PORTFOLIO_2016_ONLINE
-
Upload
kristin-ingersoll -
Category
Documents
-
view
25 -
download
0
Transcript of PORTFOLIO_2016_ONLINE
Kristin J. Ingersoll
Kristin Ingersoll ~ Resume
I am an Instructional Designer and e-Developer with a unique professional background. I bring national television production experience as well as a depth of instructional design experience. I’ve worked for large, Fortune 500
companies and small consulting companies and can work well in either environment. Most importantly, I truly love what I do and have found it to be a great blend of my creative streak, my enjoyment of people and analysis, and my
flair for organizing information so others can understand, retain, and apply it.
Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
Standard Pages – A Sampling
I used PowerPoint for storyboarding and Articulate Storyline 2 to develop the courses. The subject matter ranged, but most courses included interactivities designed to keep learners engaged.
Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
This was a multi-step activity to help students learn how to fill out a report.
For this exercise, I used layers, with a trigger to show “incomplete” if the user clicked NEXT before completion.
I also used button states with variables, triggered to display when the user entered incorrect information.
Interactive Activities
Kristin J. Ingersoll
Briljent: HEWLETT PACKARD ENTERPRISE
Learning Checks – A Sampling
External-facing courses for Medicare/Medicaid
providers are available here: http://provider.indianamedicaid.com/general-provider-services/provider-education/provider-
healthcare-portal-training.aspx
Kristin J. Ingersoll
OneAmerica: One Day is Today!
Course Designed for OneAmerica Sales and Marketing:
• eLearning developed using ReadyGo! Software• Introduced Sales and Marketing Representatives to resources
available to them for customer meetings• Embedded videos, links to website, best practice testimonials• Linked to resources on SalesForce
Kristin J. Ingersoll
OneAmerica: Distributions 101
Course Designed for OneAmerica Distributions Department – New Employee Orientation:
• Two Day Instructor-Led Course• New Employees sat at individual computers in lab• Instructor presented software, procedures, job aids• Each Pit Stop included quiz• Comprehensive Exam
Kristin J. Ingersoll
Briljent: 508 Transition Project - “Tips & Tricks”
Over 6,000 courses were transitioned to Section 508 compliance in 12 months.
The client, The Centers for Medicare & Medicaid Services (CMS) needed to make all eLearning courses Section 508 compliant. I led the effort to train the TQC department on 508 rules and regulations. I held ILTs, Lunch
& Learns, individual sessions, and sent out “Tips & Tricks” to answer FAQs.
Kristin J. Ingersoll
Foreign Services Institute: Storyboard for
“Classified and Sensitive Information”
Kristin J. Ingersoll
National Institutes of Health: Section 508
Text For “Security Awareness” Course
Graphic: A plane flies across screen with banner that says, ensuring IT security enables the N I H mission. A series of graphics appears starting with a woman at a computer with a thought bubble that says, I need access twenty four hours a day, seven days a week. Next is a man in front of a monitor with papers on table in front of him, with a thought bubble that says, I need to trust the analysis of my data. Next is a woman in a laboratory, holding a test tube, with a thought bubble that says, I need to protect proprietary formulas. Next is a man on a phone, looking at a folder of papers, with a thought bubble that says, I need to secure patient records.
Graphic: A laptop computer appears with a blank screen. Then, a warning text box appears with the words, Password Rejected, with boxes that say okay and cancel. Another warning appears that says, Starting Program Hijack, with boxes that say okay and cancel. A warning text box appears over the Hijack text with large text that says Alert. The computer screen is cleared of all warnings and text appears: What Happened?
There are four pop ups on this screen. The first is, Examples of Computer Incidents. When you click that link, a box opens with this text. Bullet 1: You think someone is using a computer without authorization. Bullet 2: Your files look like
someone has been tampering with the data. Bullet 3: Sensitive information has been disclosed. Bullet 4: Your computer is acting strange. Additional examples include: hacker attacks, suspected fraud, waste, or abuse of a system, web page defacements, inappropriate use, improper disclosure of sensitive information, inability to access your files, and theft of data (including disks). Report any case of theft to the NIH Help Desk. Users should also contact their local property representative for hardware theft and their ISSO for hardware and data theft.
The second pop up is, What Information Should be Reported? When you click that link, a box opens with this text: Keep notes on all aspects of the problem, for example: Bullet 1: Any computer messages, for example: You have received a virus. Bullet 2: What you were doing when the problem occurred. Bullet 3: Details on how the computer is acting. Bullet 4: Are others affected by the problem? Bullet 5: Was sensitive information involved? The third pop up is, N I H Help Desk. When you click that link, the contact information for the N I H Help Desk appears. The local phone number is 3 0 1 4 9 6 4 3 5 7. The toll free phone number is 8 6 6 3 1 9 4 3 5 7. The T T D phone number is 3 0 1 4 9 6 8 2 9 4.The website is H T T P colon backslash backslash I T helpdesk dot N I H dot gov.The last pop up is I S S O. When you click that link, the dictionary will open. The same definition that is on the main screen appears. I S S O is the acronym for Information System Security Officer. Each Institute and Center, or I C, has an I S S O to assist you with security policies, issues, and problems.
Kristin J. Ingersoll
Eli Lilly & Co: Needs Assessment – Training in Insulin
Manufacturing (Building105)
This Evaluation was completed for the Eli Lilly eMarketing Group. There was some concern that the general marketing population at Lilly has some misinformation regarding eMarketing and eTactics.
Tools employed to determine the needs and recommendations based on a Needs Assessment completed earlier in 2001 included this SWOTI Analysis. It compared the opportunities, threats, strengths, and weaknesses and their interactions.
Kristin J. Ingersoll
Westbrook Training
& DesignEngaging Minds; Animating the Ordinary; Creating User-Centered, Cutting-Edge Training Solutions
Analyze, design, and develop performance-based interventions.
These include:• Blended Learning• eLearning• Instructor-Led (including Instructor and Participant
Guides)• Self-study courses• On-the-job training workshops • Curriculum analysis and mapping• Design logos
Clients have included:
Valerie DeLaCruzSinger