tag:blogger.com,1999:blog-26278178627403333582024-02-20T16:46:56.035-05:00Corey Leong: The Cyberpsychology DomainCorey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.comBlogger98125tag:blogger.com,1999:blog-2627817862740333358.post-79854085490053741602021-05-18T18:26:00.002-04:002021-05-18T18:26:46.569-04:00Beginning the Dissertation Journey<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
It's been awhile, a long awhile. But now it's time to start a
new personal journey the Disseration Journey.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
For the next twelve months, I will begin resarching, reading,
and writing my Doctoral Disseration on Cybersecurity Education.
I intend to successfully defend my disseration next summer in 2022.
To accomplish this feat, I plan to write daily for at least
an hour or two developing my ideas and thoughts for cleaning
up and evenutally synthesizing for my final draft disseration.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
I plan is to regulary post my progress on my disseration writing.
While potentially fleshing out many of my curiosities to help
clarify my writings and keep progressing to that final draft.</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-2243562238995008482018-12-27T10:18:00.002-05:002018-12-27T10:20:30.834-05:00Why do humans change behavior when cameras focus on them?<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Having attended the Orlando Magic game last night, I noticed whenever
one of the in-staduim, television cameras focused on an individual,
the individual would, all of sudden, change his or her facial
expressions and body language. This sudden change ranged from
pointing at the overhead LED stadium display, to filming themselves
with their smartphone, to dancing and singing, and other extreme
demonstrations of garning more attention. But why? Do all humans
need attention from other humans?
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Is it because they have never been on television or an LED dispay?
Or perhaps they are attempting gain more attention than the previous
individual who was just displayed by camera? What if it is a product
of a bigger issue such as attention gathering on social media.
I tentatively call this phenomenon, cybernarcissim.
Cybernarcissim is the result of
individuals attempting to garner attention from the online self-promotion
of themselves via selfies, videos, textual posts, etc.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In considering an oppposite perspective, one individual during last night's
game hid her face once she realized she was on display in the stadium.
The individual was a small young girl sitting in between her parents.
From this observation, one may assume her resistance to self-promoting
herself because she has not been exposed to online social media because
of her age. Another argument is that she has a shy personality-type.
Whether shy or too young for social media, not all individuals have
the need to self-promote which I find quite interesting for
continued research on human behavior and narcisstic traits.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-88643048914680049342017-11-13T20:04:00.000-05:002017-11-18T12:44:57.060-05:00Real Estate Transport Protocol Abstract for ARES18<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
The following abstract was submitted to the 2018 American Real Estate
Society conference this spring in Bonita Springs, Florida. The
aim is to focus on the infrastructure and transport areas for a
new protocol called Real Estate Transport Protocol or RETP for short.
I previously gave a talk at ARES back in 2012 on a request-response
protocol by the name of Multiple Listing Service Network Protocol (MLSN).
Future papers will focus on the messaging and security areas for both
RETP and MLSN.
</p>
<p>Title: Real Estate Transport Protocol: A Hub-and-Spoke Messaging System for Next Generation Multiple Listing Services
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Current multiple listing services (MLS) operate as isolated systems due to tight coupling to their local markets and a lack of interoperability for provisioning listings outside of their local areas. Moreover, these legacy MLSs act as controlled gateways eliminating a network effect for maximizing marketability of listings to non-local buyers. This paper proposes a new, distributed messaging protocol called Real Estate Transport Protocol (RETP) for resolving weaknesses and inefficiencies present in today’s legacy MLSs. RETP provides a fire-and-forget messaging transport over assigned Internet port 32811. Implementing a virtualized infrastructure, RETP’s messaging protocol creates a hub-and-spoke network topology for provisioning listing messages to a centralized hub from connected nodes acting as network spokes similar to FedEx’s package shipping model. The results of this research offer three messaging use cases: node to hub, node to hub to node, and then finally, node to hub to multiple nodes. Immediate benefits realized from the implementation of RETP include, but not limited to, network scalability, data redundancy, and the potential of a national multiple listing service.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-66031477018855260822016-09-27T18:23:00.002-04:002017-09-07T06:45:52.737-04:00Netizen Zone Pilot Podcast<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
For my distance education course this semester, I was required
to create a podcast covering our choice of educational topics.
I chose the topic of Domain Name System Security Extensions (DNSSEC).
DNSSEC falls under the area of internet governance and cybersecurity,
two areas I have studied in the past and am studying currently. For
creating the podcast, I used Audacity for editing and mixing
the vocal and music tracks into an mp3 audio format.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
The pilot podcast can be downloaded from <a href="https://storage.cloud.google.com/clblog-objects-bucket/160927_netizen_zone_pilot_podcast.mp3">here</a>.
</p>
<p>The Rundown</p>
<ul>
<li>Introduction</li>
<li>Vision for Netizen Zone</li>
<li>Topic: DNSSEC</li>
<li>Closing remarks</li>
</li>
</ul>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>Resource Links</p>
<ul>
<li><a href="https://www.internetsociety.org/deploy360/dnssec/">https://www.internetsociety.org/deploy360/dnssec/</a></li>
<li><a href="https://www.icann.org/resources/pages/dnssec-qaa-2014-01-29-en">https://www.icann.org/resources/pages/dnssec-qaa-2014-01-29-en</a>
</li>
<li><a href="https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions</a></li>
<li><a href="http://www.internetsociety.org/deploy360/dnssec/basics/">http://www.internetsociety.org/deploy360/dnssec/basics/</a>
</li>
</ul>
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-71148252244273640462015-06-07T11:56:00.000-04:002015-06-11T06:34:32.826-04:00Google Video Advertising Certified<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p><a href="http://coreyleong.org/w/index.php/File:Google_Video_Advertising_Certificate.png"><img width="430" height="332" src="http://coreyleong.org/w/images/e/e6/Google_Adwords_Certificate.png"border="0"/>
</a>
</p>
<p>
Adding to my current list of professional certifications,
I took and passed the Google Video Advertising Certification exam. From studying for
the exam, I gained key insights into how YouTube advertising works and
how can be beneficial for organizations to promote their products
and services using not only clickable ad links, but also video ads.
My next goal is to take the Google Shopping exam and then at the
end of the month, the Google Certified Educator exam which encompasses
five tests: Gmail, Calendar, Sites, Docs and Drive, and Chrome Browser.
The final two certifications remaining after the Google Educator certification
are Google Trainer and Google Teacher which are both in my list
of earning.
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-74817448924698848602015-05-20T19:31:00.003-04:002015-05-20T19:31:35.082-04:00Predicting Season 31 Second Chance Cast<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Following the conclusion of Season 30's live reunion, Season 31
Second Chance cast will be announced. The potentials for next season encompass
all returnees from Survivor's classic seasons to modern seasons.
For the past two weeks, I have been voting online for castaways
who I think should play in Season 31. Below are the ten men
and ten women voted by yours truly to play, hopefully.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<h3>10 Men for Season 31: Second Chance</h3>
<ul>
<li>Jim Rice</li>
<li>Keith Nale</li>
<li>Shane Powers</li>
<li>Stephen Fishbach</li>
<li>Jeff Varner</li>
<li>Spencer Bledsoe</li>
<li>Troyzan Robertson</li>
<li>Terry Deitz</li>
<li>Andrew Savage</li>
<li>Vtas Baskauskas</li>
</ul>
<h3>10 Women for Season 31: Second Chance</h3>
<ul>
<li>Kass McQuillen</li>
<li>Monica Padilla</li>
<li>Natalie Tenerelli</li>
<li>Sabrina Thompson</li>
<li>Tasha Fox</li>
<li>Teresa T-bird Cooper</li>
<li>Kelley Wentworth</li>
<li>Kelly Wigglesworth</li>
<li>Kimmi Kappenberg</li>
</ul>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
From these ten men and ten women, my favorites to win are Kass McQuillen
and Spencer Bledsoe due to their blossoming rivalry dating back
to Season 28 Cagayan. Either way, this season should be not only
entertaining, but also intriguing to watch for many reasons.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-30900949027380840562015-05-20T18:55:00.002-04:002015-05-20T18:56:57.124-04:00Prediction for Survivor 30 Winner<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Once again, another season of Survivor is drawing to a conclusion.
So, a final prediction is well in order for predicting who will
become the Sole Survivor for Season 30 Worlds Apart. Last year,
I correctly predicted that Natalie Anderson would win due to
her actions taken during Season 29 along with her game play
at the end. With that mind, here is my prediction for Season
30.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
With just five castaways left, the obvious two choices, Mike
and Carolyn, are the favorites to win. They have both won the majority
of the immunity and reward challenges after the merge. However, each must win
the final two immunity challenges in order to have a change to
make it to the Final Tribal since they are the strongest players
left at this point. This means if either Mike or Carolyn lose
one of the final challenges, he or she will be voted out.
In contrast, Will and Sierra are the weakest of the five remaining
players. This would mean that they are not pressured to win, but
in effect, able to lose both challenges and still make the Final
Tribal Council due to their weaker game play, physical and strategic.
Will and Sierra are most likely to be taken to the final three
by either Mike and Carolyn which would make one of the stronger
players, again, the winner and sole survivor. Will and Sierra
may receive a vote or two for their efforts, but, in the end,
it won't matter for either one of them.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Then, there is Rodney. The guy who has been imprisoned, or so to
say, at camp escameca for the entire season. Besides winning
a steak at the auction, Rodney has endured a unique journey when
compared to the others this season, mentally and physically. He
has not won any reward challenges nor taken part in any of them.
A common visual of Rodney is his presence sitting in one of the
camp chairs staring at the fire or eating a small portion of rice.
His sitting at camp metaphorically represents his sitting on the
sidelines of a basketball game or on a football field. This metaphor
was developed earlier in the season by Rodney who suggested
he was similar to the great Michael Jordan and Tom Brady for
describing his game play. While attempting to vote out his
number one nemesis Mike, Rodney has formed sub-alliances
only to be denied by Mike winning immunity challenges.
From the above statements and story line, my prediction is that
Rodney will overcome Mike and then Carolyn for going on to win
Sole Survivor this season. Rodney only needs to win one immunity
challenge, the last one, to defeat either Carolyn or Mike, to
go on to plead his underdog case in front of the jury. Undeniably,
he receives more votes than Sierra and Will who receive, second
and third places, respectively. Boston Rod's win solidifies his
sports metaphors dictated earlier, his white air jordans worn, and
his place among the other twenty-eight sole survivor winners as
he becomes the twenty-ninth winner.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-30718631395743181792015-05-13T18:53:00.000-04:002015-05-13T19:12:58.753-04:00The Problem with Online Content Regurgitation<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
As of late, I recently became aware of a problem with online
content and how it potentially affects the Web. It seems that there
are two types of content published: 1) the original or
primary source and 2) a copy or slightly varied version of the primary
content referencing the primary content source. For example,
an organization may publish a press release to its website
describing a new product or service. A blogger may pickup
the news of the new product or service and post a blog on his
or her website describing the new product or service and
perhaps linking to the original source.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
The problem is that the secondary publishers of original content
are simply regurgitating the original content in an attempt to,
perhaps, increase user viewership of their websites from additional content
or to display more web ads on the same web page of the secondary content.
For instance, when reading my daily subreddits on <a href="http://reddit.com">reddit.com</a> today,
I noticed a link to the new features for <a href="http://fit.google.com">Google Fit</a>, a tool
for recording human fitness and performance metrics. However,
instead of posting the original content to the subreddit, a secondary
article describing the original or primary content was posted for
users to read. However, this secondary, published content simply
regurgitated the primary source's content. It lacked additional
insight regarding the new features for Google Fit which can be
considered online content regurgitation.
</p>
<p>
Here are the actual links posted today:
</p>
<p>
Primary Source Link by Google: <a href="http://officialandroid.blogspot.com/2015/05/google-fit-make-every-step-count.html">Google Fit: Make every step count</a>
</p>
<p>
Secondary Source Link by Android Police: <a href="http://www.androidpolice.com/2015/05/13/google-fit-v1-52-brings-distance-tracking-calorie-estimates-a-new-widget-and-a-watch-face-apk-download/">Google Fit v1.52 Brings Distance Tracking, Calorie Estimates, A New Widget, And A Watch Face</a>
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
As one can see, the secondary source clearly regurgitates the primary
source's content while providing latest deals links and other
distracting content surrounding the content. A possible solution to this problem
may be the inclusion of a primary source link directly referencing
the original source of content by the primary provider. This
primary source link could be located with a neutral, third-party
website listing primary source links and secondary source links.
A possible model for following and improving at the same time is the permalink model
which helps avoids link rot. Unfortunately, permalink does not
resolve the issue of primary source regurgitation by secondary
source publishers. Perhaps, a new project undertaking is on the
horizon.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-25829961505610957722015-03-11T10:42:00.002-04:002015-06-07T11:57:53.321-04:00Certified Google Adwords<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p><a href="http://coreyleong.org/w/index.php/File:Google_Adwords_Certificate.png"><img width="430" height="332" src="http://coreyleong.org/w/images/e/e6/Google_Adwords_Certificate.png"border="0"/>
</a>
</p>
<p>
Recently, I passed the Google Adwords Certification exam. My overall
goal is to move towards full Google Partner status by implementing best
practices and a required monthly spend clients. The next two certifications
I am preparing for are Google Video Ads and Google Shopping. I hope to
successfully pass these in the coming months. After accomplishing these,
I intend to become certified as a Google Educator and Google Trainer.
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-48469691034246670542015-01-20T17:37:00.000-05:002015-01-20T17:38:52.875-05:00Certified Google Analytics<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p><a href="http://coreyleong.org/w/index.php/File:Google_Analytics_Certificate.png"><img width="430" height="332" src="http://coreyleong.org/w/images/6/6c/Google_Analytics_Certificate.png"border="0"/>
</a>
</p>
<p>
Over the long holiday weekend, I passed the <a href="http://google.com/analytics">Google Analytics</a>
Certification Exam. My purpose for working towards this
certification is to incorporate statistical analysis of web sites,
web apps, and non-web applications. Moreover, experiments
will be conducted on my current and future research projects
using Google Analytics' <a href="https://developers.google.com/analytics/devguides/collection/protocol/v1/">measurement protocol</a> which I am highly motivated in testing out.
</p>
<p>I will post my assessments of the measurement protocol as I
conduct my research experiments.</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-14415410517414250132015-01-05T19:13:00.001-05:002015-01-05T19:14:44.194-05:00Initial Netizen OS Ontological Graph <!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In an effort to organize my attempts at building an open
source operating system, I have employed an ontology tool
called Protege. The purpose for the tool is to help me
efficiently and effectively add, annotate, and classify
new Fedora software packages as I proceed through each
new iteration of the operating system.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p align="center">
<img src="http://coreyleong.org/w/images/4/42/Initial_Netizen_OS_Ontological_Graph.png"
width="237" height="114" alt="Initial Netizen OS Ontological Graph" border="0"/>
</p>
<p>
Above is an example graph I exported from Protege. It represents three classes:
Engagement, Security, and Privacy. Each of these classes will
contain new Fedora software packages classified within this
ontology and the Fedora Netizen operating system.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In summary, my goal is to build the ontology in parallel with
the new iterations of the operating system so that a graphical
representation will be available for new and current users of
the system to view and reference.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-79082802367530466702014-12-17T13:24:00.002-05:002014-12-17T13:26:33.417-05:00Survivor San Juan del Sur Winner Prediction <!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Keeping to my tradition of predicting a Survivor winner, I will
attempt to offer evidence for who will win tonight's Sole Survivor
title.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Throughout the last twelve weeks, the Survivor editors have been
inconspicuously dropping visual hints that Natalie, one of
the twinnies, will win this season. Early in the season, Natalie
was shown finding the controversial lost flint which was an early
plot point unbeknownst to most viewers and yours truly. Next, while sending
everyone else at camp to collect water, Natalie took the
initiative to find a hidden immunity idol buried by the
campfire for someone to find eventually. Moreover, when confronted
by this season's anti-hero, Jon, Natalie not only saved Jon
by telling him to play his idol, but also beat him in a vase
balancing challenge.
</p>
<p>
Adding to her winner's resume, Natalie then proceeded to deceive
Jon and Jaclyn by saying she would vote out Keith, but instead
voting out Alec which obviously frustrated Jon and Jaclyn after
the vote. She then planned and implemented a plan to blindside
Jon by splitting the votes and then easily voting out Jon from
the revote. Enhancing her resume, many times Natalie's conversations
were visually presented in subtitles to viewers which is used
as an important moment by the editors for conveying not only
what is happening, but also a pivotal moment in the game.
</p>
<p>
Finally, while at Exile Island, Natalie offers an
emotional loneliness from not being with her twin sister for
more than thirty days which pulls on the emotional strings
of viewers. Script writers love to use this type of emotional mechanism
against viewers for touching a broad range of emotions during
a major motion picture, documentary, or other type of film
production.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
From the above evidence I provided, Natalie's winner montage will
include all of the above moments I mentioned, if not more,
when she is eventually crowned Season 29 Blood versus Water San Juan del Sur
winner tonite as the Sole Survivor. This is my prediction.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-42398137111790776342014-10-01T19:12:00.000-04:002014-10-01T19:45:10.761-04:00Psychology of Survivor <!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Last week, the latest installment of the show Survivor began its 29th season shot in Nicaragua. This season's theme is Blood versus Water which matches up loved ones to compete for the one million grand prize. My fascination with the show stems back to my high school days where I was introduced to the book, The Lord of the Flies (LOTF) by William Golding. Golding's book mesmerized me then and still does today, which explains why I continue to be fascinated by Survivor, a show based on my all-time favorite book LOTF.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
From my recent graduate studies, I was lucky to have studied psychologist Abraham Maslow's Hierarchy of Needs for humans and animals. Maslow suggested all humans are motivated to satisfy their basic needs of food, shelter, excretion, homeostasis, breathing, water, sex, and sleep. After these lower level needs are satisfied, Maslow posit that other levels are then sought after by humans. The other levels are safety, social, esteem, and then finally self-actualization. Coincidentally, the players in Survivor attempt to satisfy these same needs suggested by Maslow's model throughout the show.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In an effort to enjoy watching this season while applying Maslow's psychological work, I developed a pilot fantasy scoring game. Somewhat similar to scoring in fantasy football, game players draft castaways on their teams for earning points during the season. The fantasy game player or tribal owner who accumulates the most points at the end of the season wins the game. My goal is to develop the fantasy game in HTML5 for eventually using as an educational tool in the classroom. To start out, the following is an alpha version of the scoring breakdown for the physiology level:
</p>
<p>
Physiology Points: Breathing, Food, Water, Sex, Sleep, Homeostasis, Excretion
</p>
<ul>
<li>+1 Player attempts to start fire.</li>
<li>+1 Player starts fire.</li>
<li>-1 Player puts out fire.</li>
<li>+1 Player looks for water.</li>
<li>+1 Player boils water.</li>
<li>+1 Player collects water.</li>
<li>-1 Player dumps out water of another.</li>
<li>+1 Player drinks water.</li>
<li>+1 Player eats food.</li>
<li>-1 Player wastes food.</li>
<li>-1 Player hides food from another.</li>
<li>-1 Player throws away food.</li>
<li>+1 Player fishes for food.</li>
<li>+1 Player gathers fruits.</li>
<li>+1 Player gathers wood.</li>
<li>+1 Player hunts for food.</li>
<li>+1 Player builds shelter.</li>
<li>-1 Player destroys shelter.</li>
<li>-1 Player burns down shelter.</li>
<li>+1 Player sleeps.</li>
<li>-1 Player is sleep deprived.</li>
<li>-1 Player is dehydrated.</li>
<li>+1 Player excretes.</li>
<li>-1 Player cannot excrete.</li>
<li>-1 Player loses tool.</li>
<li>-1 Player breaks tool.</li>
<p>As the show continues from week to week, I plan to post updates on the progress of the game.</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-91283643645319355742014-06-29T07:45:00.002-04:002014-06-29T07:49:42.349-04:00A New Spin on Internet Citizenship<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
For awhile now, I have been tinkering with the idea of developing
an operating system for empowering online citizens. This idea aligns
with my most recent research and graduate work in public administration
and nonprofit management. The main focus is to provide the
necessary tools for citizens to engage with outside individuals
and organizations with privacy and security at the forefront. My
reasoning for focusing upon privacy and security first links to
<a href="http://en.wikipedia.org/wiki/Maslow%27s_hierarchy_of_needs">Maslow's
Hierarchy of Needs</a> which I studied a few semesters ago.
Abraham Maslow proposed that all individuals seek five stages
in life: physiological, safety, social, esteem, and self-actualization.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Referencing Maslow's work, I focused on the two primary areas, privacy
and security, for enabling internet citizens or netizens. However,
instead of creating an operating system from scratch, I selected
the <a href="https://spins.fedoraproject.org/">Fedora Spins Project</a>
for developing a linux-based system. The
initial specification for the new spin is located <a href="https://fedoraproject.org/wiki/Netizen_Spin">here</a>. My goal
for this project, Fedora Netizen, is to have an operational
operating system for citizens to download and use from a USB stick or
install entirely on their Mac, PC, or other internet enabled device.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-79343132583358648322014-06-09T06:35:00.000-04:002014-06-09T06:36:11.253-04:00BlendKit Blended Course Reflection<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Reflecting upon BlendKit 2014 blended course, new perspectives
were gained regarding how blended courses could benefit students,
as well as instructors when delivering required continuing
education and licensure courses. In forming a suitable question for
basing further blended course development, the following question
may aid in the development process: <i>in what ways can a blended course
development approach improve effectiveness and efficiency for
delivering high quality educational experiences within the real
estate industry?</i>
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Implementing this question, the first benefit that my be realized is the
dual allowance for learning synchronously and asynchronously
by students. The opportunity for students to learn multiple and
alternative may promote higher levels of cognitive learning. In addition,
permitting remote participation may be more convenient at times
for students, especially for those who work full-time jobs and
have family responsibilities. On the contrary, those students
who may have the need to directly interact with their instructors
benefit from the in-class sessions eliminating the possible feeling
of totally being disconnected.
</p>
<p>
From an instructor's perspective, blended course delivery may offer
an increased amount of time for managing courses and responding
to students' need due to the decreased amount of time required in a
classroom. Moreover, integrating a blended mode may also aid in the
implementation of a flipped classroom scenario. By assigning reading
and work assignments for homework, students may be more attentive within
the classroom since they are given the opportunity to work on
their assignments before meeting in-class. Because more in-class
time is available, alternative learning experiences may take place
such as role playing, games, and other in-class group activities.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In conclusion, the implementation of blended courses may provide
a significant impact to my future development and delivery of
instructional courses. As identified in my original question,
effectiveness and efficiency are two important keys to the ongoing
success for my current course covering cybercrime and upcoming
courses on internet privacy and cybersecurity. With this in mind,
I envision offering these three courses in blended mode along with
online versions at the start so that I can make proper adjustments
for effectively and efficiently delivering higher learning experiences
to my future students.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-55731735617619433222014-06-03T14:27:00.001-04:002014-06-06T18:38:36.598-04:00Certified Google YouTube Digital Citizenship <!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p><a href="http://coreyleong.org/w/index.php/File:YouTube_Digital_Citizenship_Certificate.png"><img width="430" height="332" src="http://coreyleong.org/w/images/5/57/YouTube_Digital_Citizenship_Certificate.png"border="0"/>
</a>
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Today, I earned Google's YouTube Digital Citizenship Certification
by passing the online examination. My official test record can be viewed <a href="http://goo.gl/2rvDtt">here</a>.
Studying for the exam was actually an enjoyable task as I gained
new insight into YouTube's safety and privacy policies and tools.
The next Google certifications I plan to take are the Google Analytics
certification and the Google Educator certification.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-45813135367081531332014-05-21T18:17:00.001-04:002014-05-23T14:22:47.787-04:00Survivor Cagayan Prediction<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
After years of not watching Survivor, I finally returned to watching the show
this past season, Survivor Cagayan. Even though I do not subscribe
to cable, I can still watch the show on Amazon's Instant Video service.
Nevertheless, this past season has been a treat, to say the least,
for watching because of all the new players, twists, and location. Since
tonight is the finale, I will attempt to predict who will be voted out
and of course, the eventual winner.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Analyzing the final four, I predict the next player to go will be
Kass since she is considerably weak at physical challenges. With
the final three consisting of Tony, Spencer, and Woo, the next
to be voted out after losing the final immunity challenge will be Tony
leaving Spencer and Woo for the final tribal council. After
answering the jury's questions and debating their reasons
why they each should win the million dollars, my final
prediction is for Spencer to be named sole Survivor.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
All in all, it has been a great season to watch as a fan, a social
science researcher, and a Lord of the Flies true adorer. I look forward
to watching the next season with the hope of no returning players
and all brand new players similar to Cagayan.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-5193652778919842772014-05-21T11:42:00.003-04:002014-05-21T11:42:30.545-04:00Quality Assurance in Blended Learning<!-- ------------------------------------------------------ -->
<!-- ---------------Introduction--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
Focusing on this week's readings from my blended learning course, many questions need to be not only investigated, but also answered regarding my upcoming development and delivery of blended instructional courses. First, the question of following standardized rules and procedures for creating and instructing blended learning courses exist due to its location within the early stages of a product's life cycle. Second, instructional effectiveness was also questioned and must be addressed. The need for learners to transfer newly gained knowledge to real world applications is a critical issue for developing credibility of blended learning. Finally, a conclusion is offered for perhaps providing insight on how I may resolve issues and questions pertaining to standards and instructional effectiveness for blended learning courses.
</p>
<!-- ------------------------------------------------------ -->
<!-- -------------------Body------------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In the reading, the lack of a formalized, authoritative body to oversee standards of blended learning was declared and discussed which translates into that the blended learning discipline is in the infantile stage and still evolving. This point was an important concern for me since I have previous experience in researching authority bodies such as the World Wide Web Consortium (W3C), Internet Corporation for Names and Numbers (ICANN), and Internet Engineering Task Force (IETF) regarding the standardization of internet protocols, web development, and cyber infrastructure. The commonality between all three of these organizations mentioned is that they are formed as nonprofits, but more importantly, tax exempt public charities for the purpose of serving the general public. With this in mind, the formation of a nonprofit organization may be a possible solution for moving forward and developing standardized blended learning course development, best practices, and open source tools which also do not exist, but were mentioned as a major problem within the discipline. Furthermore, the question of efficiency and collaboration may also be resolved if a consortium of organizations networked together to share information and strategies under the helpful hand of a neutral and public serving nonprofit organization for advancing blended learning.
</p>
<p>
Besides the need for standards and a governing body, instructional effectiveness was a a major point realized from the week's reading. In my attempt to provide effective blended learning courses in real estate science and other disciplines, I plan to develop Google Docs forms for students to submit their feedback. Both formative and summative, student feedback during and after course delivery will be a key component for my instructional development because of their alternative perspectives will render new information outside of my instructional role. The other key component for my continued growth in delivering effective blended courses will be the requesting and collecting of peer review feedback. Peer review feedback may also provide ideal and timely information for improving blended learning course delivery since others may have already encountered the same issues within their courses.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Conclusion--------------------------- -->
<!-- ------------------------------------------------------ -->
<p>
In sum, my approach for developing and delivering blended learning courses covering real estate science will be a consistent, researched approach for helping students build new knowledge. Nevertheless, it is important as an instructor and researcher to stay abreast of the latest scientific research findings concerning blended learning by reading peer reviewed articles found in academic journals. Moreover, I will also pay close attention to other academic instructors' views and methods by perhaps subscribing to mailing lists, joining forums, and attending workshops involving blended learning best practices. Lastly, the academic community within the University of Central Florida will continue to be a main resource for me to lean on as I continue to develop and deliver blended online courses.
</p>
<!-- ------------------------------------------------------ -->
<!-- -----------------Signature---------------------------- -->
<!-- ------------------------------------------------------ -->
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-39475271909724233812014-05-20T08:40:00.000-04:002014-05-20T08:40:00.652-04:00A New Blog Home<p>
For awhile now, I have been contemplating whether or not to move this blog from wordpress to blogger for a couple of reasons. The first reason why to move the blog is because the DNS records for corey.leong.name are resolved by wordpress rather than with my personal hosting company. Since I have extensive DNS experience, I always prefer to resolve my own domains for controlling resolution, redirection, and for maintenance purposes.
</p>
<p>
The second reason why is because it seems wordpress levies unnecessary fees to host a blog. Case in point, I incurred a fee for not only redirecting my primary domain, corey.leong.name, but also for eliminating ads situated within my posts for wordpress to make additional money. Then, there is a premium fee for packaging more of there services which seems to me exorbitant for me and the average wordpress user, in my opinion.
</p>
<p>
Lastly, my current research involves e-learning and developing courses for delivering online courses in the near future. Moreover, one area of course content covers Google Apps which includes GMail, Google Drive and Docs, Sites, Chrome, and Calendar. Since all of these products are Google products, it only makes sense to investigate Blogger which is also another Google product. Thus, the final reason why I am moving from wordpress to blogger is for integration purposes with Google+, Google Analytics, YouTube, and all other Google products.
</p>
<p>
The new address for my blog is blog.coreyleong.org hosted by Google’s blogger while the old address, corey.leong.name, will be a new site with a new direction in the future.
</p>
<p>
--Corey
</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-1844897773929460082014-05-14T08:43:00.000-04:002014-05-20T08:23:06.084-04:00Blended Content and Assignments<p>After reading this past week's reading assignment, key points of blended learning activities were realized from a holistic perspective. Using my current course development of CYC2001 Introduction to Cybercrime, I will attempt to apply the key points gained from the reading for adapting to the upcoming modules. Next, I will offer ideas on technology-integration within CYC2001, as learning activity types were discussed within the reading. Finally, a conclusion is offered for resolving my thoughts and perspectives with the coupling of technology and learning activities.</p>
<p>In designing effective modules for online and face-to-face interactions, focusing on learning activities was emphasized using three different approaches: direct, indirect, and online. Applying a direct learning method to CYC2001, students may gain new knowledge by witnessing hack attacks in real-time via a security emergency center or antivirus third party vendor. If a real-time experience is not available, simulating events of cyber hacking and attacks within an internal network may offer links between course concepts and observational experiences. Furthermore, role playing may also add beneficial knowledge linkages for students during in class simulations. </p>
<p>For considering an indirect approach for learning activities, the delivery of case studies within the classroom would be an ideal method due to the connecting of current events and learning objectives within the course. Another indirect approach related to case studies would be the offering of personal or third party stories of examples of cybecrime for students to engage other students from others' experiences. Even though online gaming was listed under indirect approaches in the reading assignment, one online integration possibility is the delivery of an online game for students to experience. From last semester's course on instructional game development, I developed a prototype cybersecurity game involving a simple network topology, a user, and a virus which infects computers on the network. With this type of learning tool, an online game may enhance the learning experiences of students because of its adaptive nature and the enticement for learners to play for fun. No matter which learning activity is implemented, all students will be asked to reflect upon their learning experience after each module's interaction within discussion forums representing a communicative method. In addition, learners may develop mindmap diagrams of the their newly acquired knowledge for producing or remixing their knowledge signifying a productive learning approach to blended learning activities.
</p>
<p>In sum, integrating technology and learning activities is a core requirement for not only my upcoming course in cybercrime, but also all future courses. Offering learners the opportunities to engage in multiple interactive ways during a course is a high priority for this instructor for enhancing overall course delivery and increasing the level of engagement. From the reading assignment, indirect, direct, and online were three approaches which were realized for developing face-to-face interaction and online interaction within blended courses. Furthermore, three types of learning activities were discovered for implementing in my immediate course delivery: adaptive, communicative, and productive. </p>
</p>
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0tag:blogger.com,1999:blog-2627817862740333358.post-47986899709377950942014-05-07T08:52:00.000-04:002014-05-20T14:37:30.779-04:00Blended Assessments of Learning<p>
In an effort to develop a blended course involving online and face-to-face interactions, formal and informal assessments will be implemented within my upcoming course, introduction to cybercrime. For formal assessments, three student quizzes are planned for my introductory course covering topics on cybercrime. Each quiz will assess students' understandings of the concepts within the first three modules on the first quiz, modules four through six on the second quiz, and the final three modules, seven through nine, on the final examination. A time limit will be set for each formal assessment along with the opportunity to retake the assessment a second time, if the student so chooses. Online essays in the form of discussion postings will also be utilized each week for allowing student-to-student interactions. In addition, I will also provide feedback to students' to build upon their critical thinking by posing alternative questions according to their posted reasonings. A quantitative assessment will be used for assessing discussion points as follows: one point for minimal effort, two points for below average effort, three points for an average effort, four points for an above average effort, and finally, five points for a superior effort and response.</p>
<p>
For informal assessments two methods will be utilized during the cybercrime course, one-sentence summary and student-generated test questions. However, these two assessments will be implemented during face-to-face interactions rather than online which is in contrast to the suggested method from this week's reading assignment. During classroom sessions, time will be allotted for students to think about the current topic and synthesize a one-sentence summary. I will then randomly read these out loud in class for the students' to comment on the statements for drawing on alternative perspectives regarding the current topic in class. The other method of informal assessment will challenge students to develop three to five ideal test question for the final exam. From this method, students will not only benefit from the direct interaction of the subject matter, but will also gain valuable insight into the final exam which should remove an effort to memorize content for the sake of regurgitating it later on the final exam.
</p>
<p>In sum, from this week's assigned reading I identified assessment strategies, formal and informal, for implementing withing my upcoming blended course on cybercrime. First, formal assessments involving quizzes and essays posting in online discussion forums will be assigned to students for evaluating using a quantitative grading rubric. Second, informal assessments, one-sentence summary and student-generated test questions, will be implemented within the classroom for building face-to-face interactions and higher levels of engagements with students. By implementing these two types of blended assessments, the hope for new opportunities of interactions between instructor and students should be a positive reinforcement during course delivery while enhancing the potential for students to build their knowledge of cybercrime topics and issues.</p>
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com1tag:blogger.com,1999:blog-2627817862740333358.post-68573976138894464412014-05-01T10:35:00.000-04:002014-05-20T14:36:09.184-04:00Blended Interactions<p>
After reading this week's Blendkit2014 reading assignment, several thoughts came to mind regarding methods of interactions between an instructor and students during a blended course, specifically for a course I am currently developing, CYC2001 Introduction to Cybercrime. From my past instructional experiences, adult learners in real estate education generally require additional guidance with concepts and principles since most are new to the industry. Furthermore, the majority, if not all, real estate learners are merely present to receive their licensure for moving onto residential or commercial brokerage work. Because real estate educational requirements are minimally set by state commissions, learners' knowledge of real estate concept may vary greatly, in addition to their technical competence. With this in mind, identifying learners' experiences within a specific knowledge domain may play an important role in the decision making process for selecting a blended interaction model as discussed in this week's reading assignment.</p>
<p>
Three specific interactions models were found most relevant from the reading for implementation purposes. First, the atelier learning model was presented as a method for instructors to observe and interact with learners similar to how art instructors observe and interact within their art studio classrooms. This interaction method could potentially work for observing posted discussion question and answers within an online forum discussing issues and topics on cybercrime. Second, fisher's interaction method for continuously establishing connections between concepts draws similar patterns to network administrators who connect new devices within an organization's network. Fisher's model of forming connections was received as an ideal method for integrating with my upcoming course, especially for connecting issues in cyberattacks to methods in preventing future attacks. The third method that may offer beneficial learning experiences was the concierge learning, a method for directing learners to resources previously unknown. This interaction method would seem the most ideal since real estate learners may not have been exposed to prevention measures in cyberattacks, but also unaware of other cybercrime topics such as phishing, viruses, and physical asset attacks.
</p>
<p>
In sum, all three interaction models will at some point be implemented within my upcoming cybercrime course. For online instruction, the atelier and fisher models seem most likely to be implemented online since discussions can be easily monitored online while offering URL links to additional resources for learners so that they are able to create new learning associations. In contrast, the concierge interaction would best play a role within the classroom during presentations for creating new in class discussions, covering case studies, and possibly for integrating within role playing situations for enhancing learning experiences. After implementing, evaluating how successful these three interaction methods is also a key element for revising or eliminating altogether from future blended courses. </p>
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com2tag:blogger.com,1999:blog-2627817862740333358.post-20172713707162540852014-04-25T09:00:00.000-04:002014-05-20T14:39:33.903-04:00Understanding Blended Learning<p>
This summer I am enrolled in my second Massive Open Online Course (MOOC) offered by UCF and EDUCAUSE. Blendkit 2014 is the name of the course and my goal for enrolling is to apply blended instructional concepts and principles to the ongoing development of real estate courses I am currently designing. From my past learning and instructional experiences, there seems to be a gap in the effort to develop a hybrid instructional approach in the real estate sector, especially in residential. Salesperson courses tend to be either face-to-face or entirely online. However, applying a blended approach to the delivery of residential salespersons and broker salespersons courses not only seem to be likely ideal course candidates, but ultimately improve learning experiences of pre-licensed students. </p>
<p>After reading the initial chapter assignment, my understanding of what a blended course was confirmed by the definition given that a blended course is comprised of the traditional face-to-face instruction and online instruction. From the stated benefits of blended learning, the most important benefit that registered with me, as a current student myself, was the additional benefit of flexibility. Traditional instruction has been and still is the prime instructional mode for delivering real estate salesperson courses, even though e-Learning instruction is well established in other industries. My theory for this resistance is that the real estate industry is quite often constrained and restricted by older and traditional practitioners as well as instructors which in effect causes not only the adoption of technology to be slower, but also new approaches to implement within the industry. Annual reports routinely state that the average age of the practicing residential salesperson is 55 or older which reaffirms my theory each year.
</p>
<p>
For better understanding development approaches for blended courses, several interesting points were made within the designing section. In particular, the concept of geographically distributed came up which is an important aspect for my development since future learners will be dispersed through out the state of Florida and eventually nationally. Again, flexible learning was brought up during the planning process of delivery. This is another interesting point for relating to real estate since the delivery of salesperson courses tend to be very deliberate in their linear, systematic approach of instructing towards the exam which is fully endorsed by state real estate commissions. Near the end of the design section, the topic of models or frameworks for developing learning courses was discussed. From my most recent research on interoperability and reusability of learning management systems, ontology development applied to e-Learning is a new research interest of mine and may extend well to the development of a blended real estate course. An ontological approach applied to blended course development may become an effective method for developing dynamic courseware along with a graphical solution for eventually establishing a knowledge base system for future courseware development. In sum, I plan to apply early concepts of blended learning for developing a blended real estate course while using an ontology tool called Protege for testing in Moodle, an open source learning management system.
</p>
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com2tag:blogger.com,1999:blog-2627817862740333358.post-62437519650540218352014-02-22T01:15:00.000-05:002014-05-20T14:43:52.742-04:00Spring 2014 Graduate Courses<p>
This spring semester I am currently taking two courses at <a href="http://ucf.edu">UCF</a>. To begin the new year, I was admitted into the Instructional Design and Technology (IDT) Master Program within the Education and Human Performance College. With a concentration in e-learning, my goal is to complete the program within three years while appling concepts, principles, and theories directly to course development for the <a href="http://gr8u.org">Global Real Estate And Technology University</a> (GR8U) where I will instruct continuing education and eventually, licensing courses. This will be my second master's degree from UCF with my sights set on additional advanced degrees in the near future.</p>
<p>Currently, I am enrolled in the following courses:</p>
<ul>
<li>EME 6062 Research in Instructional Technology</li>
<li>EME 6614 Instructional Game Design in Training and Education</li>
</ul>
<p>--Corey</p>Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com3tag:blogger.com,1999:blog-2627817862740333358.post-17115183479657549892013-12-31T15:37:00.000-05:002014-05-20T17:17:14.653-04:00Reflecting on 2013<p>
Once again, it is that time of the year when father time forces a brand new year upon us all. However, reflecting back upon the past year is an important action for looking forward to the future.
</p>
<p>
The past year for me involved mainly one specific purpose, academics. Earlier in the year, I was enrolled in two graduate courses, Human Resources Management and Strategic Planning Management, at the <a href="http://ucf.edu">University of Central Florida</a>. These two courses were core courses within the Master of Nonprofit Management (MNM) program in which I was working towards since the Spring of 2011.
</p>
<p>
After finishing Human Resources and Strategic Planning courses, I enrolled in an elective course Organizational Behavior. The reason for taking this course was to develop a concentration in public administration to add to my specialization in nonprofit management. I found Organizational Behavior rigorous, but enlightening at the same time, during my work within the course. For the course paper, I focused on the theory behind the communication process and applied this same theory to a later course taken this past fall.
</p>
<p>
Following the summer session, I finished the MNM program by taking Public Administrators in Governance and Public Policy in the fall semester. With these two courses, I successfully balanced my graduate courses with 18 hours in nonprofit management and 18 hours in public administration. The other course taken was an elective, Cybercrime and Criminal Justice. Even though I had no prior knowledge or experience with either two, Governance and Public Policy were wonderfully rigorous and thought provoking for me. In developing papers for these courses, I researched and covered topics covering Internet Governance and a theoretical perspective on Texting and Driving for a group paper.
</p>
<p>
The culmination of this past year's courses taken lead to graduating from the MNM program approximately two weeks ago. Walking across the stage and accepting a congratulatory handshake from a UCF provost regarding my academic achievement was an important step in my academic career, but more importantly achieving a life goal I had set twenty years ago after I finished my bachelor's degree. I had promised myself to eventually attend graduate school and receive a master's degree. Check and check for 2013.
</p>
<p>Looking forward, I begin the next chapter in my academic career by taking e-Learning courses, Adult Learning and Research in Instructional Technology. My new goal for 2014 is to work towards a second master's degree in Instructional Design and Technology. Delivering future instructional courses online and in the classroom are reasons for working towards a Master in Arts degree. In addition, I intend to apply e-Learning theories and principles gained towards areas in human rights and citizen engagement within the domain of International Relations.
</p>
<p>
In summary, 2013 was a enlightening year academically speaking. 2014 will definitely be more of the same.
</p>
<p>--Corey</p>
Corey Leonghttp://www.blogger.com/profile/01838671195012818918noreply@blogger.com0