This week you read Chapter Seven: "Commonsense Practices for Safe and Ethical Technology Use"
The
focus of Chapter 7 is Internet safety. You have already completed an
assignment that allowed you to create an activity for your students to
learn about Internet safety. Hopefully, this chapter will give you
ideas for other lessons you may want to create about Internet safety and
maybe even spark some ideas or concerns that you had not thought about
when you created your Web poster assignment.
This week’s reading is from Chapter Seven from the book The Classroom Teacher’s Technology Survival Guide called Practices for Safe and Ethical Technology Use. In this chapter we will learn about the safe and ethical ways that teachers can help educate students on how to protect themselves while using technology. This is not only applicable for students, it is important for teachers and parents to use this information as well. According to Doug Johnson, “when students use technology, especially information technologies that consist of computers and computer networks, they are operating in a different world: a virtual world in which behaviors may not be as easily judged to be right or wrong” (page 156). In this situation for anyone using technology it is important to change the technology situation into something that happens in the real world. An example is let’s state someone is on the computer and is downloading illegal music, that is just like someone that goes into a music store and shoplifts a music CD. It may be hard the think of what is right or wrong, but connecting it to something non-technology oriented will help you or the student acknowledge right or wrong.
ReplyDeleteThere are many ways to stay safe and make ethical choices, but in this modern day students are using technology is many unethical ways. According to Doug Johnson, adding to the tension are stories in the media of young people ‘sexting,’ hacking into computer files, viewing online pornography, and placing themselves at risk by corresponding with strangers online” (page 149). Doug Johnson talks about six ways that teachers can teach children how to use technology safety. The first is hardware safety and this is a way for technology to be protected by not being stolen or damaged. A way for this to occur is locking your computer in a secure place and having a safeguard to make sure that the data on your computer is safe. The second is passwords and this is a difficult one because the only way to make sure they are safe is with multiple passwords for different software. The third is having backups for every document that you have on your computer because what if your computer crashes. The forth is viruses, this is a worldwide problem and it should be taught not to open anything not familiar to you. The next two work the same it is data privacy and personal privacy it is important to take every precaution to keep yourself safe as well as your school by following the specific guidelines. In the end students will need guidance from teachers to acknowledge how to keep yourself safe as well as what is ethical to be searching on the computer.
Johnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. Jossey- Bass: CA.
Stephanie, you make a good point about it is hard to know what is good or bad when it comes to technology in the classroom. That’s why it is important that our administration has rules in place and provide the educators with the proper tools in the classroom. When the teachers are going over the rules and guidelines stressing the importance of how these are in place to keep the students from venturing into unsafe places while surfing the web at school. Just because we use software that keeps certain sites off our school networks does not mean a student cannot find other wat to visit that site. Thanks for posting, Crystal.
DeleteGreat read sometimes when young children as well as older ones come in contact with technology they seem to disregard the safety and the harmful part of using technology. they disregard the viruses, they avoid pop-ups and just click without inquiring if the site is safe to log onto. so far I am still nervous about using technology because of hackers and the tedious features that you have to aware of.
DeleteI had a bad experience a few years ago. You have to be careful of the sites you access because you can get viruses from these sites very quick. This chapter talked about downloading from people you do not know, sometimes you think it is legitimate and it is not.Viruses can cause big problems and a lot of money. Passwords are becoming a problem, they don't want you to keep it simple. If I need guidance I know students need guidance because technology is always changing.
DeleteAfter reading chapter seven of Doug Johnson’s The Classroom Teacher’s Technology Survival Guide, I feel like it is so important for teachers to address web safety with their students. Johnson explains that some of the responsibility falls on the teacher when it comes to keep passwords protected. Johnson recommends keeping passwords secret and changing them frequently to protect the privacy of your students (Johnson, 2012). I am guilty of waiting to long to change my passwords, but I had never been strongly advised to do so. It makes sense now that I think about it, but I don’t know how many programs make it a point to suggest doing so.
ReplyDeleteAside from this, the teacher has a job of informing students of what is safe on the Internet. Johnson mentions a girl who starts to talk to people through a chat room (Johnson, 2012). I think this is an extremely important issue, and more teachers should be warning students about the dangers of contacting people through the Internet. Teachers need to address the fact that people really don’t know who is on the other end of the conversation. Even if these things aren’t happening at school, students still go home to use computers. If teachers may be preventing a tragedy from happening just by informing students of the dangers chat rooms have.
Johnson also mentions cyber bullying. He states that this is a growing issue, and it has been proven that victims can suffer from psychological damage due to cyber bullying (Johnson, 2012). This is an issue that teachers need to make sure they address. It is so easy for people to use phones and social media to target someone. They don’t even have to deal with seeing how the things they have said has hurt another person. This has been an ongoing issue in many school districts, and I have seen students get suspended for cyber bullying. Therefore, teachers need to start treating this as a real problem. I’m not sure how this issue should be taught, but I think the nation needs to consider requiring students to take a course on the affects of cyber bullying. It has given bullies the ability to hurt some else at any time of the day. When students can’t even feel safe in their own homes, then the nation has a problem. I think this has played a big role in teen suicide. As educators we need to make sure our students feel safe as often as possible.
References
Johnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. San Francisco, CA: Jossey-Bass.
I have to admit that I typically only change passwords when the site says that I have to change them. I agree about the cyber bullying as well. I know the school I work for does a lot of anti bullying, but I think that cyber bullying also needs to be addressed.
DeleteKaylie, As educators we have so much happening in our classrooms. Our students come with cellphones, tablets, and other tech gadgets that keep them distracted from the day’s lessons. So we learn to become flexible in our lessons to include technology into the classroom. However, that flexibility comes with responsibility too. We have to ensure that our lesson plans that includes technology are pre planned and secure for our students.
DeleteEducators, who have older students can prepare lesson on social media safety, online bullying and chat rooms. As you said, “Even if these things aren’t happening at school, students still go home to use computers. If teachers may be preventing a tragedy from happening just by informing students of the dangers chat rooms have”. Greta post. Thanks for sharing, Crystal.
Hi Kaylie,
DeleteI completely agree with you about informing our students and updating policies on cyber bullying. Not just the students, but like you said the whole nation. It seems like every time I turn on the news there is another young child, child because that’s what they are, who takes their life because of cyber bullying. To get bullied in school and find no escape when you get home, I can’t imagine the torture. Hopefully like everything else, we are able to treat this issue like anything else and enforce stricter policies because it is present whether we want to admit it or not, cyber bullying is taking too many children away from their families. I just hope sooner rather than later, technology usage is a great responsibility and we should teach students such. Good post.
Kaylie,
DeleteYou are correct when saying the teachers job is making sure the student’s know what is safe on the computer. The most important is letting the children know about stranger danger because for students they are not knowledgeable about people lying about who they are. Where I used to work cyber bullying started occurring and as a teacher I was the one to let the students know what was going on and that it is not a good thing to do yourself. Think of how you were when technology first came out, that is how students are, but it is more dangerous to them due to cyber bullying and stranger danger.
Hello Kaylie,
DeleteLike you I am not good at changing my passwords for my files and online accounts, however, as a student going into the education field I am now aware that this is something I need to take more seriously and practice doing more. I agree with you that as educators we need to take some responsibility of teaching the students about web safety. With the increase of social media, online dating and cell phone apps, its so easy for predators to disguise who they are without really knowing. Teaching students about importance of personal privacy, stranger danger, and TMI can help in protecting them against these predators.
Hello Kaylie,
DeleteCyberbullying is a very serious matter. Students have committed suicide or even harm themselves because of what another student have posted about them on the internet. Teachers have to take this matter seriously just as if a person was being bullied physically. I agree that policies should be in place to protect children from cyberbullying and they should get suspended or even expelled if this behavior becomes out of control.
I am a living witness of being hacked and having to change my password 2 this year to my email address. I know the feeling and its not a good one. I totally agree with you stating the teacher should go over the do's and don'ts of using technology. It very important and it will help with of safety measures.
DeleteKaylie,
DeleteYou are not the first to mention teachers discussing computer safety with their students. This is really important because students need to be aware of all possibilities while using technology. I am guilty as well of never changing my passwords. So we also need to practice what we preach. You make great points about cyber bullying. It is a big deal to teach our children especially students learning in the 21st century.
Last week I found a couple sites that I thought were really good for teaching children about Internet safety. What none of those sites really mentioned were ethics. They did mention that if the student finds something that makes them uncomfortable they should tell the teacher but it didn’t really mention anything else. Johnson discussed how ethics have changed over the years. He states that in the past children would bring in magazines that weren’t school appropriate and now they can download something to a computer or have it on their phone and share it that way, or how in order for a child to change their grades in the past they would have to get onto their teacher’s computer and now they can copy a software program and create a new report card with better grades. I think when working with children we have to also teach them how to be appropriate on the computer and what is appropriate. Johnson has three rules for privacy, property, and appropriate use that I think teachers really need to work into a lesson. When you are teaching children to safely use the Internet we also have to teach them how to teach them how to use the computer appropriately. I think there are a lot of things teachers can do in order to help children learn what is appropriate. One of things that teachers need to also teach children about sharing to much information, through pictures and text. Facebook, Twitter, SnapChat, Instagram are all very popular and children need to learn what they put out there can be seen and even if they don’t share personal information all at once it can be pieced together and needs to be shared. He also talks about cyber bullying. In the schools that I work at we talk a lot about being anti bullying and working towards standing up against bullying, but now we also have to teach children how to stand up against cyber bullying. While teaching children all of these different things, we as teachers need to remember to model the behavior and keep in mind that they are kids and mistakes will happen. By reviewing this information with the children and making sure they completely understand everything about computer safety and ethics we can make sure they understand all of the material so that they know how to be safe online and how to use good ethics while online.
ReplyDeleteResources
Johnson, D. (2012). The classroom teachers technology survival guide. Hobeken, NJ: Jossey-Bass
Hi Amanda,
DeleteI also found this chapter to be very informative and serve as a reminder that its not just academics that we need to teach our students. We have to also teach our students about being safe while on the Internet. For as much as technology is beneficial, it comes with its drawbacks. Everything can be uploaded in the blink of an eye and shared with countless users. Students tend to forget that, once something is up, it is up there for good. I don’t think as a society we have taken into account the damage that technology can do for our young students, cyber bullying and such. My hope is that in the near future we have policies that will have students and people as well, think twice before damaging the lives of others. Good post.
Amanda,
DeleteThe one question that I do have for you is what if the students do not know what is appropriate? It is not that they do not have any ethics they are learning about their own ethics and need to be taught right or wrong. Such as if a student is on the computer looking for just a funny picture, but it comes across as pornography. The student might not know that it is not appropriate to show that to other students. If this occurs it might be best to get everyone involved in the conversation letting the know that pornography is ethically wrong and should not be shown or researched on the internet.
Hello Amanda,
DeleteYou bring up some very great points that Johnson mentions in this chapter. The way children socialize, date, communicate, etc. is so technologically advanced, and while children are use to these new technologies, they arent very aware of the dangers that may be lurking behind them. As teachers we need to model and teach our young students what sharing too much information or photos with strangers can do. I am also glad this chapter speaks about cyber bullying. This is another form of bullying that has taken over students all over the world. Children feel like they are able to tear each other down with their hurtful words behind a computer which is causing more cases of suicide among young students. Like your school, i think every school should support and teach about anti bullying to their students.
Hello Amanda,
DeleteI agree students should be taught about sharing information on the internet. They have to understand that once that information is put out there it accessible for anyone to see. So they have to be careful of what they say and the pictures they put up on social media because it can hurt their future opportunities.
I concur, when I read your post I thought I was talking to my own children. my mouth dropped, I love to model whats being to said because actions speak louder than words. I feel No type of Bullying is okay, Using social media is the worst and will damage anyone and lead them to second guess the postive things in life.
DeleteHey Amanda,
DeleteI loved this chapter because it talked about all the issues that are sometimes always not mentioned or talked about. I don't remember my parents or my teachers tell me about internet safety. I think it is important. how do you think schools should handle cyber bullying?
In reading chapter 7 in our text “ Commonsense Practices for Safe and Ethical Technology Use” it stresses that teachers should talk to students about ethical online conduct and set clear limits about what is allowed and what is not allowed. Teachers need to be knowledgeable about the school’s Acceptable Use Policy and work to help their students understand it. A district’s current acceptable use policy should include language about posting private information about both oneself and others. This private information includes home addresses, telephone numbers, e-mail addresses, and labeled photographs. Any bullying policies should cover electronic bullying as well as physical bullying. These things are very important to keep students safe especially when it comes to use of technology.
ReplyDeleteThere were three things that stuck out to me in this chapter which was Stranger danger, Cyberbullying and TMI. Stranger danger is protecting children from predators. Not only do children need to be protected from predators while walking home from school but also from them when they are on-line too. According to the text “ The National Center for Missing & Exploited Children, approximately one in seven youths (ten to seventeen years old) experiences a sexual solicitation or approach while on-line, and the Center warns parents about the possibility of physical abduction of their children”(p.162). It is key to teach students not to talk to anyone they don’t know on line just like they would do if a stranger who tries to talk to them physically.
The second thing was Cyberbullying. Cyberbullying is just as bad as bullying someone physically. So many students have committed suicide and gotten hurt because of cyberbullying. According to the text “there are documented instances in which such activities have resulted in severe psychological damage to the victim” (p.162). When a person is being cyberbullied they are getting malicious and cruel texts or images using digital forms of communication. This can be even more harmful because these messages can be sent to everyone with just a push of a button on a computer. Students need to know this is not allowed, be protected from it with policies and procedures that are put in place by schools.
The third thing was TMI. TMI means too much information. Teachers protecting children from themselves. A lot of times children are not aware of how much it can hurt themselves in the long run posting pictures and messages that are inappropriate on the internet. According to the text “ This information is then found and viewed by teachers, coaches, relatives, college admissions officers, and potential employers”(p.162). Children have to understand that once you placed things on the internet and it is made public it has the potential of always being accessible which can stop future opportunities.
In today’s society technology cannot be avoided. Technology has taken over the world and as teachers we must enforce safe and ethical technology use. It is our job to keep children safe and ensure that they want put information out on the internet that can cause harm to them or others.
Chapter 7 was all about what the title says, commonsense practices for technology use. For as much as we teach students about the outside world, another we must pay attention to is the Internet. Johnson (2012) states, responsible teachers understand that knowing how to use technology both ethically and safely is a critical 21st century skill for their students and for them (p. 149). We can’t shelter our students for as much as we want to; we must address what the real world looks like and prepare them to encounter such things that will come their way. I am especially fond of this approach, as teachers and parents we cannot always keep a watchful eye on children. We should be able to teach them and give them the responsibility and tools that are necessary in order to be safe online, it is our moral duty to do so.
ReplyDeleteJust like I mentioned before, we are doing our students a disservice when we do not teach them about the proper ways to navigate the Internet. Like Johnson (2012) mentioned, even if social networking sites are blocked, most students will still get access to them (p.162). It is a battle that we will have trouble winning. I often wanted to do what was forbidden when I was younger and that is the mentality that our students have. Pioneering and creative teachers are finding ways for students to interact with the Internet in not only an appropriate manner but also an educational way as well. An idea that Johnson mentioned was creating a fake profile for literary characters, an idea that I would have appreciated when I was in school. I believe it takes it above and beyond and makes such things more relatable to our students.
Johnson then continues his chapter with a list of things that students need to understand when it comes to technology usage. He mentions that responsible teachers recognize that schools must give students the understanding and skills they need to stay safe- not just in school but also outside of school (Johnson, 2012, p. 163). His lists includes ensuring students know about the policy in place when it comes to using the Internet at school, setting guidelines rather than rules for easier understanding, teachers modeling desired behavior, building student trust in the event that something does occur, and much more. He ends the chapter with guidelines for teachers as well. Just as it is important for our students to know appropriate usage it is crucial that we know as well. There have been many cases where we see adults abuse those privileges because they forget their commonsense. In this day and age everything is under surveillance, just as we behave out in the world, we must also behave on the Internet and that goes for all.
Reference:
Johnson, D. (2012). The classroom teacher’s technology survival guide. San
Francisco, CA: Jossey-Bass.
I agree with your post. We definitely need to be teaching safety while being on the Internet. We cannot protect our children or students forever. We have to use technology to our advantage but also teach the dangers of what people do online. Teachers can be creative in doing so. Just as we teach our children to be aware of their surroundings because of the dangers in this world, we need to teach students how to use common sense when navigating through the Internet.
DeleteExactly, we have to stop sheltering children kids and inform them. Whether we like it or not, we can't control what they see online. Like the text stated, we don't just have to worry about Stranger Danger on the streets but online as well.
DeleteLast week, we had an assignment which focused on help our students learn important facts about internet safety. This week Johnson discusses some additional facts about safe and ethical technology use that can beneficial both for students and teachers. As teachers, we are given technology tools to help give our students the 21 century skills that are asked of them by today’s society, yet with these new technologies come the confusion and unknowing of how to use them safely or teach how to use them safely. “Responsible teachers understand that knowing how to use information technologies both ethically and safely is a critical 21st century skill for their students and for them.” (Johnson, 2012, p.149).
ReplyDeleteJohnson begins the chapter by discussing safety practices for teachers as technology users. He recommends a few critical things to practice in the classroom to keep your data, student documents, and passwords private. These recommendations I think are common tips that every teacher should know, yet unfortunately some do not. Ideas like changing your password on the regular, purchasing all hardware through the district, having homeowners’ insurance on your computer if its lost or damaged, and maintaining regular backups of school files in case of an unexpected event like water damage, or your hard drive crashes, will help create and sense of less worry if something were to happen to all of your data files for the school year. All teachers should be aware of these tips and can most likely find them and more in their school districts security manual.
Johnson then mentions his three rules of technology ethics which are: Privacy-“I will protect my privacy and respect the privacy of others”, Property-“I will protect my property and the respects the property of others”, and Appropriate use-I will use technology in constructive wars and in ways that do not break the rules of my family, faith, school, or government”. All teachers and staff within the school district should be aware of these guidelines and rules, and be able to teach, understand, and model them to their students. “As the use of information and technology spreads throughout society, and its importance to our national economies and individual careers grows, everyone will need to make good ethical decision when using computers.” (Johnson, 2012, p.158).
The discussion of stranger danger, cyberbullying, and TMI (too much information), is also mentioned in this chapter, and are important for students to understand and be more aware of. Stranger danger is a safety precaution to keep student’s safe from predators. Predators use social networking to approach and even attempt to abduct young vulnerable children. Students need to be taught to keep their social networking site private and not to talk to anyone they do not know or give out any personal information to strangers. Cyberbullying is just as bad, if not worse now days than bullying in the school. Children feel like they are safer to bullying others with their words because they are hiding behind the computer. In all actuality, their words are hurting others more than they think and have cause many cases of suicide and depression. Schools and families need to set policies and disciplines for cyberbullying to protect the children from each other. TMI is protecting children from themselves. While posting pictures and sharing your location may be the newest and coolest thing to do in todays world, children need to be aware of how dangerous sharing too much information can be. They need to be aware that sharing things like your location, phone number, photos, place of work, only helps predators find where you are and information about you that no one but your parents, teachers, and close friends should know.
Johnson, D. (2012). The classroom teacher’s technology survival guide. San Francisco, CA: Jossey-Bass.
Jennifer,
DeleteJohnson has given us teachers some great tips on practicing safety and ethnical technology use. For the 21st century skills, teacher need to have a day-to-day security guide which involves the security of the hardware, protecting passwords, having backups, and data and personal privacy.
It is extremely important that our students understand the how to be safe while using the Internet to avoid any dangers that can be associated with being online. Both the teachers and students need to be ethnical and view it as if you were socializing in person. We teach students not to talk to strangers and Stranger Danger is about to protect children from predators while on social media. Teacher should monitor as they use technology as they educate students within the classroom.
Summary:
ReplyDeleteAfter this weeks required readings, Johnson (2012) begins discussing in chapter 7 the “commonsense practices for safe and ethical technology use.” (p.149). I knew this chapter would be interesting, because in today’s century kids see everything through social media. So many young children have access to social media through computers, phones, tablets, laptops, Ipods, and television. Nothing is safe to hide anymore for our young generation. Which is why I was interested in this chapter Johnson outlines several different ways to practice safe technology use. Johnson (2012) says “responsible teachers understand that knowing how to use information technologies both ethically and safely is a critical 21-st century skill for their students and for them. (p.149).
First Johnson (2012) discusses the teacher’s security guide that will help teachers and students practice safe technology use. This includes hardware security where computers can be stolen and broken if not placed in safe places, cords hidden, no lock on computers, handle technical repairs without a specialist and keep files safe on hardware. Next, like we learned in the last assignment teaching students all about computer safety and keeping passwords and personal information private. I know I have a terrible habit of making my passwords my personal information, because it is easy to remember, but I like how now for most school’s teachers are required to change their passwords every certain amount of days. Another way to keep us safe with technology is backups. Do we have another place for our copies somewhere? Similar as well to the last assignment about teaching students all about internet safety, we teach them to be careful of viruses. I can remember getting a few viruses on my previous laptops, and not knowing what I did wrong. One of the most crucial things we need to remember as professional educators is to protect the privacy of our students. Teachers also need to protect their own personal information and keep their privacy hidden from students. (153-155)
Furthermore, Johnson (2012) moves on to discuss how we can help our students to stay ethical and safe online from all possible things that can go wrong when students use technology. I think a good way to implement good and positive behavior with technology use in a classroom is to talk to our students and possibly come up with ‘classroom rules when using technology.’ Sometimes students just like to know they are a part of the rule making and that they have a voice and they will listen. For the most part. Johnson (2012) later discusses and gives scenarios on the three rules of technology ethics, privacy, property, and appropriate use. Are the children following the privacy of themselves and others? Are the students respecting each other’s property and their own property, and is the technology use appropriate for themselves and others? These are things we as teachers need to take into consideration. We should always be conscience about stranger danger, cyberbullying, and what is too much information.
Reference
Johnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. San Francisco, CA: Jossey- Bass
Hi Jessica! I completely agree, teachers need to make sure their student's information is secure, but they also need to make sure their personal information stays safe. With social media, it is so easy for students and parents to find out information about teachers. It is always smart for teachers to stay away from posting anything that they wouldn't want families and students to see. I also agree that internet safety should be taught at school. The internet is available to students, even when they aren't taught how to safely use it. Therefore, it is important that teachers address this issue in the classroom.
DeleteTeaching our students to be safe in our classroom is an important task for teachers. The one thing we want to do in our classrooms is provide technology in the classroom. As teacher before we introduce technology based tools or learning we have to test drive those items first. In our reading it states, “when students use technology, especially information technologies that consist of computers and computer networks, they are operating in a different world: a virtual world in which behaviors may not be as easily judged to be right or wrong” (page 156). Just blinding allowing or students to surf the web in our classrooms, is like just an open invitation to unsafe surfing. Even as ECE teacher who may use YouTube to play ABC’s videos for day to day lessons, have monitor there are always ad’s that play before the lesson’s start. And those ads are not always children friendly.
ReplyDeleteAs educators having classroom rules in place for the students is important. With younger students educators have to have those rules in place right away. With older students educators can go over the rules, the pros and cons of how to be safe while using the internet at school or home. Although we are not able to look over a students should while they are at home using technology. However, we give our students tools that will help to keep them safe while they are using technology in their homes. Also, teaching older student the dangers of using technology in ethical ways too. Students who do research need to know and understand and how not to plagiarize work.
In these days of social media, it is important to have rules in place in the classroom of the do’s and don’ts. “It is quite obvious that students need to understand and apply both school rules and local and national laws that apply to information technology use,” (P.163). These rules are always in place by the administration. So teachers, parents, and student have these in their handbooks.
The school can provide their own network that allows their students to surf freely. Also, these networks could ensure that social media is blocked from students. I worked in an after school program that used a program that allow the administration to see who logged into a site that was not approved.
Being safe while online is important however, just blocking websites or banning social media is not going to keep our students safe in our classroom or at home. We as educators have to having in places rules, guidelines, and tech our student what dangers are lurking on the web. Teaching students to be responsible is what is important.
Reference
Johnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. San Francisco, CA: Jossey- Bass
I agree that just blocking things doesn't allow that children to learn what is safe and what isn't. The school I work for has what is called a proto page and each teacher has their own page that they can customize and edit during the year. It is really neat and depending on the teacher and what they are teaching will determine what they have on their page.
DeleteNot sure why but it logged me out. The comment was from me.
DeleteI have heard before that sometimes the least common sense is precisely the common sense. By reading Chapter 7 “Common sense practices for safe and ethical technology use” in our textbook, I learned what we should be teaching our students in order to avoid the misuse of technology.
ReplyDeleteAccording to Johnson, “a good way to analyze a technology ethics situation is by trying to find an analogy from the pre-computer world” (Johnson, 2012). For me, these words also mean that we should be working from the bottom of the situation too, working in values that have to do with the person, instead of just condemning a single situation.
Just as I had mentioned before, for the assignment of Internet Safety, as educators and parents, we should be putting in our student’s hands the tools and the ability to respond to the many situations that appear online. We should be “training” them to not being transgressors/victims of the ethical circumstances from the beginning, just as in the “real word”. Johnson expresses that “When students use technology, especially information technologies that consist in computer and computer networks, they are operating in different world: a virtual world in which behaviors may not be as easily judged to be right or worng” (Johnson, 2012).
I agree with setting ground rules in our classrooms and homes that are easy to understand and follow, in order to teach students what is appropriate and what would not be. I learned that if we make a kind of “concentration” of what would be acceptable and what would not, we could be gaining territory on this battle. In other words, if our rules make a call for reflective thinking, they could comprehend a wider range of situations. An example of that are the three rules of technology ethics described by Johnson. These three rules are about privacy, property and appropriate use (Johnson, 2012). These three rules make a reflective statement with which students would be able to classify behaviors as they go by. Since we are not always by their side, these reflective statements might work as a second “conscience” to our students.
In conclusion, we are all concerned with ethics and appropriate behaviors, not only online, but in our everyday lives. The main reason why ethics are more disregarded online than in real life is because the consequences don’t seem to be as bad and also the evidences seem to disappear as we stop the bad behavior (Johnson, 2012). I would advise parents and educators to first work ethics at a personal level and then take it to the online scenario for better results. I would also recommend making rules that go deeper in thinking, so that students first think before acting.
Resources
Johnson, Dough (2012) The Classroom Teacher’s Technology Survival guide (1st. ed.) Jossey-Bass Teacher, A Wiley Imprint.
It is kind of sad that people do not use common sense when they are on computers. This is a scary world we live in where people portray themselves differently online. I have a almost teen daughter and we stress the importance of safety online. We also screen her Instagram and make sure we know who she is following and who follows her. Bad behavior online does not go away. Sooner or later it catches up with you and you will have to pay the consequences. As parents and educators we need to teach safety, privacy, and protection.
DeleteAdults have to teach children ethics; when adults are misbehaving with immature, negative behaviors on social medias children will only emulate those behaviors. Adults are the ones that make it an unsafe place for children and others on the internet. Adults are suppose to be positive models for children. When adults change their negative behaviors children will change their attitudes and behaviors.
DeleteChapter seven of The Classroom Teacher’s Technology Survival Guide discusses common sense and safety when using technology in the classroom. Johnson discusses how teachers have important student files and information on files that need to be backed up or saved to the cloud. He suggests doing this in case the computer crashes, then you can still have access to those files, instead of losing everything. He stresses the importance of using the same discipline procedures with technology as you would with paper and pencil. Protocol of the handbook should still be followed and necessary punishment should take place. Johnson also talked about basic safety procedures you can follow as well. For hardware security, your computer should be placed on a hard surface away from the edge to keep it from being pushed off. You also need to have insurance on your computer if you are going to take it between work and home. A tip is to never open your computer’s case because you may damage it or even have severe electric shock. Passwords are another concept that Johnson discussed. He suggested using pet’s names or a child’s name, adding in numbers and symbols, or creating an acronym. Most people cannot remember all their passwords so they write them down. A tip would be to not put that document in a common place for someone else to find. Most common places include the top desk drawer, under the calendar, or even a sticky note and attaching it to the computer. Password documents need to be put in a safe place to protect the security of your computer and its contents. Viruses are another scary thing that can damage important information on your computer. The book states to never open an attachment you were not expecting even if it is from someone you know. Never download programs or let your kids download programs from unknown sources on the Internet. Teachers also need to scan the computer regularly for viruses through a virus protection program. Data privacy as well as personal privacy are very important. Make sure you have permission from parents for photography or student work as well as personal information that is shared. It is important to keep our student’s safe online. Johnson suggest three tips to do this. Those three are privacy, property, and appropriate use. Privacy is to protect my privacy and respect the privacy of others. Property is to protect my property and respect the property of others. Appropriate use is to use technology in a constructive way that do not break the rules of my faith, family, school, or government. If we use common sense and a few safety tips we can stay safe on the internet and protect our documents as well.
ReplyDeleteCommonsense Practices for Safe and Ethical Technology Use
ReplyDeleteWhen using technology if an individual is not sure of how to use technology or feel unsure of something concerning it, common sense practices should be used to be on the safe side. Rather it is asking someone that has the knowledge or follows your gut feelings if it does not feel right to do something. According to Mr. Johnson, “Not knowing how to use technology safely is frightening. And most rational people tend to avoid the things that scare them. Yet responsible teachers understand that knowing how to use information technologies both ethically and safely is a critical 21st –century skill for their students and for them (Johnson, 2012, p. 149, para 6).
There are certain things that can be done to ensure the students and teachers safety while using technology in the classroom. The teacher should have the hardware on a firm surface with cords/cables securely in proper places to prevent damages and trips. Any hardware being used should be that of the school’s district and used for the purpose of educating. Another safety is to protect passwords because of the information that can be accessed; therefore teachers and students should understand the importance of not sharing passwords with anyone. When setting a password, it should be composed of numbers, letters, and characters within a range of six or more to make it complex. It should be changed regularly. An example that was provided in the text was using current month in association with a parent’s first name along with the initials of the program it is used for (Johnson, 2012, p. 151). Backups can be used in order for the teacher to have a copy of documents or other related materials used in the classroom. Back up files at least on a monthly basis and stored on the hard drive rather than online.
The teacher has to be responsible when using technology in the classroom to prevent viruses and invasion of privacy. Ethical use of technology should be adhered by both the teachers and students as they follow the code of conduct provided by the school/district, and classroom rules for while online. The teachers should get permission forms signed by each child’s parent for posting photographs and school work on the school Web site. And definitely, do not post or communicate anything via your personal social media. Remember the Johnson’s Three Rules of Technology Ethics: privacy, property, and appropriate use.
Reference:
Johnson, D. (2012). The Classroom Teacher's Technology Survival Guide. Hoboken, NJ: Jossey-Bass.
This comment has been removed by the author.
ReplyDeleteChapter seven discusses Commonsense Practices for Safe and Ethical Technology Use by author Doug Johnson. This chapter gives teachers practical advice on technology and safety uses as children learn how to use technology. The author first states it is very important to use hardware security. Doug Johnson states, “Computers and other hardware can be stolen and damaged through both carelessness and maliciousness” (p. 150). The proper way to keep computers safe should be done by putting computers on desk and making sure it is secure through the use of a computer cable, laptops should be placed on firm foundation and secured so that it will not fall off. To keep personal information safe, the teacher should use a file server so that digital records and other data can be protected. Password security is another important step when using safe internet practices. Passwords should be changed frequently, they should not be shared and they should be kept in a safe place. The teacher should use a backup copy of all important documents and they should create backup copies in the event of loss or theft. (p. 152). Practicing computer safety also can be done by avoiding viruses that can harm or destroy information on your computer. One safe measure is not to open attachments from people you do not know; and you should scan your computer to protect from computer viruses. My first computer got a virus and it was very difficult removing the virus.
ReplyDeleteTeachers should protect all student’s information, this is for privacy purposes and teachers should know the laws and guidelines of district policies. The author also talks about ethical practices that should be used online. Students should learn to never share private information on computers. On the internet children may not be able to judge between right and wrong on the internet. One way to teach children about computer ethics is teaching them about the “Impact of their actions and how it can affect, destroy and damage themselves, individuals and society” (p.157). The author listed simple rules for technology ethics that students can follow; privacy, property and appropriate use. All three teach students to protect their privacy as well as others, protect computers and respect others and the need to use computers in constructive ways. Students need to learn protocol to avoid cyberbullying and stranger danger. Teachers should model safe internet practices and they can teach students to use safe precautions as they learn guidelines for internet usage on networks and social medias. I would have to make sure all links are proper links when giving students assignments it is so easy for inappropriate material to pop up even with kid safety sites.
Reference
Johnson, D. (2012). The Classroom Teachers Technology Survival Guide. Jossey-Bass: CA.
Hi Caprice! I agree, keeping your computer safe from viruses is so important. It is especially important when student's information is at stake. I too have gotten a virus on my personal computer. It was so bad that I had to get a new computer entirely. This also happened from accessing a college student portal. That showed me that it doesn't matter how careful you are, you can still get viruses. I have had a virus protection software ever since that happened.
DeleteReflection
ReplyDeleteFor this Week Assignment 7 it seemed to be the hardest assignment yet. This is because I have never learned what a UDL was. UDL is the Universal Design for learning. It is a guideline of the ways that the three parts of the brain work. Those three parts are engagement, representation, and action and expression. Throughout the whole lesson I was finding out how a teacher can dig deeper into engagement, representation, action and expression. I have suggested some specific ways, but I know that we as teachers have to come up with multiple ways because not everyone learns the same.
In this assignment I focused more on the lesson plan aspect because this is how I was able to look into what universal designs need to be added in order to have learning styles for each student. The knowledge that was being taught during the lesson was life cycle. The teacher did include many ways to teach the lesson such as orally, visually, and technologically. Not everyone learns the same, so throughout the assignment I added different ways the teacher could incorporate universal design in order for the student to comprehend the objective. I did try my hardest to learn about universal design of learning, but I know that I will need a lot of practice, because I felt like I had extra trouble doing this assignment.
Chapter 7 ‘Common Sense Practices for Safe and Ethical Technology’ really focuses on teachers learning how to teach children about internet safety and how to show children how to use the internet correctly. Johnson states, “Responsible teachers understand that knowing how to use information technologies both ethically and safely is a critical 21st century skill for their students and for them.” (Johnson, 2012, pg.149). To me, this just means that teachers need to understand internet safety also in order for them to teach their students about it. The chapter starts off by talking about the different safety practices for teachers as technology users. He mentions a few but critical things to practice in the classroom such as to keep your data, student documents, and passwords private. These are basic and easy things that every person not only a teacher should know. Some of the other ideas are things like, changing your password on the regular, purchasing all hardware through the district, having homeowners’ insurance on your computer if its lost or damaged, and maintaining regular backups of school files in case of an unexpected event like water damage, or your hard drive crashes, will help create and sense of less worry if something were to happen to all of your data files for the school year. These are things that all teachers should know, and if you aren’t really aware of it then you can look at your districts manual. Technology is so advanced and sometimes not reliable so always have backups is a must. Johnson also talks about his three rules of technology ethics, privacy, “I will protect my privacy and respect the privacy of others”, property, “I will protect my property and the respects the property of others”, and appropriate use, “I will use technology in constructive wars and in ways that do not break the rules of my family, faith, school, or government”. All teachers, staff, and personal that work in school districts should know these tips, ideas, guidelines and rules. They should understand these rules so they are and be able to teach these to children and have them understand them and use them properly.
ReplyDelete“As the use of information and technology spreads throughout society, and its importance to our national economies and individual careers grows, everyone will need to make good ethical decision when using computers.” (Johnson, 2012, pg.158). This has hit really close to home, because technology is such a big thing in people’s even children’s lives, that people are misusing it. They are using it to bully people, to take advantage of people and to hurt them. It’s important for students to understand and be more aware of what is out there online and what to look out for. Johnson mentions stranger danger, which is a safety precaution to keep student’s safe from predators. Predators use social networking to talk to children and even try toto abduct young children. Students need to be taught to keep their social networking site private, don’t talk to anyone they do not know, don’t give out any personal information. Cyberbullying is at its worst now days. It is worse than bullying in the school. Children think hey no one will know it’s me, but they really don’t know how they can actually affect people to the point of depression, self-harm and worse suicide. Schools need to enforce cyberbullying policies and share them with the parents. There needs to be set consequences for such actions. Johnson also talks about TMI which is too much information. It’s teaching children and students about sharing too much information such as locations, address, phone numbers, etc. While we teach children about predators, we need to teach children that these predators lurk to find out all they can about you and when we share all this information they are able to find you easily and potentially hurt you. This chapter was a great way to learn how to really enforce and teach internet safety and what you can do as a teacher and educator to practice internet safety.
ReplyDeleteJohnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. San Francisco, CA: Jossey-Bass.
For this weeks assignment we read chapter seven of Doug Johnson's The Teacher's Technology Survival Guide, it was very helpful and insightful. This chapter discussed safety and ethics when using technology. It is absolutely critical that both teachers and students. There are many tips shared with us on how to protect our privacy such as frequently changing passwords, not sharing any personal information. I am glad that Johnson (2012) shared these tips that I can pass along because it isn't something I do very often, I've made the terrible mistake of also making my passwords the same for many sign in's and that isn't recommended either. I actually really enjoyed tying this chapter to the assignment we worked on last week, it helped me apply information I had already soaked in.
ReplyDeleteA part of what Johnson goes over is cyber bullying, stranger danger and TMI (too much information). The three mentioned are critical to the safety of our students. The cyber world can be a scary place for people who don't understand it too well. Cyberbullying is exactly what the name says it is, it can lead to very dangerous situations and escalate a lot fasten than one would think. It is important that we dont underestimate the words said through our computer as they have just as big of an impact on someone as words that were said out loud. Cyberbullying can be very damaging to people in physical, emotional and mental ways.
A personal experience that I recently encountered with Stranger Danger and TMI, my nephew who is 11 years old, lives and breathes, on his xbox. During a game on XBOX Live there was a person who began talking to him and telling him that if he shared his account information he would help pass him to the next level of a game he was trying to pass. While my sister is generally great at monitoring what he is doing, all it takes is a couple of minutes for something to happen. Sure enough, my gullible nephew share personal information and let a total stranger in on his mothers CC info. It is crucial that we not only enforce safety on the computer but in other forms of technology.
Johnson, Dough (2012) The Classroom Teacher’s Technology Survival guide (1st. ed.) Jossey-Bass Teacher, A Wiley Imprint.
Hey Nicole,
DeleteCyber Bullying is the worst! I feel like kids these days are not being educated correctly when it comes to the internet and technology. Do you think that schools should now offer classes just for internet safety and if so do you think they should also have policies against it?
Hello, Nicole
DeleteI am reading about your personal experience and I am surprised how people in the internet operate to get information from children. I think that we should be prepared to hear and see everything now! I also think that we should be sharing this information on our classrooms in order to prevent frauds and even letting our kids in risk with strangers. According to Johnson, “The danger to kids comes not so much from what they may find online as from what they themselves may put online for others to find” (Johnson, 2012).
For me, this is alarming and frightening. We shouldn’t also let children know personal info like this and if we do, we should be constantly warning them about the many dangers out there. We should also be on top of who are our children talking to and how they know the other person.
Thank you!
Anel K. Ramirez
Resources
Johnson, Dough (2012) The Classroom Teacher’s Technology Survival guide (1st. ed.) Jossey-Bass Teacher, A Wiley Imprint
This weeks chapter was about commonsense. Teaching students about the safety in the use of technology and how to be aware of the dangers that can be intertwined into many forms of harming children's theory of learning about the use of the internet. Therefore,cyber bullying is known to harm student through all social media outlets and expose them to something they may have never seen before. However, as a teacher, you can be a powerful force in promoting a climate of respect. Educate yourself and be on the lookout for signs that cyberbullying is taking place, because you may be the trusted adult a student turns to for help.Johnson (2012) mentioned, even if social networking sites are blocked, most students will still get access to them (p.162).The most important thing you can do is give kids ways to avoid victimization. Remind them to "never put anything sensitive into an electronic format and send it to someone.
ReplyDeleteAs part of your drive to reinforce the concept that empathy is necessary to prevent cyberbullying, you should also make these lessons another opportunity to remind your students that EVERYTHING that happens on the Internet is both public and permanent. As educators, we strive to promote a climate of respect. Bullying behavior is evident on the playground, but it is more difficult to detect and respond to when it takes place online. In addition, students need to recognize cyberbullying. They need to know when the line is crossed and a joke or teasing has gone too far. The first step is to build an awareness of cyberbullying. Next, students should know what they can do and who they can go to for help if they are a victim. Promote a community of responsible digital citizens in the classroom.
Johnson explains that some of the responsibility falls on the teacher when it comes to keep passwords protected. Johnson recommends keeping passwords secret and changing them frequently to protect the privacy of your students (Johnson, 2012). Data privacy as well as personal privacy are very important. Make sure you have permission from parents for photography or student work as well as personal information that is shared. It is important to keep our students safe online. Johnson suggest three tips to do this. Those three are privacy, property, and appropriate use. Privacy is to protect my privacy and respect the privacy of others. Property is to protect my property and respect the property of others.Consequently, responsible teachers recognize that schools must give students the understandings and skills they need to stay safe not just in school, but outside of school where most Internet use by young people occurs. Over-filtered school networks set up a false sense of security; the real world of the Internet is quite different from the Internet at school.
Johnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. San Francisco, CA: Jossey-Bass
Michellena,
DeleteStudents have fallen prey to cyberbullying because they may not have been educated on how to be safe while using the Internet. Some students may be the victim or the victimizer, either one is not good. Students need to understand that this is hurtful and cause serious injury. A student needs to know that once they send hurtful messages online you cannot take it back, just as if they were verbally spoken. As teachers, we need to carefully monitor our students’ online activities.
Students need to understand the importance of not sharing passwords and keeping data private so that no one can access their personal information.
Hello, Michellena
DeleteYou have touched some important points here. I totally agree with you when you say that we should be prepared for being a trusted adult for a child. I also think that we should be paying attention to what students are bringing from home; we may find signs of unethical behaviors that we may stop on time.
Regarding cyber bullying, I connect it to the idea that Johnson expressed: “We may often say something online that we would never say in a face-to-face conversation” (Johnson, 2012). When students are about to make unethical actions, they choose to go for a more “secure” way, not facing the other person. If a child says that he/she is being cyberbullied, we need to do something about it even without much evidence of it.
Thank you!
Anel K. Ramirez
Resources:
DeleteJohnson, Dough (2012) The Classroom Teacher’s Technology Survival guide (1st. ed.) Jossey-Bass Teacher, A Wiley Imprint.
Michellena,
DeleteI agree that it is crucial to be repetitive in teaching our students before hand about all the possibilities when using technology in the classroom. Letting our students be aware of what can happen before it actually does is the best way to prepare a child. I remember any time my students used the computer and had computer time there were always rules listed next to the area on the wall as a reminder for the child. I also put up visuals. Great post!
Reflection
ReplyDeleteFor this week’s assignment, I really liked the lesson plan. Some of the parts of the worksheet I did not completely understand what part of the lesson plan needed to be referenced though. The teacher did a great job providing opportunities for all types of learners. She provided books, computer programs, and field trips for visuals learners to see the process of the life cycle. For audio learners, she provided listening to books, having class discussion, listening to the guest speaker and also asking questions. This teacher allowed group work, opportunities to research, compare and contrast life cycles. Hands on learning included the journal logs, arts and craft projects, as well as investigating the eggs and having the opportunity to hold the chicks when they hatched. She seemed to be aware of her students’ needs and made modifications as needed. I think the students would enjoy this three-week science lesson. The only thing I did not notice is the opportunity for a student that is non-English speaking. Perhaps a translator or subtitles on the computer would be helpful for the student to understand. I think the teacher used her resources appropriately taking advantage of the computer lab, science lab, and guest speaker.
Reflection,
ReplyDeleteI really like the lesson plan about the Life cycle of the apple tree, chicken , frog and butterfly. The teachers provided journals, books, computers, guest speakers and field trips to help learned about the four stages of the life cycle. the fur stages that they learned about was birth , growth, reproduction and death. this was a very engaging and informative learning experience for the children. I was concerned on how effective the lesson was going to be because the teacher was dealing with some technology problems such as limit access to the computer lab, not having enough working computers in the classroom , WIFI not always working and having one mini IPad from a teacher. But if these problems were able to resolve the children would have achieve the goal and objective of the lesson plan.
Ensuring equity of access to technology resources that enable and empower all learners and educators. Identify, communicate, model, and enforce social, legal, and ethical practices to promote responsible use of technology. Promote and enforce privacy, security, and online safety related to the use of technology. Promote and enforce environmentally safe and healthy practices in the use of technology. Identify and use technology resources that affirm diversity, apply technology resources to enable and empower learner with diverse backgrounds, characteristics, and abilities.
ReplyDeleteEstablishing a classroom climate conducive to learning, positive classroom management, safe and developmentally appropriate environment, efficient organization of time and materials, and effective transitions. Affirms dignity and worth of all students and provides the positive support students need to be effective learners; Communicates classroom rules and behavioral expectations that provide a safe and orderly environment for learning, and that are appropriate to the level of development of students; When establishing classroom rules and procedures, applies to all students principles of gender equity and racial justice, and applies principles of least restrictive environment for students with disabilities.
Uses classroom time effectively to provide maximum time for learning; Manages instructional transitions decisively, effectively, and without loss of instructional time; Arranges and sets up materials and equipment in advance of class to facilitate their effective and efficient use during lessons; and Coordinates the use of instructional assistants, parent volunteers, student assistants, and other support staff to achieve instructional objectives, if these resources are available in the school setting.
Final Reflection:
ReplyDeleteThe UDL assignment gave me a greater understanding on what should be implemented and included in a lesson plan and curriculum. Students need guidance but they should also be allowed to have freedom and make choices when doing projects. I also learned the importance of allowing them to interact and engage by doing frequent feedback so that they can process and understand the assignment given them. I will apply these principles and checkpoints because they meet the needs of all learners. I also learned what I should not do when planning a project.
Reflection
ReplyDeleteThis week chapter talked about how educators have to focus on teaching students safety while using the internet. There are so many different areas of the internet that are dangerous for students. Providing students a safe environment where they are learning is important. “Responsible teachers understand that knowing how to use information technologies both ethically and safely is a critical 21st century skill for their students and for them.” (Johnson, 2012, pg.149). Learning to change passwords, and installing software are good but, they don’t always keep children safe from internet dangers. Student need to know that there are dangerous situation that will seek out students. So, educators providing lessons on social media, bullying, and phishing emails are important.
Johnson, D. (2012). The Classroom Teacher’s Technology Survival Guide. San Francisco, CA: Jossey-Bass.
After doing assignment seven, I feel like I understand the importance of creating detailed lesson plans. The lesson plan that was provided included so many ways that the students could learn the information. It also included what learning standards would be met. However, it didn't attach the learning standard to any specific activities. I feel like this would have been very helpful. It also didn't include any activities specific to any certain children. I also think it would have been helpful to include what times, during the day, these activities would be taking place. Overall, the lesson plan was very descriptive, and I liked the ideas that the lesson provided. I enjoyed doing this assignment, because it was more related to what I would be frequently using technology for once I graduate.
ReplyDeleteI have mixed feelings about this assignments. I think creating detailed lesson plans are important and I understand the need for it as well. I don't know if I would consider this a lesson plan as much as an outline for what will be covered over the next couple weeks. I think that it covered a lot of information but that there are somethings that I think could have been added or adjusted in order to cover everything that she will be doing. She had great ideas and I think the lessons were great, but I think it could have had a couple more things added in order to hit all of the goals or make the explanations clear.
ReplyDeleteREFLECTION:
ReplyDeleteThis assignment was very helpful for me not only as a teacher, but as a learner. I never thought that by following certain guidelines and objectives we could become expert learners. I now see how better help students gain access to the information, whereas not everybody learns the same way.
I now see how UDL pays attention to what we might be overlooking in the classroom. Are our students learning how they should? The way they should? Are we putting enough effort? We should not only present the information, but also help students set and follow goals, be organized and recognize learning opportunities when they see them.
I did have a challenging time by trying to decode when the lesson plan was giving the opportunity for UDL’s or when it was just simply mentioning standards. However, I did learn to have a different view of the lesson planning, taking into consideration how we should be implementing UDL checkpoints.
In my opinion, the document that we reviewed is a very complete one and I decided to keep it for further references. I am also going to share it with other colleagues, family and friends.
Teachers have a great responsibility to themselves and students when using technology. We must use technology ethics that Mr. Johnson implicated: privacy, property, and appropriate use. Teachers should keep any given information private in respect to the students, families, and others. Property should be kept safe by obeying the written laws or getting permission to use technology in classroom. Appropriate use of technology is for teaching and learning, not for any other business outside of the classroom.
ReplyDeleteIn teaching via online, teachers can use Universal Design Learning (UDL) for flexible style of teaching curriculum to make learning goals, methods, materials, and assessments that work for everyone. Universal Design Learning can eliminate barriers and create flexible paths to learning through the following three things:
• Representation: the sharing of information in different ways.
• Action and Expression: students approach learning tasks and demonstrate what they know in different ways.
• Engagement: offers ways that keep students interested.
Technology is a resourceful tool for 21st century skills which provides support and better understanding. The teachers and students need to understand the consequences of not adhering to the rules and regulations of technology use to prevent and protect from strangers, hackers, computer viruses, and unauthorized access.
Reflecction for Assignment 7
DeleteREFLECTION:
ReplyDeleteI enjoyed learning about what UDL is all about and applying it to the assignment. It really helped having the resources available as I found myself going back and forth to see if what I was looking for was in the lesson plan. It is something that I will always look for when it comes time to making lesson plans. As I was doing the assignment, I found myself noticing that certain students would be left in the dark. This is a great resource and checklist that we did as it ensures that every student is learning. What are the students going to learn? How are the students going to learn? Why do we want them to learn? These are all very important questions to think of and this assignment was a great introduction into lesson planning and what should we be thinking about.
Final reflection:
ReplyDeleteI enjoyed the video this week and learning all about Universal Design for Learning and ways to teach all children. This subject is always one that I enjoy. As teachers sometimes we forget what a culturally diverse our country really is. It is an honest mistake we all make. Practicing and studying how to teach ELL students is something we have to do when creating lessons for our students. I enjoyed reading the life cycle lesson and dissecting the lesson so that we can see how Universal it just is. I always enjoy reading other teachers lesson plans, because it gives me ideas and guides me in other ways I might do things differently. I can now use this UDL guideline for future lesson plans. As teachers as well we need to always ask questions to ourselves while creating these lessons. Plan for challenges in a lesson. What can go wrong and how will I fix it? What barriers will I encounter? How can I teach each and every student in my classroom so they all have an equal learning experience? I can remember being in grammar school and being very shy to ask questions. Sometimes this lead me to fall behind. The teacher only explained the assignment one way. I needed examples. I needed a different way. I needed to see visuals, and then I felt more confident in my work as well.
Universal Design Learning (UDL) is a set of principles used in the curriculum that provides instructional goals, methods, materials, and assessments that give all individuals an equal opportunity to learn. Its flexibility allows the teacher to meet the developmental needs of a diverse classroom using customizable and adjustable approaches ("What is Universal Design for Learning | National Center On Universal Design for Learning", 2017). UDL uses three key elements to incorporate in a lesson to illustrate and implement:
ReplyDelete• Representation: the sharing of information in different ways.
• Action and Expression: students approach learning tasks and demonstrate what they know in different ways.
• Engagement: offers ways that keep students interested.
The teacher wants his or her students to maintain interest, to communicate, and to collaborate during the lesson’s individual and whole class discussions, activities, and projects. The UDL guidelines examples and resources worksheet gives a breakdown of each principle that will assure that the teacher has incorporated the necessary information for a successful outcome and will be intriguing to the students. In teaching via online, teachers can use Universal Design Learning to eliminate barriers and create flexible paths to learning in the classroom.
After reading the information pertaining to the UDL Guidelines Version 2.0 Examples and Resources, I understand how it can be helpful in the classroom as it provides learning opportunities for all. Teachers have students that have learning disabilities, physical disabilities, and language barriers that will need differentiated instructions, and Universal Design Learning will promote this.
Reference:
What is Universal Design for Learning | National Center On Universal Design for Learning. (2017). Udlcenter.org. Retrieved from http://www.udlcenter.org/aboutudl/whatisudl