<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tim Coffey, Author at eLearningInside News</title>
	<atom:link href="https://news.elearninginside.com/author/timcoffey/feed/" rel="self" type="application/rss+xml" />
	<link>https://news.elearninginside.com/author/timcoffey/</link>
	<description>News for eLearning</description>
	<lastBuildDate>Wed, 12 Jul 2023 16:57:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Cyber Security Training &#8211; Don&#8217;t Just Check the Box</title>
		<link>https://news.elearninginside.com/dont-just-check-box-cyber-security-training/</link>
					<comments>https://news.elearninginside.com/dont-just-check-box-cyber-security-training/#respond</comments>
		
		<dc:creator><![CDATA[Tim Coffey]]></dc:creator>
		<pubDate>Fri, 08 Sep 2017 23:49:18 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://news.elearninginside.com/?p=2667</guid>

					<description><![CDATA[<a href="https://news.elearninginside.com/dont-just-check-box-cyber-security-training/" title="Cyber Security Training – Don’t Just Check the Box" rel="nofollow"><img width="150" height="150" src="https://news.elearninginside.com/wp-content/uploads/2017/09/cybersecurity-news-150x150.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Cybersecurity news from News.eLearningInside.com" style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" /></a><p>If you've worked for a company regulated by Sarbanes-Oxley, PCI, or HIPAA, then you’ve probably clicked through your share cyber security compliance training. So many companies filter their employees through this type of training, but is that enough?</p>
<p>The post <a href="https://news.elearninginside.com/dont-just-check-box-cyber-security-training/">Cyber Security Training – Don’t Just Check the Box</a> appeared first on <a href="https://news.elearninginside.com">eLearningInside News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<a href="https://news.elearninginside.com/dont-just-check-box-cyber-security-training/" title="Cyber Security Training &#8211; Don&#8217;t Just Check the Box" rel="nofollow"><img width="150" height="150" src="https://news.elearninginside.com/wp-content/uploads/2017/09/cybersecurity-news-150x150.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Cybersecurity news from News.eLearningInside.com" style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" loading="lazy" /></a><p><span style="font-weight: 400;">A few years ago I received my cyber security training in the form of an email. It was a company- wide message from our Director of Finance. She urged us to be alert for phishing attacks when opening or taking action on emails. The night before, she had received an email from our CEO, requesting a cash wire transfer. Not the strangest request, but it warranted a closer look. Sure enough, the sender’s address wasn’t our CEO&#8217;s, even though the name field was. Whew! That was close.</span></p>
<p><span style="font-weight: 400;">For our small company, this was an important wake up call. There are malicious grinches out there with just enough information and mean spirit to do some real damage. Prior to this incident (and a few others that followed) it didn’t seem at all necessary to deploy company-wide cyber security training.</span></p>
<h2><span style="font-weight: 400;">Click Through That Compliance Cyber Security Training</span></h2>
<p><img fetchpriority="high" decoding="async" class="alignleft wp-image-2773" src="https://news.elearninginside.com/wp-content/uploads/2017/09/rivetingcybersecuritytraining-e1504916394604.jpg" alt="Bored learner taking a cyber security training compliance course" width="300" height="448" /></p>
<p><span style="font-weight: 400;">If you’ve worked for a company regulated by </span><a href="http://www.soxlaw.com/"><span style="font-weight: 400;">Sarbanes-Oxley</span></a><span style="font-weight: 400;">, </span><a href="https://www.pcisecuritystandards.org/"><span style="font-weight: 400;">PCI</span></a><span style="font-weight: 400;">, or </span><a href="https://www.hhs.gov/hipaa/index.html"><span style="font-weight: 400;">HIPAA</span></a><span style="font-weight: 400;">, then you’ve probably clicked through your share cyber security compliance training. So many companies filter their employees through this type of training, but is that enough? </span></p>
<p><span style="font-weight: 400;">IT security is to a company as white blood cells are to the human body &#8211; isolating threats and keeping them at bay. When that layer gets compromised, it can turn into a problem in a hurry. Fortunately, keeping things locked down can be as simple as keeping vigilant, and making cyber security part of company culture &#8211; just like regularly washing hands or taking a daily multivitamin.</span></p>
<h2><span style="font-weight: 400;">The Human Factor</span></h2>
<p><span style="font-weight: 400;">Have you ever followed someone through an unmanned security checkpoint after they’ve blipped their badge at the door’s proximity sensor? If you have, you realize humans are, indeed, the weakest link in any security configuration. The same is true for cyber security. Non-vigilance can be very costly. How costly? Most sources estimate cyber crime is responsible for hundreds of billions of dollars each year. Juniper Research Ltd. predicts that by 2019, the total loss will be around </span><a href="https://www.juniperresearch.com/press/press-releases/cybercrime-cost-businesses-over-2trillion"><span style="font-weight: 400;">$2 trillion dollars</span></a><span style="font-weight: 400;"> globally. That’s </span><a href="http://databank.worldbank.org/data/download/GDP.pdf"><span style="font-weight: 400;">just north of Italy’s GDP.</span></a></p>
<h2><span style="font-weight: 400;">Not Just Cash at Stake</span></h2>
<p><span style="font-weight: 400;">Money is generally the motivation for cyber attacks, but there are non-cash losses that can be equally, if not more, costly. According to the </span><a href="http://www.hiscox.com/cyber-readiness-report.pdf"><span style="font-weight: 400;">2017 Hiscox Cyber Readiness Report</span></a><span style="font-weight: 400;">, it can take anywhere from hours to months for a firm to shore up defenses following an attack. Recovery time can represent an enormous cost to a company, as technology experts scramble to stop the bleeding and get back to business as usual.</span></p>
<p><span style="font-weight: 400;">Your customers trust you, your brand, and your product. A single cyber security breach can compromise it all overnight. The </span><a href="https://corporate.target.com/about/shopping-experience/payment-card-issue-faq"><span style="font-weight: 400;">Target payments network breach</span></a><span style="font-weight: 400;"> in December of 2013 cost the company $18.5 Million in settlements to 47 states (not Wyoming, Wisconsin or Alabama, in case you were wondering). And the settlements were eclipsed by the $202 Million in legal fees.</span></p>
<h2><span style="font-weight: 400;">Espionage to Gain an Edge</span></h2>
<p><span style="font-weight: 400;">“What’s my competition up to?” “It sure would be great if I could read the emails of my political opponent.” “I bet if I took this piece of code with me when I quit, I’d be really valuable to a competing firm.” Corporate data is closely-guarded for good reason. For some manufacturers, trade secrets are the only element keeping them in business. </span></p>
<h2><span style="font-weight: 400;">Who Are These People?</span></h2>
<p><img decoding="async" class="wp-image-2774 alignleft" src="https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity.jpg" alt="" width="400" height="267" srcset="https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity.jpg 1800w, https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity-300x200.jpg 300w, https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity-768x512.jpg 768w, https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity-1024x683.jpg 1024w, https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity-223x148.jpg 223w, https://news.elearninginside.com/wp-content/uploads/2017/09/securitybreach-cybersecurity-360x241.jpg 360w" sizes="(max-width: 400px) 100vw, 400px" /></p>
<p><a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/"><span style="font-weight: 400;">Verizon’s 2017 Data Breach Investigations Report</span></a><span style="font-weight: 400;"> indicates that while three quarters of cyber crime is committed by outsiders, “25% involved internal actors.”</span></p>
<p><span style="font-weight: 400;">The same report found that organized criminal groups are responsible for just over half of cyber crime. A staggering 18% of breaches involves nations infiltrating other nations&#8217;s systems.The 2016 United States presidential election is certainly indicative of the new normal that is state-sponsored cyber crime.</span></p>
<h2><span style="font-weight: 400;">How Does This Happen?</span></h2>
<p><span style="font-weight: 400;">Up your password game. Oh, and stop installing stuff you find in pop-up ads. 51% of breaches use something called “malware” as their vehicle.</span></p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-2775 size-medium" src="https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity-300x200.jpg" alt="Easy-to-guess passwords are magnets for cyber security threats" width="300" height="200" srcset="https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity-300x200.jpg 300w, https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity-768x512.jpg 768w, https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity-1024x683.jpg 1024w, https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity-223x148.jpg 223w, https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity-360x241.jpg 360w, https://news.elearninginside.com/wp-content/uploads/2017/09/mypassword-cybersecurity.jpg 1800w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p><span style="font-weight: 400;">These are small, programs that, once installed, can grab your data and activity. Not surprisingly, 66% of malware installs via malicious email attachments. And 81% of hacking-related breaches take advantage of stolen and/or weak passwords. So think of that the next time you decide to change your password to “Passw0rd!”</span></p>
<h2><span style="font-weight: 400;">What Are They Looking For?</span></h2>
<p><span style="font-weight: 400;">The majority (73%) of this crime is financially motivated, and about 21% of it is espionage-related. It just so happens the Kremlin’s hacking is of the financial AND espionage variety.</span></p>
<h2><span style="font-weight: 400;">How Can We Protect Ourselves?</span></h2>
<p><span style="font-weight: 400;">Lock systems down like your company’s assets and reputation depend on it (because they do). Invest in opportunities for IT personnel to remain current on keeping systems secure. </span></p>
<p><span style="font-weight: 400;">You&#8217;ll find the lowest-hanging fruit in training. Not the page-turner compliance variety, but real, meaningful, and engaging cyber security training. Start with a heavy dose of “what’s in it for me?” so that learners feel ownership and can get a sense of the huge effect, for good or for bad, that small actions can have.</span></p>
<p><span style="font-weight: 400;">Put your best instructional designers on this job and pair them with subject matter experts that have the time, knowledge, and attitude to advise on content. Also, continually update this training, as the cyber security landscape is constantly evolving. Open a communication plan to expose employees to cyber crime news stories.</span></p>
<p><span style="font-weight: 400;">It’s not a bad idea to launch mock attacks before and after training with different sample groups in your organization. Use one of these </span><a href="http://resources.infosecinstitute.com/top-9-free-phishing-simulators/#gref"><span style="font-weight: 400;">free mock phishing </span></a><span style="font-weight: 400;">simulators to test your learners. </span><span style="font-weight: 400;">If your team of instructional designers, subject matter experts, and facilitators has done the job, the numbers of duped employees should drop significantly. This is also a great way to demonstrate the worthiness of precious resource spend.</span></p>
<p><span style="font-weight: 400;">Lastly, stop thinking of cyber security training as an event or even a series of events. It’s a process of continual improvement with far-reaching ramifications.</span></p>
<p>The post <a href="https://news.elearninginside.com/dont-just-check-box-cyber-security-training/">Cyber Security Training &#8211; Don&#8217;t Just Check the Box</a> appeared first on <a href="https://news.elearninginside.com">eLearningInside News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://news.elearninginside.com/dont-just-check-box-cyber-security-training/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>3 Reasons Why Post-Secondary Online Learning is Absolutely Crushing it</title>
		<link>https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/</link>
					<comments>https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/#comments</comments>
		
		<dc:creator><![CDATA[Tim Coffey]]></dc:creator>
		<pubDate>Thu, 03 Aug 2017 22:33:35 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://news.elearninginside.com/?p=2408</guid>

					<description><![CDATA[<a href="https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/" title="3 Reasons Why Post-Secondary Online Learning is Absolutely Crushing it" rel="nofollow"><img width="150" height="150" src="https://news.elearninginside.com/wp-content/uploads/2017/08/postonlinelearning-150x150.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="" style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" loading="lazy" /></a><p>3 reasons why post-secondary online learning is absolutely crushing it   A few weeks ago I ran across a Twitter post that read, “1998: Don’t get in strangers’ cars. Don’t meet people from Internet.  2017: Literally summon strangers from the Internet and get into their car.” So true, isn’t it? It’s astounding how technology can […]</p>
<p>The post <a href="https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/">3 Reasons Why Post-Secondary Online Learning is Absolutely Crushing it</a> appeared first on <a href="https://news.elearninginside.com">eLearningInside News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<a href="https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/" title="3 Reasons Why Post-Secondary Online Learning is Absolutely Crushing it" rel="nofollow"><img width="150" height="150" src="https://news.elearninginside.com/wp-content/uploads/2017/08/postonlinelearning-150x150.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="" style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" loading="lazy" /></a><h1>3 reasons why post-secondary online learning is absolutely crushing it</h1>
<p>&nbsp;</p>
<p>A few weeks ago I ran across a Twitter post that read,</p>
<p>“1998: Don’t get in strangers’ cars. Don’t meet people from Internet. <img loading="lazy" decoding="async" class="alignright wp-image-2410 size-medium" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture1-300x192.png" alt="" width="300" height="192" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture1-300x192.png 300w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture1.png 477w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>2017: Literally summon strangers from the Internet and get into their car.”</p>
<p>So true, isn&#8217;t it? It’s astounding how technology can cause major shifts in behavior. What we will and won’t do, and certainly how we transact, interact, and learn.</p>
<p>If you’re old enough to have been conscious in the mid 1980s, you might remember a commercial where Sally Struthers peddled degrees in gun repair or child day care. To think that one could earn some sort of degree without committing to time in a classroom was a questionable if not laughable proposition.</p>
<p><img loading="lazy" decoding="async" class=" wp-image-2411 alignleft" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture2-300x225.png" alt="" width="381" height="286" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture2-300x225.png 300w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture2-230x174.png 230w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture2.png 436w" sizes="auto, (max-width: 381px) 100vw, 381px" />Here we are, 25 years later. Distance learning has not only surmounted the Struthers stigma, but we’re seeing a shift in the offerings at institutes of higher education. ELearning is the norm and learners of all ages expect learning to be at least blended if not entirely online.</p>
<p>Enrollment numbers at the university where I attended graduate school indicate a dramatic shift from classroom attendees to distance learners. So much, in fact, that the university recently made their biggest ever cut to staff and faculty positions. The reason was a downturn in student enrollment. The only area in the university still growing? Online learning. The same story is happening everywhere. So why has eLearning suddenly established so much traction at colleges and universities? Here’s some insight.</p>
<h3>Reason #1 &#8211; ELearning is efficient like a solar-powered car</h3>
<p>ELearning works in higher education for a lot of the same reasons it works in corporations. It allows us to achieve more with fewer resources. Well-executed synchronous or asynchronous deployment can be absorbed by learners at their pace without necessarily needing costly classroom space.<img loading="lazy" decoding="async" class="size-medium wp-image-2412 alignright" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture3-300x205.png" alt="" width="300" height="205" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture3-300x205.png 300w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture3-90x63.png 90w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture3.png 432w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Ask any corporate eLearning developer how they rapidly develop learning assets and you should hear something about “reusable learning objects.” This is a fancy name for the practice of cataloging chunks of content so that they may be used in future lessons. Spending costly development hours to build something that’s already built is wasteful. So as chunks of content are built, they should be tagged, organized, and cataloged for future use.</p>
<h3>Reason #2 &#8211; There are fewer college students</h3>
<p>Despite the economic strain a college education puts on families when our economy suffers a downturn, college-aged students tend to ride out the storm by burrowing deep in the nest of higher education. Caroline Hoxby, Stanford economist explains the phenomenon in,<em> How the Financial Crisis and Great Recession Affected Higher Education.</em> She explains that in spite of the fact that it’s even more of a stretch to pay for college during tough economic times, enrollment has gone up during every recession since the 1960s.</p>
<p>During times of economic strength, however, students are lured away from the books to pursue opportunities in the workforce that are too good to pass up.</p>
<h3>Reason #3 &#8211; ELearning fits with digital native expectations</h3>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-2413 alignleft" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture4-300x201.png" alt="" width="300" height="201" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture4-300x201.png 300w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture4-223x148.png 223w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture4-360x241.png 360w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture4.png 366w" sizes="auto, (max-width: 300px) 100vw, 300px" />If Millennials came out of the womb clutching a mouse and navigating a touchpad, it could be said that members of Generation Z were born texting, posting, sharing, and vlogging. And as unappealing as traditional classroom learning is to Millennials, members of Generation Z are far more likely to opt for non-classroom learning options.</p>
<p>Be sure to read Cait Etherington’s <a href="https://news.elearninginside.com/purdue-buys-kaplan-in-bid-to-expand-elearning/">article</a> recounting Purdue University’s acquisition of Kaplan Inc.</p>
<p>&nbsp;</p>
<p>In general, instructional designers in higher education have yet to fully incorporate some of the hottest modalities in the eLearning space. It’s only a matter of time before a college-level course includes things like complex branching scenarios, mobile learning, augmented reality (think Pokemon Go) and gamification. We should expect learning to become more organic and more akin to the types of learning students seek out on their own time.</p>
<p>The post <a href="https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/">3 Reasons Why Post-Secondary Online Learning is Absolutely Crushing it</a> appeared first on <a href="https://news.elearninginside.com">eLearningInside News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://news.elearninginside.com/3-reasons-why-post-secondary-online-learning-is-absolutely-crushing-it-2/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>3 Easy Microlearning Techniques to Grab Your Learner’s Attention</title>
		<link>https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/</link>
					<comments>https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/#respond</comments>
		
		<dc:creator><![CDATA[Tim Coffey]]></dc:creator>
		<pubDate>Thu, 03 Aug 2017 22:18:57 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<guid isPermaLink="false">https://news.elearninginside.com/?p=2415</guid>

					<description><![CDATA[<a href="https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/" title="3 Easy Microlearning Techniques to Grab Your Learner’s Attention" rel="nofollow"><img width="150" height="150" src="https://news.elearninginside.com/wp-content/uploads/2017/08/microlearning-150x150.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="" style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" loading="lazy" /></a><p>Type “microlearning” into your favorite word processing application. If you haven’t added it to your dictionary as I have, it’ll be flagged as a misspelled word. Suffice to say, microlearning is a pretty new concept.  Microlearning is just as it sounds – very short, and specific bursts of content – usually video – and usually […]</p>
<p>The post <a href="https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/">3 Easy Microlearning Techniques to Grab Your Learner’s Attention</a> appeared first on <a href="https://news.elearninginside.com">eLearningInside News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<a href="https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/" title="3 Easy Microlearning Techniques to Grab Your Learner’s Attention" rel="nofollow"><img width="150" height="150" src="https://news.elearninginside.com/wp-content/uploads/2017/08/microlearning-150x150.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="" style="display: block; margin-bottom: 5px; clear:both;max-width: 100%;" link_thumbnail="1" decoding="async" loading="lazy" /></a><p>Type “microlearning” into your favorite word processing application. If you haven’t added it to your dictionary as I have, it’ll be flagged as a misspelled word. Suffice to say, microlearning is a pretty new concept. <img loading="lazy" decoding="async" class="size-medium wp-image-2416 alignright" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture5-300x281.png" alt="" width="300" height="281" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture5-300x281.png 300w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture5.png 479w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>Microlearning is just as it sounds – very short, and specific bursts of content &#8211; usually video – and usually controlled by the learner. I imagine microlearning to be the greatest benefit to an acrophobic guy high atop his roof needing a tutorial on installing roofing shingles. “Please give me only what I need to know in as little time as humanly possible so I can get down. I’m scared.”</p>
<p>Structuring content into short bursts has huge advantages. First of all, learners don’t get bored. They don’t have time to. So the retention per second rate is likely to be really high.</p>
<p>It’s also ultra-portable. At only a minute or two in length, even high-quality video content won’t bust the bandwidth bank, and can be easily accessed on a mobile device.</p>
<p>It’s also a lot easier for a learner, who also happens to work full-time, to fit microlearning into a busy work day. Check out <a href="https://news.elearninginside.com/retailers-need-embrace-e-learning-overcome-challenges/">this article</a> by Sayantani Banerjee that illustrates microlearning’s advantages in a retail setting.</p>
<p>On the development side, microlearning is a really satisfying for developers. It’s far easier to manage updates to many tiny pieces of content than it is to hunt and peck for elements from one large course that needs updating</p>
<p>So now that we’ve established that rather than 24 minutes of content, we’re talking about more like 2 to 4 minutes, let’s look at three really easy techniques to deploy microlearning to your learners.</p>
<h1>Technique #1 &#8211; Video</h1>
<p>When our rooftop friend decided to do the work himself without hiring a contractor, he probably thought it would be super easy. Once he learned otherwise, all he had was his phone and two sets of white knuckles. He probably went to YouTube. It’s quick, and he knew he could probably learn what to do by watching someone go through the steps.</p>
<p>Video is more powerful than the best-written set of instructions could ever be. Short videos are also really easy for a learner to scan through. I’m a huge fan of those really short cooking videos. You know the ones where it’s just a set of arms doing all the prep with written instructions. “I don’t need to know the origin and history of the cassoulet – it’s 6:45 and my family is hungry. Show me the steps.”</p>
<h1>Technique #2 &#8211; Infographics</h1>
<p><img loading="lazy" decoding="async" class=" wp-image-2417 alignleft" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture6-287x300.png" alt="" width="174" height="182" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture6-287x300.png 287w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture6.png 448w" sizes="auto, (max-width: 174px) 100vw, 174px" />Without a cumbersome page-turning presentation, and lengthy monotonous narrator, infographics allow us to see data represented in a super-engaging and interesting way that often incorporates humor, color, and the opportunity to consume it in 3 minutes or 3 seconds.</p>
<p>Infographics fit very neatly into the microlearning category and work great as stand alone learning assets. They do require a good degree of fortitude in the area of visual design, so if you really want your infographic to have maximum impact, be sure to at least consult with, if not commission, an adept designer when planning your project.</p>
<h1>Technique #3 &#8211; Quizzes</h1>
<p><img loading="lazy" decoding="async" class=" wp-image-2418 alignright" src="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture7-281x300.png" alt="" width="195" height="208" srcset="https://news.elearninginside.com/wp-content/uploads/2017/07/Picture7-281x300.png 281w, https://news.elearninginside.com/wp-content/uploads/2017/07/Picture7.png 423w" sizes="auto, (max-width: 195px) 100vw, 195px" />Discover what Cosmopolitan magazine has known for decades &#8211; People love to answer questions and tally up results to gain insight about themselves. Short quizzes are super interactive, and with the promise of some result, the creator is able to gather really helpful information from learners while tapping into something called the “self-serving bias” – our innate desire to receive flattering information about ourselves.</p>
<p>Quizzes have the power to create a sense of urgency that purveyors of all sorts of products and services are always hoping to generate. And for the person taking the quiz, if it happens to be really fun and/or insightful, the quiz is likely to be shared on social media.</p>
<p>The post <a href="https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/">3 Easy Microlearning Techniques to Grab Your Learner’s Attention</a> appeared first on <a href="https://news.elearninginside.com">eLearningInside News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://news.elearninginside.com/3-easy-microlearning-techniques-to-grab-your-learners-attention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
