Technology Integration: Stuck in an Infinite Loop

IMG_20130807_124657_093

Recently, the advertisement above appeared in a national educational technology magazine.  I sent out a tweet, asking “Why would I want do this in my classroom?”  One response was, “You’re looking to create ICE in the classroom! Independence, Challenge, Engagement! Differentiated classroom with open objectives.”  I replied that I could do that with a book.

This is what “technology integration” looks like.  Doing the same activities with new objects.  Further why are we asking the student to convert digital content to analog content?  My guess is the student is completing a worksheet or “taking notes,” moving information from one place to another (Jamie McKenzie).

How did this hardware get there?  My standing hypothesis is that it’s not curriculum-related.  Some “influencer” attended a conference or other presentation, returned, and stated that “we have to do that.”  “Our students will be behind if we do not do that.” Peer pressure from other districts forced action.  The equipment was purchased, teachers were shown the switches, buttons and a few “apps.”  They were asked to brainstorm how to use the gear, asked to make a lesson, and sent back to their classrooms to “integrate the technology into their classrooms.”  There will be little results related to student learning.  There will be an assorted discussion about student “engagement” and “use of technology.”  Little or nothing about student performance and achievement.

The hardware and software are the fourth most important feature with classrooms and learning:

  1. What should students know and do?
  2. How will we know they understand and can do?
  3. What instructional strategies will we use?
  4. What hardware and software will we use to support the strategies, student learning, and student assessment?

Any framework for technology integration has levels of integration and districts attempt to move teacher practices to “higher levels.”

Starting with student learning and assessment, districts can determine their direction and their practices.  This will transform learning, by unleashing the promise of hardware and software.  Teachers are not left to figure it out themselves by “integrating technology.”

So until we get thoughtful leadership in our schools that quits talking about “technology as a tool” or “technology integration,” learning in school with hardware and software will be stuck in an infinite loop!

Online Learning Reading List

Bush, J. & Wise, B. (2010). Digital learning now. Tallahassee, FL: Foundation for Excellence in Education.

Cavanaugh, C. (2009). Getting students more learning time online: Distance education in support of expanded learning time in K-12 schools. Washington, DC: Center for American Progress.

Creative Commons (n.d.). Creative Commons. Mountainview: CA: author. Retrieved from http://www.creativecommons.org.

Dawley, L., Rice, K. & Hinck, G. (2010). Going virtual! 2010: The status of professional development and unique need of K-12 online teachers. Boise, Idaho: Boise State University.

EdTech Leaders Online program at Education Development Center, Inc. (2012). Discussion board expectations. Retrieved from http://courses.edtechleaders.org/documents/disc_expectations.htm

Gabriel, T. (2011). “More pupils are learning online, fueling debate on quality. New York Times. Retrieved http://www.nytimes.com/2011/04/06/education/06online.html?_r=3&hp=&adxnnlx=1302087708-EMsB5jdWPK44Az0g%20r/0Cw&pagewanted=all&.

International Association for K12 Online Learning. (2011). National standards for quality online learning, version 2. Vienna, VA: Author.

Illinois General Assembly. Remote educational programs. Public Act 097-0339, 2011.

Flora, J. (2011). Digital curriculum: Instructional and Administrative Strategies. Seattle, WA: Apex Learning.

Mackey, K. (2011). Implementing Aex Learning: A comparison of inline-learning programs in three school districts. Mountainview, CA: Innosight Institute

Maryland Online. (2010). The grades 6-12 edition of the Quality Matters rubric. Annapolis, MD: Author.

Patrick, S., Edwards, D. Wicks, M. & Watson, J. (2012). Measuring quality from inputs to outcome: Creating student learning performance metrics and quality assurance for online schools. Vienna, VA: International Association for K12 Online Learning.

Rice, K., Dawley, L., Gasell, C. & Florez, C. (2008). Going virtual!: Unique needs and challenges of K12 online teachers. Boise, Idaho: Boise State University.

Staker, H. & Horn, M. (2012). Classifying K-12 blended learning. Mountainview, CA: Innosight Institute.

Wagner, J. (2012). Pennsylania Cyber Charter School: Performance audit report. Pennsylvania Auditor General.

Watson, J., Murin, A., Vashaw, L., Gemin, B, & Rapp, C. (2012). Keeping pace with K12 online & Blended Learning: An annual review of policy and practice. Durango, CO: Evergreen Education Group.

Watson, J., Gemin, B. & Coffey, M. (2010). Promising practices in online learning: A parents guide to choosing the right online program. Vienna, VA: International Association for K12 Online Learning.

The William and Flora Hewlett Foundation. (2010). Education program: Strategic plan. Menlo Park, CA: author

Wise, B. (2010). The online learning imperative: A solution to three looming crises in education. Washington, DC: Alliance for Excellent Education.

A Different View of Digital Citizenship

design

Image Credit

Many digital citizenship programs focus on digital citizenship with students  with a list of “don’ts.”  The ideas below look at positive and proactive steps to consider citizenship issues with students.

In recent years, many blue ribbon committees have called for changes in schools to prepare children for their futures.  Globalization, competition, and new economies are dictating expectations to our schools.  The proliferation of new technologies allows students to communicate and collaborate with their peers.  While schools grapple with the implications of social networking, instant messaging, and cell phones, students need guidance from adults to use these power learning opportunities in appropriate ways.  In some cases schools need to intervene because students use technologies inappropriately.

Many professional societies, including the American Association of School Librarians (AASL), the Consortium for School Networking (CoSN), and the International Society for Technology in Education (ISTE), provide standards and goals for the implementation of technology in learning.  These standards include information literacy, collaboration, communication, and digital citizenship, among others.

This guide is to further focus on digital citizenship.

The standards for digital citizenship:

  • Manage a positive screen reputation and your personal safety
  • Protect the privacy of others
  • Value your relationships with others
  • Respect the ownership of intellectual property
  • Protect the technology you use at school and the library

Manage a positive screen reputation and your personal safety

Entries on social networking web sites, in microblogging networks, and in digital video collections are virtually permanent records of students’ lives.  A mistaken entry made as a teenage could negatively affect college acceptance, employment opportunities, or even future friendships.  It is essential that students manage their traditional reputations as well as their screen reputations.

Having multiple identities on the Internet may be unwarranted and confusing.  As students develop digital proficiencies, maturity and independence, their screen activities are likely to increase.  Part of managing a screen reputation is with a single identity (screen name).  This screen name can manage educational achievements and personal connections.

With a single screen identity, students should closely manage what they add to Internet sites as well as routinely checking search engines for their names to determine what is posted by others about them.

Meanwhile, students should manage their digital safety as strongly as they manage their personal safety each day.  Post only information that will not reveal home addresses, telephone numbers, date of birth, parents’ names, siblings’ names, and other information that could make a student a target.  This also means that students should never post provocative pictures of themselves, send such pictures through texting, or other means of sharing.

Protect the Privacy of Others

With digital technologies, students can easily share information and photos on social networking sites, phone texting, and peer-to-peer sharing.  While this possible, students should think whether this should be done.  Like personal information, never share another individual’s personal information without permission.  With photos, it’s best not to share them without permission of those in the group.  Certainly, it is not appropriate to share a photograph of others that may be embarrassing or put them into a position to explain their actions to others.  When unsure, ask for permission to share.

Value Your Relationships With Others

Forwarding embarrassing photographs, text messages, or email communication damages relationships is easy with digital technologies.  Resist the urge to share any information that might damage friendships or family relationships, or hurt others.  Common sense should tell students not to share anything about others without permission.

Respect the Ownership of Intellectual Property

Across the world, prosperity is gauged by ownership whether it be homes, office buildings, money, herds of animals, or publication of ideas.  Attitudes and laws have been developed about ownership of ideas expressed through writing, art, and music.  In learning environments, scholars give credit to other scholars through citations and attribution.  When ideas are quoted directly or paraphrased, the original scholar is given credit.  Additionally, scholars, artists, and musicians earn their incomes on selling their work.  Respect that work by purchasing legal copies.  Do not share your copy with others as it deprives the creator from payment.

Protect the Technology You Use at School and the Library

Your community has provided you with many places to learn and for recreation.  You have schools, libraries, and parks.  Leave these places in better shape than you find them.  At schools and libraries use the resources

with great care.  Computers, printers, and networks are expensive to install and maintain.  Share your computer time with others who are waiting.  Print only what you really need.  Maintain your personal storage devices, such as usb drives, so they are virus free.  Refrain from installing viruses or key loggers on computers.  In many states, computer hacking and other digital intrusions are serious crimes.

Regardless of a school’s view of technology applications, viewing citizenship activities as positive measures provides forward-thinking ways to apply important standards for students.

Web Filtering Feedback

Image Credit: Microsoft Clip Art online

I am working on a committee developing school technology “security” procedures.  We need feedback about web filtering standards.  (The Libertarian committee of my personality tells me that we shouldn’t have web filtering.  For those interested in understanding mindset theory see an analysis here.  My political committee member tells me that web filtering is required by politicians to answer the fears, whether justified, of parents about Internet in schools.  This posting is not to contribute to the debate about filtering, but rather inform schools how they can address the basic principles of its implementation.)

Here is the issue:  In developing a rubric about school technology “security” issues, how should we inform schools the various levels around web filtering.  The rubric includes many other issues.  This topic is one.  The rubric has four levels, already decided, and they cannot be changed.  Basic is the “lowest” level in rubric, advanced the highest.  The work of the group now has the following actions:

  • Basic:  — Web filtering has been implemented to meet the requirements of local policy, state laws, and federal laws.
  • Developing – Web filter logs are reviewed regularly to note use and determine adjustments in categories.
  • Adequate – Users can request modifications to web filter blocking for school use; requests are reviewed and action taken within 48 hours of request.
  • Advanced – School employees have overrides to web filter for school purposes.

What are we missing?  Please respond in the comment box below.