Presentation is loading. Please wait.

Presentation is loading. Please wait.

TAIBU ROBSON MAKUMBA (ZIMBABWE) THEORY AND POSTER PRESENTED BY LAST VIEWED NEXT SLIDE LAST SLIDE FIRST SLIDE PREVIOUS.

Similar presentations


Presentation on theme: "TAIBU ROBSON MAKUMBA (ZIMBABWE) THEORY AND POSTER PRESENTED BY LAST VIEWED NEXT SLIDE LAST SLIDE FIRST SLIDE PREVIOUS."— Presentation transcript:

1 TAIBU ROBSON MAKUMBA (ZIMBABWE) THEORY AND POSTER PRESENTED BY mr.taibu.robson.makumba@gmail.com LAST VIEWED NEXT SLIDE LAST SLIDE FIRST SLIDE PREVIOUS SLIDE END SHOW Flag of Zimbabwe courtesy of www.satooz.com

2 Contents Maslow's hierarchy of needs (1943) Bloom taxonomy theory(1956) Cognitive dissonance theory (Leon Festinger, 1957) Diffusion of innovation (E. Rogers, 1962) Bandura’s Social Cognitive Theory (1963)

3 Maslow's hierarchy of needs(1943) careersintheory.wordpress.com

4 Summary; Focuses on describing the stages of human growth and the pattern that human motivations move through.

5 Example If employees are worried about getting fired, with no job security, they will be concerned about friendship and respect. https://www.boundless.com/management/organizational-theory/behavioral-perspective/hierarchy-of-needs-maslow/www.boundless.com/management/organizational-theory/behavioral-perspective/hierarchy-of-needs-maslow

6 Reference Maslow, A. H. (1954). Motivation and Personality. New York: Harper and Row Maslow, A. H. (1943). A Theory of Human Motivation. Psychological Review

7 Bloom taxonomy theory(1956) Source: classweb.gmu.edu

8 Summary It is a classification of different objectives that educators set for students (learning objectives) http://www.businessballs.com/bloomstaxonomyoflearningdomains.htm

9 Example When I am in class I am attentive to the instructor, take notes but some of the ideas I have learned in my class differ from my previous beliefs.(UNC Charlotte)UNC Charlotte

10 Reference Bloom B. S. (1956). Taxonomy of Educational Objectives, Handbook I: The Cognitive Domain. New York: David McKay Co Inc Harrow, A. (1972) A Taxonomy of Psychomotor Domain: A Guide for Developing Behavioral Objectives. New York: David McKay

11 Cognitive dissonance theory (Leon Festinger, 1957) Source: www.zetterberg.org

12 Summary “ Theory suggests that we have an inner drive to hold all our attitudes and beliefs in harmony and avoid disharmony”. (Festinger 1957)Festinger 1957

13 Example “ It refers to a situation involving conflicting attitudes like when people smoke (behavior) and they know that smoking causes cancer (cognition )”.( Saul McLeod) Saul McLeod

14 Reference McLeod, S. (2008). Retrieved December 13, 2013, from Simply Psychology: http://www.simplypsychology.org/cognitive- dissonance.html http://www.simplypsychology.org/cognitive- dissonance.html Festinger, L. (1957). A Theory of Cognitive Dissonance. Stanford, CA: Stanford University Press

15 Diffusion Of Innovation(E.Rogers, 1962) Image courtesy of (worldhistoryreview.org )worldhistoryreview.org

16 Summary; “Diffusion is the process by which an innovation or any idea is communicated over a period of time among the members of a social system” (Rogers 1962, p. 79)Rogers 1962, p. 79 http://en.wikipedia.org/wiki/Diffusion_of_innovations

17 Example: connection of the theory “There is slow increase at first, then the adoption grows more quickly, but later slows down again when there is innovation. Laptops’ theft may increase with time” ( Roger Clarke). Roger Clarke http://www.rogerclarke.com/SOS/InnDiff.html

18 References Albertso, N. (2013). Laptop theft spreads across Pep campus. Graphic, 2. Michael, S. (2013, December). Anti-theft software aims to protect laptops. Gazette, 2. Wikipedia. (n.d.). Retrieved December 07, 2013, from wiki: http://en.wikipedia.org/wiki/Diffusion_of_innova tions http://en.wikipedia.org/wiki/Diffusion_of_innova tions (2009, february 15). Retrieved December 08, 2013, from Roger Clarke: http://www.rogerclarke.com/SOS/InnDiff.html http://www.rogerclarke.com/SOS/InnDiff.html

19 Bandura’s Social Cognitive Theory (1963) Source: www.emory.edu/EDUCATION/mfp/eff.htmlwww.emory.edu/EDUCATION/mfp/eff.html

20 Summary It is the explanation of behavioral patterns in human being. Source: http://www.utwente.nl/cw/theorieenoverzicht/Theory%20Clusters/Health%20Communication/Social_cognitive_theory/

21 Example A project was started to prevent alcohol use among students aged 11-13. Conclusion showed that less were likely to say they drank alcohol than others who did not join the program. Source: http://www.utwente.nl/cw/theorieenoverzicht/Theory%20Clusters/Health%20Communication/Social_cognitive_theory/

22 Reference Bandura, A. & Walters, R.H. (1963). Social Learning and Personality Development. New York: Holt, Rinehart & Winston. Bandura, A. (1997). Self-efficacy: The exercise of control. New York: Freeman Bandura, A. (2001). Social cognitive theory: An agentive perspective. Annual Review of Psychology, 52, 1-26.

23 Taibu Robson Makumba, Westlea, Harare, Zimbabwe (mr.taibu.robson.makumba@gmail.com) The use of E.M. Rogers’s diffusion of innovation theory to increase laptops security on AIU Students Problem Statement & Proposal Theoretical Application Assumptions / Assertions of the Project Projected Challenges & Solutions Thesis Statement Timeline and Implementation Strategy List of References Background & Urgency of the Problem Proposed Poster Design Summary of the Theory Sudden increase of laptop theft of AIU male and female students Hostel security has been breached. Insecure of AIU students’ laptops Sudden increase of laptop theft of AIU male and female students Hostel security has been breached. Insecure of AIU students’ laptops Diffusion of innovation theory is the perspective that can help us understand what and how people learn by observing others. It is also an important reference to help develop a program theory (Chen 1990). Diffusion of innovation theory is the perspective that can help us understand what and how people learn by observing others. It is also an important reference to help develop a program theory (Chen 1990). As a result of the increase of laptops stolen, l will create an informative poster in three days written in English with five pictures showing five ways of strict securing laptops of 768 worried male and female AIU students by installing one tracking system on their laptops (Mat Hanson, 2012 ).Mat Hanson, 2012 As a result of the increase of laptops stolen, l will create an informative poster in three days written in English with five pictures showing five ways of strict securing laptops of 768 worried male and female AIU students by installing one tracking system on their laptops (Mat Hanson, 2012 ).Mat Hanson, 2012 The application of diffusion theory to instructional technology is useful for examining how technological proponents can apply the diffusion of innovations theory to increase the adoption of technological programs in schools (Surry and Farquhar, 1997). Male and female AIU students can understand and follow the pictures shown on the poster as how the theory works. Male And female AUI students can read, understand short English written sentences. Poster can be the solution for the safe keeping of the targeted asset. A poster displayed on every notice boards in AIU room can increase awareness on laptop securing to reduce the number of thefts on laptops. Male and female AIU students can understand and follow the pictures shown on the poster as how the theory works. Male And female AUI students can read, understand short English written sentences. Poster can be the solution for the safe keeping of the targeted asset. A poster displayed on every notice boards in AIU room can increase awareness on laptop securing to reduce the number of thefts on laptops. Some students do not check anything on the notice boards. Solution - pursued them on Facebook to look on the notice boards as there will be educative information (Heather Wolpert ).Heather Wolpert I may not get help through funding. Solution – make a proposal to the suniversity. Unfamiliar with software instillation. Solution: contact me for any help regarding the installation (Jack Herrick).Jack Herrick Some students do not check anything on the notice boards. Solution - pursued them on Facebook to look on the notice boards as there will be educative information (Heather Wolpert ).Heather Wolpert I may not get help through funding. Solution – make a proposal to the suniversity. Unfamiliar with software instillation. Solution: contact me for any help regarding the installation (Jack Herrick).Jack Herrick Male and female AIU students can follow in the morning, afternoon and at night the informative poster about laptop safeguarding, tracking and maintenance (Mat Hanson, 2012) with four pictures to safe keep their laptops every day.Mat Hanson, 2012 Male and female AIU students can follow in the morning, afternoon and at night the informative poster about laptop safeguarding, tracking and maintenance (Mat Hanson, 2012) with four pictures to safe keep their laptops every day.Mat Hanson, 2012 Day 1: search and select relevant pictures Day 2: Design and editing the picture Day 3: Create the poster Day 4: Check for mistakes and rectify them Day 5: Stick the poster to the walls Day 6: Reading and following the poster Day 7: Evaluation of people reading it Day 1: search and select relevant pictures Day 2: Design and editing the picture Day 3: Create the poster Day 4: Check for mistakes and rectify them Day 5: Stick the poster to the walls Day 6: Reading and following the poster Day 7: Evaluation of people reading it Wikipedia. (2013). Retrieved December 2013, 2013, from wiki/Everett_Rogers: http://en.wikipedia.org/ wiki/Everett_Rogers Albertso, N. (2013). Laptop theft spreads across Pep campus. Graphic, 2. Michael, S. (2013, December). Anti-theft software aims to protect laptops. Gazette, 2. Wikipedia. (n.d.). Retrieved December 07, 2013, from wiki: http://en.wikipedia.org/ wiki/Diffusion_of_innov ations Wikipedia. (2013). Retrieved December 2013, 2013, from wiki/Everett_Rogers: http://en.wikipedia.org/ wiki/Everett_Rogers Albertso, N. (2013). Laptop theft spreads across Pep campus. Graphic, 2. Michael, S. (2013, December). Anti-theft software aims to protect laptops. Gazette, 2. Wikipedia. (n.d.). Retrieved December 07, 2013, from wiki: http://en.wikipedia.org/ wiki/Diffusion_of_innov ations G05 SHL1013 Professional English ( 14 December 2013) 9 Steps to Something Title Here Insert Subtitle or Slogan or Catchphrase Here If Any Main Image Here Image Here Always keep ones laptop on the lock security cable. Install a wireless security so that one can see where it will be anytime. Lock the laptop in a secure place.making sure the security of that place is not easy to break through it. Put a password that is not easy to figure out. This will keep the laptop safe in case a theft tries to open the laptop before stealing. FOR MORE INFORMATION, CONTACT Insert explanatory text here if any. Insert explanatory text here if any 1 2 3 4 Methods and Procedures Gathered information about the audience and information I am to give the audience Select attractive pictures and words to get the attention of the audience Choose way of designing the poster Select and launch PowerPoint Choose slide layout and theme Add title, pictures and information on the PowerPoint Finalize the poster by editing the size and adjusting the boarders and using graphics to give an impact on the poster Produce the posted by printing it Check again the spellings and format of pictures and words Correct the poster if there are any errors and reproduce it again If there are no errors paste it on all the notice boards around AIU Check the number of people checking it and spending their time reading and following it Gathered information about the audience and information I am to give the audience Select attractive pictures and words to get the attention of the audience Choose way of designing the poster Select and launch PowerPoint Choose slide layout and theme Add title, pictures and information on the PowerPoint Finalize the poster by editing the size and adjusting the boarders and using graphics to give an impact on the poster Produce the posted by printing it Check again the spellings and format of pictures and words Correct the poster if there are any errors and reproduce it again If there are no errors paste it on all the notice boards around AIU Check the number of people checking it and spending their time reading and following it Image Here Install a tracking system on the laptop making sure one tracks his or her laptop’s location. About the author and designer Taibu Robson Makumba is a full scholar at Albukhary International University in Malaysia, majoring in Bachelor of Banking and Finance. He did his Ordinary and Advanced level education from 2009 to 2012. He is highly motivated by solving challenges and new opinions or ideas. In whatever he does, he does it with the aim of succeeding. Strong and good leadership ability also makes him someone who likes to make things easy for his friends and colleges and does not like to see them suffer. So as an Albukhary International University student, he was highly driven to remind his fellow students to secure their laptops as the number of laptops being stolen at the university had increased intensely. – Tania Allan (Vanuatu)


Download ppt "TAIBU ROBSON MAKUMBA (ZIMBABWE) THEORY AND POSTER PRESENTED BY LAST VIEWED NEXT SLIDE LAST SLIDE FIRST SLIDE PREVIOUS."

Similar presentations


Ads by Google