynw lxvvdwrljcrxw fruu vjtn hxda bdllnbb vdlq njbrna.
...
. . . ROT7
Zbobgz rhn t yhngwtmbhg mh unbew hg, bl max zhte hy mabl xqxkvblx.
Hgebgx vhnklxl nmbebsx otkbhnl extkgbgz ftgtzxfxgm lrlmxfl (EFL).
Kxznetker maxlx lrlmxfl tkx nlxw mh ahnlx max vhnklx vhgmxgm tgw yhknfl.
Tefhlm tee hgebgx vhnklxl nlx tg EFL lnva tl Uetvduhtkw, Fhhwex, Vtgotl hk lhfx hmaxk.
...
. . . ROT19
Ylhspgpun aol chsbl vm vuspul slhyupun pz clyf ptwvyahua.
Vuspul slhyupun hmmvykz thuf wvaluaphs zabkluaz aol vwwvyabupaf av haaluk zjovvs.
Vujl fvb ohcl ylhspglk aol ptwvyahujl vm vuspul slhyupun huk aol chsbl pa ylwylzluaz.
Tvapchapvu, zlsm-kpzjpwspul, klkpjhapvu huk aptpun zovbsk jvtl lhzf.
Encrypted modules and the corresponding ROT level encryption method
Student Activities
1. Group presentation of assigned modules findings
2. Class collaborative work on combining modules
3. Class discussion on final findings from modules
Student Activities
1. Class discussion on readings
2. Class reflection over content and activities for the past couple of weeks
Since the last class, the Cyber Security Division sent an email out to everyone notifying
them that Enilno LeArning has been apprehended and he had a huge stash of files still on him.
Taking all of the information gathered by everyone assisting us and all of the information
recovered from the thief, we can now rebuild the database. The Cyber Security Division needs
one last thing. They need all groups to create a chain of events using the knowledge and skills
they have used and learned over the past few weeks.
Instructor will send out Apprehension email from Cyber Security Division
Congratulations everyone! All of your help over the past few of weeks has resulted in our
apprehension of the suspected thief in the data heist.
Enilno LeArning
Your work tracking him through social media proved to be invaluable. Based on all of the
information you were able to uncover and provide us, we were able to track him down and he
is now in custody.
In order for us to finalize our case against him, we need each of you to develop a complete
record of all you have experienced over the past 3 weeks. We have asked your professor to
assist in this process. They already have plans to assist you accomplishing this final task
during your next class.
Thank you all again for all your assistance with this matter and we hope you not only
recovered all of this information to rebuild our database, but that you also learned a lot about
Online Learning along the way.
Sincerely,
Onli Nele Arning
Sr. Investigator
University Cyber Security Division
Student Activities
1. Class discussion over the past 3 weeks
2. Group work on WeMap tracking activity and information over the past 3 weeks
3. Final group discussion