Cart 0
 

Programs | Learning Experiences


In this section, you'll find information on Inspire-Prepare-Succeed, JADE, the Digital Collaboration Framework and Roadmap, the LMS, and more!


Join the LX, Tech, and Innovation Community

This community of practice connects the global JA network with peer-to-peer learning related to JA learning experiences, technology, and innovation. Keep and eye on the community for upcoming learning opportunities, peer-to-peer webinars, fireside chats, and specialty training. Join the LX, Tech, and Innovation Community on Microsoft Teams today!


Inspire–Prepare–Succeed 

The JA network offers a rich portfolio of learning experiences to students around the world, both virtually and in-person. Advances in digital program delivery throughout the network have laid bare the need for an equally advanced way to serve JA students. Historically, JA offices have considered only student experiences that meet specific program-implementation models or standards, but with the evolving delivery and nature of JA programs, our network needs to be able to track these new ways of learning.

In response to advances in student experiences, digitization of programs, virtual program delivery, and the ever-growing list of JA learning experiences, we’re rolling out a new methodology for counting student experiences and measuring impact. We call it Inspire–Prepare–Succeed. The new methodology enhances and supports the global JA network, and enables a more transparent view of the diversity of JA’s offerings.

With Inspire–Prepare–Succeed, JA student experiences are broken down into three categories:

  • Inspire: Introductory learning experiences that pique a student’s interest

  • Prepare: Core learning experiences that build skills, attitudes, and competencies

  • Succeed: Applied learning experiences that demonstrate mastery of competencies in the real world

Inspire–Prepare–Succeed Video

The Inspire–Prepare–Succeed introductory video premiered at the January 2021 JA Global Town Hall. This video is intended for internal audiences, including staff and board members; it is not meant for distribution via social media. Download the video or view it on YouTube.

Video Translations

Interested in translating the video for your region or local area?

Questions about Inspire–Prepare–Succeed?

Contact Alison Gottsch-Walton with any questions related to Inspire–Prepare–Succeed. Contact Lorrie Noggle for any video-related questions.

If you’re not sure where your program fits, please use the form below to submit your question and program for review.


Digital Collaboration Framework

Technology has changed the way young people access, engage with, and share content. It has also spawned a larger cultural transformation tied to expectations about the ease and speed with which content crosses borders and its relevance for a broad community of consumers. Such cross-border expectations create a new opportunity—as well as a new challenge—for JA to reach students, teachers, volunteers, and other stakeholders.

Supporting and collaborating on technology innovation throughout the JA network will foster the production, sharing, and deployment of the widest possible variety of high-quality digital instruction, in order to support both in-person and virtual instruction that actively engages students. To address both opportunities and challenges we have created a new Digital Collaboration Framework (read or download the PDF) and Digital Collaboration Guidelines (read or download the PDF).

In addition, the LX (Learning Experience) Working Group is using an LX & Technology Roadmap as an ongoing working document. This file includes priority projects across all six ROCs and JA Worldwide to coordinate major development projects (see the current version here).

Contact Caroline Jenner with any questions related to the Digital Collaboration Framework and LX & Technology Roadmap.


Join the LX Tech AI Webinar Series

Did you miss the April 17 webinar on Learning Experiences and AI? Don’t worry, we’ve got you covered! The LX Tech team is excited to share the recording of the first in a three-part series that explores the intersection of AI and the Fixed, Flexible, Freestyle learning framework. In the first part of the series, our team delved into the fixed AI ethical principles identified by JA Worldwide, providing insights on how to apply these principles to enrich learning experiences. If you weren’t able to join the webinar live, we encourage you to view the recorded session to catch up on this valuable content below.

Part two of the LX Tech AI series is scheduled for May 7 at 8amEDT/2pmCEST/8pmHKT. Contact Alison Gottsch-Walton for more information.


JADE logo-02.png

JADE

What is the JA Data Experience?

The all-new JA Data Experience—or JADE—will replace Hewitt as the platform supporting the annual reporting process for the JA network. Using Microsoft PowerBI, JADE is built for flexibility to meet the varied needs of JA’s many stakeholders. With Increased Data Relevance as a JA Worldwide Strategic Priority, and the growing need to increase the frequency of data analysis in the network, JADE will help streamline data collection and enable easier access to data not only for annual reporting but provide robust analytics year-round.

Why JADE?

  • Support organizational Strategic Objectives and operationally driven decision-making

  • Fixed, flexible, freestyle reporting with tailored analytics, including impact score

  • Incorporation of Inspire–Prepare–Succeed classifications and regional and local key performance areas to better support collaboration

  • Integration with additional platforms such as Gather, worldwide census information, Program Central, and more to further JA global analytics

JADE Annual Reporting

JADE Guides and Resources

Global Reporting Starts July 3, 2023

With the new fiscal year comes the annual opportunity to report your data. Stakeholders, including funders and the general public, publish, distribute, and rely on your data, sharing it in strategic plans, annual reports and factbooks, websites, funder and grant compliance and reporting, and impact reports around the JA network.

An official announcement that the system is open, as well as materials and guides to help with the process, are coming soon. In the meantime, you can prepare by downloading a calendar reminder by clicking the button below.

Questions about JADE?

If you have process-related questions regarding JADE, contact Debbie Williams. For all other JADE questions, contact Erin Martin.


Take a Bite Out of Cybercrime

Multifactor Authentication (MFA) Registration Process

Introduction to MFA

Multifactor authentication (MFA) is an account-security measure intended to verify and confirm you are the person actively logging into your account. MFA and basic security defaults should be enabled for everyone. Identity-related attacks like password compromise, replay, and phishing are common in today's environment. More than 99.9% of identity-related attacks are stopped by using MFA and blocking legacy authentication. The goal is to ensure that JA Worldwide establishes a higher level of account security.

MFA RegistrationProcess

Users can register for MFA through multiple methods, as shown below.

  1. Log in to https://aka.ms/mfasetup

  2. Login with your email ID & password

  3. Users can either set up MFA with the Microsoft Authenticator App or a phone number.
    Recommendation: Users should register for MFA multiple ways (such as using both the authenticator app and a phone number) to enable a backup login method if one doesn’t work.

Reviewing Mail Rules and RSS Feeds

General Security Measures

Always make sure that your computer is running antivirus software approved by the IT department, as malware can be used to create malicious mail rules and RSS feeds or run malicious code that can grant remote access or leak data to an attacker.

Ensure you use secure passwords for all accounts. If any of your accounts have suffered a data leak, the IT Department should be notified and you must take further action, such as resetting the account password. Check if your account has been compromised at haveibeenpwned.com.

Finally, make sure you regularly update all your devices and software to ensure you are protected by the latest patches, which will help keep you safe and secure.

Mail Rules

Rules in Outlook allow you to automatically perform an action based on the characteristics of an incoming message. This tool can be used for a wide variety of functions; however, like any feature, it can be misused for malicious purposes. Some examples of malicious uses include . . .

  1. Email filtering and deletion: Malicious users can create rules that automatically filter or delete specific emails, such as those from competitors, whistle-blowers, or regulatory authorities. This can help them conceal important information or evade legal actions.

  2. Email forwarding: Attackers can set up a rule to automatically forward incoming emails, including sensitive or confidential information, to an external email address, potentially exposing sensitive data to unauthorized individuals.

  3. Email redirection: Like forwarding, malicious rules can redirect emails to another mailbox without the sender or recipient's knowledge. This can be used for corporate espionage or data theft.

  4. Phishing and spam: Malicious actors can create rules to mark legitimate emails as spam or move them to the junk folder, making it more likely users will miss important messages while tricking them into thinking malicious emails are legitimate.

  5. Spoofing and impersonation: By creating rules that automatically reply to or forward emails with misleading information, attackers can impersonate trusted individuals or organizations, potentially tricking recipients into taking harmful actions.

  6. Automatic reply attacks: Malicious rules can set up automatic replies with malicious links or attachments to anyone who emails the compromised account, potentially spreading malware or phishing links.

  7. Exfiltration of data: Attackers can use rules to systematically search for and extract sensitive information from incoming emails, which can then be collected and used for malicious purposes, such as extortion or fraud.

To mitigate these risks, every individual should review and audit existing email rules regularly to identify any suspicious or unauthorized configurations. If you find any such suspicious or unauthorized configurations, immediately report them to your IT team for further action and risk mitigation.

RSS Feeds

RSS (Really Simple Syndication) feeds deliver frequently updated content from websites, blogs, news sources, and other online publishers to users in a standardized format. RSS feeds allow users to subscribe to their favorite websites and receive updates automatically, often through a reader application or by email. While RSS feeds are generally a legitimate and convenient way to stay informed, they can be used maliciously in a few ways:

  1. Spreading malicious content: Malicious actors can create fake RSS feeds that appear to deliver legitimate content but contain links to malware, phishing sites, or malicious downloads. Unsuspecting users who subscribe to these feeds may inadvertently expose their systems to security threats.

  2. Phishing attacks: Attackers can use RSS feeds to distribute phishing content. They might set up feeds that appear to provide updates from a trusted source, but the links within the feed direct users to fake login pages or sites designed to steal sensitive information.

  3. Distributing malware: Malicious RSS feeds can contain links to infected files or exploit kits. When users click on these links, they may inadvertently download and execute malware on their devices.

  4. Content manipulation: In some cases, attackers may gain unauthorized access to legitimate RSS feeds and manipulate their content. This can involve injecting false information or inserting malicious links into legitimate feeds, potentially misleading or harming subscribers.

  5. Data harvesting: Malicious RSS feeds can collect user data. When users subscribe to these feeds, attackers can gather information about their preferences, interests, and reading habits for nefarious purposes.

To mitigate these risks, every individual should make sure they are signing up for legitimate and trusted feeds. Be cautious with links within RSS feeds, especially if they are from unknown sources or seem suspicious. Always verify the legitimacy of a source before clicking.

Make sure to regularly review your subscriptions and remove any that you no longer find useful or that come from untrustworthy sources.