balance protecting resources and providing access for student

28
COSN 2011 Balance Protecting Resources and Providing Access for STUDENT DEVICES Lori Gracey Kari Rhame Murphy

Upload: others

Post on 03-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

COSN 2011

Balance Protecting Resources and Providing Access for

STUDENT DEVICESLori Gracey

Kari Rhame Murphy

What devices do your students have now with which they can learn?

• Phones• Smartphones• Tablets• Mini-tablets• E-Readers• Gaming devices• Netbooks• Notebooks• Laptops

What is Driving Schools to BYOT?

• Decrease in Funding for Schools

• Consumerization in Technology

• Cloud Applications

• Parental and Societal Pressures

The Facts

• The National Educational Technology Plan 2010 lists “supporting efforts to ensure that all students and educators have 24/7 access to the Internet via devices, including mobile devices, and schools adopt technologies and policies to enable leveraging the technology that students already have.”

• Trend toward mobile learning is expected to accelerate according to the Horizon Report.

The Facts

• 78% of 8-18 year olds own an iPod or MP3 player, 66% own cell phones, and 29% own laptops (Kaiser Family Foundation, 2010)

• 75% of 12-17 year olds own cell phones (Pew Internet & American Life Project, 2010)

The Facts

• 62% of students prefer mobile devices over laptops/netbooks; they indicated that they would use mobile devices to better communicate, look up information on the web and be more productive in school (Project Tomorrow 2010)

• 83% of 15-24 year olds in the US identify themselves as advanced data users (Nielson, 2010)

Bene

fits

of T

hese

Tec

hnol

ogie

s • Equitable access to learning resources

• Extended time for learning – anytime everywhere

• Increased student engagement and achievement

• Improved student behavior and time on task

• Individualized learning for all populations

• Participatory learning and immersive educational experiences, games and simulations

Bene

fits

of T

hese

Tec

hnol

ogie

s • Situated learning such as on field trips, in museums and galleries, and via geocaching, with devices used to take photos and videos; record notes, lectures or presentations; and upload and share resources with others

• Formative assessments, through polls, questions, quizzes and tests, with interactive data collection, aggregation and feedback available immediately

• Blended learning, with formal, informal and self-directed learning opportunities

• Increased competency in 21st century skills, including communication, collaboration, critical thinking and problem solving, and proficiency with technology

“3G and Beyond: Smart, Mobile Devices and e-Readers” Spring 2010 EdTechNext

Pros and Cons of BYOT

PROS• Minimal school investment for

devices• Students don’t have to pay for

using minutes on their plans when schools provide wireless access

• Devices may not need to be integrated into the school network if using cloud computing to provide access to applications and services

• May be the only affordable option for broad-scale implementation

• Promotes student centered technology use, NOT teacher centered

CONS• Schools need to provide devices

for students without• Schools need to update

acceptable use policies• Devices have mixed screen sizes

and attributes and different operating systems, so may not be able to rely on local apps and need to find flexible Web-based apps

• Schools need a robust Wi-Fi infrastructure

• Schools cannot easily filter 3G/4G Internet access or manage voice/text use

Roadblocks to BYOT

Acknowledge the roadblocks in your district

Leadership/Policies

InstructionInfrastructure

Leadership and Policies

What are the attitudes of the instructional and support leadership in your entity?What policies need to be modified?

Steps of Leadership

1. Create the VISION– What is the leader’s vision for student learning?– How can BYOT make a difference in student learning?

2. COMMUNICATE the Vision and Need for Change

3. PLAN for the Change

4. Address the FUD (Fear, Uncertainty and Doubt)

Policies

• CIPA Requirements

• ERATE Requirements

• Legal and Local– Board Policy

– Acceptable or Responsible Use

• Student Code of Conduct

Infrastructure

How do you need to modify the infrastructure to support BYOT?

Technology Concerns – How to handle….?

• Bandwidth• Enforcing the security policy remotely• Authenticating users• Distributing security and application updates• Inspecting devices for software and hardware

inventories• Defending against viruses and malware• Encrypting stored data, removable media• Complying with regulations (FERPA and CIPA)• Filtering – where is the line?

Suggestions

• Increase bandwidth• Determine the filtering policy related to student

devices• Provide devices for students who do not have

resources• Segment the network creating a separate WAN or

VLAN for student devices• Provide a cloud computing solution for 24/7 access

for resources, content and student work

Mobile Device Management Considerations

• Multi-OS support• Remote lock of devices• Selective and remote wipe• Common pass codes and user authentication support• IT policy enforcement• Bulk configuration• Aggregated reporting• Remote control• Real-time alerts• Executive and security dashboards• Application inventory and management• Network access restriction• Malware or “jailbroken” device detection

Instruction

What pedagogies need to be modified?What professional development needs to occur?

Professional Development Facilitating BYOT

• Encourage teachers that they do NOT need to know it all and that they are NOT accountable for knowing it all

• Educate teachers to move away from software-specific assignments to skill-specific assignments

• Demonstrate to teachers and have them acknowledge how not everyone may be working on the same thing at the same time.

• Let them know the power of the devices in relationship to student learning

Classroom Management with BYOT

• BYOT takes more classroom management (monitoring)

• Have conversations up front with students –responsible and appropriate use, what to do when they are not available, punishments in alignment with the law

• Determine the pace of BYOT implementation in each classroom

• Being flexible and “in tune” with the learning that is occurring

Classroom Uses not Specific to Devices

• Ebooks (novels and textbooks)• Creative writing• Notetaking (Evernote)• Literacy skills (www.twitter.com)• Assessment (www.polleverywhere.com)• Collaboration (www.swaggle.mobi)• Sharing (Google docs, Dropbox)• Research (the web, www.chacha.com)• Video conferencing (Skype, Facetime)• Watch videos and podcasts• Language acquisition (recording and listening)

Put it into Practice Step 1

Partner up and create a two-sentence summary of what has been discussed so far and send that information to us………

[email protected]

713-545-9854

@KariMurphy

Put It Into Practice – Part 2

Share the summary with another group electronically

? Questions

Contact Information

Session Posted at http://bit.ly/hLSB7f

Lori Gracey, Executive DirectorTexas Computer Education [email protected]

Kari Rhame Murphy, Chief Technology OfficerDeer Park Independent School [email protected]

Resources

COSN(2010). EdTechNext: Flexible Mobile Platforms. http://www.cosn.org/Portals/7/docs/Ed%20Tech%20Next%20Reports/ETNFlexMobiles.pdfISTE (2007). NETS for Students. http://www.iste.org/Libraries/PDFs/NETS_for_Student_2007_EN.sflb.ashxKaiser Family Foundation (2010). Generation M2: Media in the Lives of 8- to 18-Years-Olds. http://www.kff.org//entmedia/upload/8010.pdfThe Nielsen Company. (2010). Mobile Youth Around the World. http://www.nielsen.com/us/en/insights/reports-downloads/2010/mobile-youth-around-the-world.html

Resources

Pew Internet & American Life Project. (2010). Teens and Mobile Phones. http://pewinternet.org/~/media//Files/Reports/2010/PIP-Teens-and-Mobile-2010-with-topline.pdf

Project Tomorrow (2010). Learning in the 21st Century: Taking It Mobile!http://www.tomorrow.org/speakup/MobileLearningReport_2010.html

Ullman, E. “BYOD and security: How do you protect students from themselves?” Tech&Learning (March 2011)