Posts Tagged ‘digital literacy for EDAD’

transform education via digital tools

Digital tools can transform, not just replicate, the teaching and learning experience

Commentary: The SAMR and TPACK models of technology implementation can help schools as they transition to using more digital tools.

By EdScoop Staff  MAY 8, 2018 2:37 PM

https://edscoop.com/digital-tools-can-transform-not-just-replicate-the-teaching-and-learning-experience

The SAMR (substitution, augmentation, modification, redefinition) model and TPACK (technological pedagogical content knowledge) model can help schools as they transition to using more digital tools.

In a recent edWebinar, Michelle Luhtala, library department chair at New Canaan High School in Connecticut, reviewed these models and discussed apps that can take teaching, learning and reading to the next level.

The SAMR model determines the level of technology integration of a tool: substitution, which doesn’t add value; augmentation, which adds a few features with only a little improvement; modification, which redesigns some structures; and redefinition, which allows the creation of new tasks and is the ultimate learning goal. Transformation in how educators are teaching and how students are understanding content happens in the modification and redefinition parts of the model.

MackinVIA’s Classroom allows educators to create a collection of digital content for students; build assignment around it; and share the collection, or an individual book, with the classroom. Students can also highlight text, make annotations, and save these to Google Drive.

Emerging Tech for Schools and Libraries is a free professional learning community where school librarians, teachers, and administrators can explore all the ways to integrate technology and 21st century learning into school library programs.

+++++++++++++++++++
more on the SAMR model in this IMS blog
http://blog.stcloudstate.edu/ims?s=samr

Fortnite Craze

https://www.npr.org/2018/05/05/608164530/the-fortnite-craze-might-be-here-to-stay

In April, a PLAYlive Nation lounge in Tracy, Calif., hosted its first Fortnite tournament and sold out. Hundreds of players bought tickets to play against one another and win prizes.

Joost van Dreunen, the CEO of Superdata Research, a video game analytics firm, says most shooter games are serious and simulate violence. Fortnite, he says, is more like a friendly game of tag.

His company estimates the game has made about $223 million across all platforms in March alone. In lifetime sales, it had made about $614 million. The game is free to play, but Epic Games, the company that owns Fortnite, makes money through microtransactions. Players can spend real money to make cosmetic changes to their characters in the game. They can buy things like skins, which are like costumes, for their characters or emotes, which are celebratory dance moves their characters can do after winning or killing another player in the game.

Ninja, the gamer name taken by 26-year-old Tyler Blevins, is now a legend in the Fortnite world. He is a master at the game and rocketed into popularity after playing in an online battle with rap artists Drake and Travis Scott on March 14. That battle has been watched more than 9 million times.

++++++++++++++++++++

Educators Battle ‘Fortnite’ for Students’ Attention

https://www.edweek.org/ew/articles/2018/05/03/educators-battle-fortnite-for-students-attention.html

Many educators want to ban the game from their classrooms, but some are taking the opposite approach, attempting to weave students’ interest in Fortnite into class discussions and assignments.

Nick Fisher, a science teacher at Fort Zumwalt North High School in O’Fallon, Mo., said his students like to take screenshots of gameplay and send them to friends over Snapchat. Teenagers want to broadcast their victories, and because the game is on their phones, it’s easy to post updates to social media, making Fortnite “the perfect concoction of addiction,” said Fisher.

North High blocks all social media and gaming sites on its WiFi, said Fisher, but students tell him how they circumvent the restriction: They use virtual private networks, or VPNs, to establish independent internet connections. (Dozens of YouTube videos provide step-by-step tutorials for students looking to get around school WiFi controls.)

“Kids can’t multitask,” she said. “Even having a digital device within sight can cognitively distract the student enough that they can’t focus on the academics.”

Schools and teachers should be guiding parents when it comes to appropriate limits around screen time, said Kolb. Most parents will appreciate research-based recommendations, such as turning off all screens a set amount of time before bed, she said.

Games like Fortnite can even have social benefits, said John Velez, an assistant professor of journalism and electronic media at Texas Tech University. Velez, who studies the positive effects of video games, has found that playing violent games cooperatively with helpful teammates promotes pro-social behavior.

Chris Aviles, the coordinator of innovation, technology, and 21st century skills for the Fair Haven Public Schools in New Jersey, wrote “A Teacher’s Guide to Surviving Fortnite,” an exploration of ways the game can be used for instructional purposes. The guide, posted to his blog Teched Up Teacher, suggests how to integrate the game into writing prompts, math lessons on probability, and physics.

Aviles doesn’t advocate playing the game at school. There isn’t any educational value in letting students engage in virtual combat during a lesson, he said. Instead, teachers can build a lesson around one aspect of the game, such as having students calculate the best angle of approach as they jump from the “Battle Bus,” the floating bus that drops players onto the map at the beginning of each match.

++++++++++++++++++

Instagram, Snapchat, Fortnite: The distractions are endless. Here’s how to help kids cope.

 May 14 at 9:00 AM
In January, two of Apple’s shareholder groups asked the company to look at the addictive effects of iPhones on children. Google’s recent developer conference highlighted tools to help users better control smartphone usage.
2015 survey of more than 1,800 teachers and 400 principals in Alberta, B.C., found that nearly three-fourths of teachers frequently or very frequently observed students multitasking with technology, and 67 percent of teachers believed that the number of students negatively distracted by digital technologies in the classroom was growing.
2017 study published in the journal Social Psychological and Personality Science tracked college students’ progress on their goals over the course of a semester and found that successful goal attainment was less about self-control and more about blocking and eliminating potential distractions.
The best approach is to use empathy, compassion and collaboration to help the young people in your life find ways to manage their digital workflow.
Encourage visualization for inspiration and motivation. The first step is getting students to buy in and to want to make behavioral changes.
Focus on compartmentalization. A 2009 study from Stanford researchers found that people who juggled several streams of electronic information were not able to pay attention, remember key information or switch tasks as effectively as those who completed one task at a time.
Using the Pomodoro technique of spending 25 minutes focused on one task followed by a five-minute break can be an easy way to have students begin to shift from a multitasking to a monotasking mind-set.
Make focus fun. There are now numerous ways to use technology to help us be more productive with technology, and it doesn’t have to be arduous. Students in my office use apps such as Forest or Flipd to motivate them to stay off their phones during class or when doing homework. Forest has a simple interface that will build a digital tree for users who stay off their phones. Flipd allows users to hide certain apps, allot time off their phone based on their schedule and, for a premium, track their progress over time.
Provide structured support as needed. A middle school student with whom I worked recently was relieved when his mother used the Mac OS app SelfControl to block YouTube and ESPN while he was doing his homework (Cold Turkey is a similar PC-based app).
Allow opportunities for regrouping. Even the best plans can go awry (for adults and kids alike). It’s important to focus on progress rather than perfection. Create time daily or weekly for students to think about what went well in terms of managing distractions and improving productivity, and what they would like to do better. Ask open-ended questions without judgment or expectation

+++++++++++++++++++
more on gaming in this IMS blog
http://blog.stcloudstate.edu/ims?s=gaming

+++++++++++++++
more on social media addiction in this IMS blog
http://blog.stcloudstate.edu/ims/2018/05/08/social-media-addiction/

doctoral literature review

How to do a literature review: Citation tracing, concept saturation and results’ mind-mapping

http://www.raulpacheco.org/2016/06/how-to-do-a-literature-review-citation-tracing-concept-saturation-and-results-mind-mapping/

  1.  engage in citation tracing: you will need to find the key references across the literature for your particular project
  2. map whether your literature review has reached concept saturation: have you exhausted the field for the specific topic you are working on
  3. need to lay out how different citations, bodies of work and key concepts relate to each other

++++++++++++
more on digital literacy for EDAD in this IMS blog
http://blog.stcloudstate.edu/ims?s=digital+literacy+edad

more on proofreading and writing in this IMS lbog
http://blog.stcloudstate.edu/ims?s=proofreading+writing

Selecting LMS

A Guide to Picking a Learning Management System: The Right Questions to Ask

By Mary Jo Madda (Columnist)     Feb 14, 2017

https://www.edsurge.com/news/2017-02-14-a-guide-to-learning-management-systems-the-right-questions-to-ask

Over the past 10 years, new learning management systems (LMSs) have sprung on the scene to rival the Blackboards and Moodles of old. On the EdSurge Product Index alone, 56 products self-identify and fall into the LMS category. And with certain established companies like Pearson pulling out of the LMS ranks, where do you start?

As University of Central Florida’s Associate Vice President of Distributed Learning, Tom Cavanagh, wrote in an article for EDUCAUSE, “every institute has a unique set of instructional and infrastructure circumstances to consider when deciding on an LMS,” but at the same time, “all institutions face certain common requirements”—whether a small charter school, a private university or a large public school district.

The LMS Checklist

#1: Is the platform straightforward and user-friendly?

#2: Who do we want to have access to this platform, and can we adjust what they can see?

#3: Can the instructor and student(s) talk to and communicate with each other easily?

“Students and faculty live a significant portion of their daily lives online in social media spaces,” writes University of Central Florida’s Tom Cavanagh in his article on the LMS selection process. “Are your students and faculty interested in these sorts of interplatform connections?”

#5: Does this platform plug in with all of the other platforms we have?

“Given the pace of change and the plethora of options with educational technology, it’s very difficult for any LMS vendor to keep up with stand-alone tools that will always outperform built-in tools,” explains Michael Truong, executive director of innovative teaching and technology at Azusa Pacific University. According to Truong, “no LMS will be able to compete directly with tools like Piazza (discussion forum), Socrative (quizzing), EdPuzzle (video annotation), etc.” 

As a result, Truong says, “The best way to ‘prepare’ for future technological changes is to go with an LMS that plays well with external tools.

#6: Is the price worth the product?

A reality check: There is no perfect LMS.

++++++++++++++++++
more on LMS in this IMS blog
http://blog.stcloudstate.edu/ims?s=learning+management+systems

challenges ed leaders technology

The Greatest Challenge Facing School Leaders in a Digital World

By Scott McLeod     Oct 29, 2017

https://www.edsurge.com/news/2017-10-29-the-greatest-challenge-facing-school-leaders-in-a-digital-world

the Center for the Advanced Study of Tech­nology Leadership in Education – CASTLE

Vision

If a school’s reputation and pride are built on decades or centuries of “this is how we’ve always done things here,” resistance from staff, parents, and alumni to significant changes may be fierce. In such institutions, heads of school may have to steer carefully between deeply ingrained habits and the need to modernize the information tools with which students and faculty work

Too often, when navigating faculty or parental resistance, school leaders and technology staff make reassurances that things will not have to change much in the classroom or that slow baby steps are OK. Unfortunately, this results in a different problem, which is that schools have now invested significant money, time, and energy into digital technologies but are using them sparingly and seeing little impact. In such schools, replicative uses of technology are quite common, but transformative uses that leverage the unique affordances of technology are quite rare.

many schools fail to proceed further because they don’t have a collective vision of what more transformative uses of technology might look like, nor do they have a shared understanding of and commitment to what it will take to get to such a place. As a result, faculty instruction and the learning experiences of students change little or not at all.

These schools have taken the time to involve all stakeholders—including students—in substantive conversations about what digital tools will allow them to do differently compared with previous analog practices. Their visions promote the potential of computing devices to facilitate all of those elements we now think of as essential 21st-century capacities: confidence, curiosity, enthusiasm, passion, critical thinking, problem-solving, and self-direction. Technology doesn’t simply support traditional teaching—it transforms it for deeper thinking and gives students more agency over their own learning.

Fear

Another prevalent issue preventing technology change in schools is fear—fear of change, of the unknown, of letting go of what we know best, of being learners again. But it’s also a fear of letting kids have wide access to the Internet with the possibility of cyberbullying, access to inappropriate material, and exposure to online predators or even excessive advertising. Fears, of course, need to be surfaced and addressed.

The fear drives some schools to ban cellphones, disallow students and faculty from using Facebook, and lock down Internet filters so tightly that useful websites are inaccessible. They prohibit the use of Twitter and YouTube, and they block blogs. Some educators see these types of responses as principled stands against the shortcomings and hassles of digital technologies. Others see them as rejections of the dehumanization of the education process by soulless machines. Often, however, it’s just schools clinging to the past and elevating what is comfortable or familiar over the potential of technology to help them better deliver on their school missions.

Heads of school don’t have to be skilled users themselves to be effective technology leaders, but they do have to exercise appropriate oversight and convey the message—repeatedly—that frequent, meaningful technology use in school is both important and expected. Nostalgia aside, there is no foreseeable future in which the primacy of printed text is not superseded by electronic text and multimedia. When nearly all information is digital or online, multi-modal and multi­media, accessed by mobile devices that fit in our pockets, the question should not be whether schools prepare students for a digital learning landscape, but rather how.

Control

Many educators aren’t necessarily afraid of technology, but they are so accustomed to heavily teacher-directed classrooms that they are leery about giving up control—and can’t see the value in doing so.

Although most of us recognize that mobile computers connected to the Internet may be the most powerful learning devices yet invented—and that youth are learning in powerful ways at home with these technologies—allowing students to have greater autonomy and ownership of the learning process can still seem daunting and questionable.

The “beyond” is particularly important. When we give students some voice in and choice about what and how they learn, we honor basic human needs for autonomy, we enhance students’ interest and engagement, and we truly actualize our missions of preparing lifelong learners.

The goal of instructional transformation is to empower students, not to disempower teachers. While instructor unfamiliarity with digital technologies, inquiry- or problem-based teaching techniques, or deeper learning strategies may result in some initial discomfort, these challenges can be overcome with robust support.

Support

A few workshops here and there rarely result in large-scale changes in implementation.

teacher-driven “unconferences” or “edcamps,” at which educators propose and facilitate discussion topics, can be powerful mechanisms for fostering professional dialogue and learning. Similarly, some schools offer voluntary “Tech Tuesdays” or “appy hours” to foster digital learning among interested faculty.

In addition to existing IT support, technology integration staff, or librarians/media specialists, some schools have student technology teams that are on call for assistance when needed.

A few middle schools and high schools go even further and assign teachers their own individual student technology mentors. These student-teacher pairings last all school year and comprise the first line of support for educators’ technology questions.

As teachers, heads of school, counselors, coaches, and librarians, we all now have the ability to participate in ongoing, virtual, global communities of practice.

Whether formal or informal, the focus of technology-related professional learning should be on student learning, not on the tools or devices. Independent school educators should always ask, “Technology for the purpose of what?” when considering the inclusion of digital technologies into learning activities. Technology never should be implemented just for technology’s sake.

++++++++++++
more on digital literacy for EDAD in this IMS blog
http://blog.stcloudstate.edu/ims?s=digital+literacy+edad

Teach like a pirate

Burgess, D. (2012). Teach like a pirate: Increase student engagement, boost your creativity, and transform your life as an educator. San Diego, Calif.: Dave Burgess Consulting, Inc..

Riddell, R. (2018, February 1). FETC: How can administrators ensure digital-age classrooms are best serving learners? Retrieved February 2, 2018, from https://www.educationdive.com/news/fetc-how-can-administrators-ensure-digital-age-classrooms-are-best-serving/516059/
his switch flipped when he learned more about why students like to play games. Games, he said, provide an environment where we get to try without penalty because failure is part of the journey. Everyone can be a hero, and games are goal-oriented and provide, in some ways, a representation of the world students want to be a part of. They’re social and provide positive stress.

K12 trends 2018

4 K-12 Ed Tech Trends to Watch in 2018

Analytics, virtual reality, makerspaces and digital citizenship top the minds of education experts for the year.

Principalship EDAD

Link to this blog entry: http://bit.ly/principaledad

Fri, Feb. 2, 2018, Principalship class, 22 people, Plymouth room 103

Instructor Jim Johnson  EDAD principalship class

The many different roles of the principals:

Communication

Effective communication is one critical characteristics of effective and successful school principal. Research on effective schools and instructional leadership emphasizes the impact of principal leadership on creating safe and secure learning environment and positive nurturing school climate (Halawah, 2005, p. 334)

Halawah, I. (2005). The Relationship between Effective Communication of High School Principal and School Climate. Education, 126(2), 334-345.

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3deric%26AN%3dEJ765683%26site%3dehost-live%26scope%3dsite

Selection of school principals in Hong Kong. The findings confirm a four-factor set of expectations sought from applicants; these are Generic Managerial Skills; Communication and Presentation Skills; Knowledge and Experience; and Religious Value Orientation.

Kwan, P. (2012). Assessing school principal candidates: perspectives of the hiring superintendents. International Journal Of Leadership In Education, 15(3), 331-349. doi:10.1080/13603124.2011.617838

http://login.libproxy.stcloudstate.edu/login?qurl=http%3a%2f%2fsearch.ebscohost.com%2flogin.aspx%3fdirect%3dtrue%26db%3dkeh%26AN%3d77658138%26site%3dehost-live%26scope%3dsite

Yee, D. L. (2000). Images of school principals’ information and communications technology leadership. Journal of Information Technology for Teacher Education, 9(3), 287–302. https://doi.org/10.1080/14759390000200097

Catano, N., & Stronge, J. H. (2007). What do we expect of school principals? Congruence between principal evaluation and performance standards. International Journal of Leadership in Education, 10(4), 379–399. https://doi.org/10.1080/13603120701381782

Communication can consist of two large areas:

  • broadcasting information: PR, promotions, notifications etc.
  • two-way communication: collecting feedback, “office hours” type of communication, backchanneling, etc.

Further communication initiated by/from principals can have different audiences

  • staff: teachers, maintenance etc.

Ärlestig, H. (2008). Communication between principals and teachers in successful schools. DIVA. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-1927

Reyes, P., & Hoyle, D. (1992). Teachers’ Satisfaction With Principals’ Communication. The Journal of Educational Research, 85(3), 163–168. https://doi.org/10.1080/00220671.1992.9944433

  • parents: involvement, feeling of empowerment, support, volunteering
  • students
  • board members
  • community

Epstein, J. L. (1995). School/family/community partnerships – ProQuest. Phi Delta Kappan, 76(9), 701.

  • Others

Communication and Visualization

The ever-growing necessity to be able to communicate data to different audiences in digestible format.

http://blog.stcloudstate.edu/ims/2017/07/15/large-scale-visualization/

So, how do we organize and exercise communication with these audiences and considering the different content to be communicated?

  • How do you use to do it at your school, when you were students 20-30 years ago?
  • How is it different now?
  • How do you think it must be changed?

Communication tools:

physical

  • paper-based memos, physical boards

Electronic

  • phone, Intercom, email, electronic boards (listservs)

21st century electronic tools

  • Electronic boards
    • Pinterest
  • Internet telephony and desktopsharing
    • Adobe Connect, Webex, Zoom, GoToMeeting, Teamviewer etc.
    • Skype, Google Hangouts, Facebook Messenger
  • Electronic calendars
    • Doodle, MS Offce365, Google Calendar
  • Social media / The Cloud
    • Visuals: Flickr, YouTube, TeacherTube, MediaSpace
    • Podasts
    • Direct two-way communication
      • Asynchronous
        • Snapchat
        • Facebook
        • Twitter
        • LinkedIn
        • Instagram
      • Synchronous
        • Chat
        • Audio/video/desktopsharing
      • Management tools

 

Tools:

http://blog.stcloudstate.edu/ims/2016/07/16/communication-tool-for-teachers-and-parents/

Top 10 Social Media Management Tools: beyond Hootsuite and TweetDeck

http://blog.stcloudstate.edu/ims/2013/11/17/top-10-social-media-management-tools-beyond-hootsuite-and-tweetdeck/

Manage control of your passwords and logons (Password Managers)

  • 1Password.
  • Okta.
  • Keeper.
  • KeePass.
  • Centrify Application Services.
  • RoboForm.
  • Zoho Vault.
  • Passpack.
  • LastPass

+++++++++++++++++++++
class discussion Feb 2.

PeachJar : https://www.peachjar.com/

Seesaw: https://web.seesaw.me/

Schoology: https://www.schoology.com/

 

++++++++++++++++++++++
Group Assignment

considering the information discussed in class, split in groups of 4 and develop your institution strategy for effective and modern communication across and out of your school.

>>>>>>>>>>> Word of the day: blockchain credentialing <<<<<<<<<<<<<<<<<<<<<

>>>>>>>>>>> K12 Trends 4 2018 <<<<<<<<<<<<<<<<<

 

 

blockchain for libraries

Blockchain technology has the potential to enhance the role played by libraries within their communities, however, there are many questions yet to be answered about how specifically blockchain technology might be used and how much value it would add to library services and the communities they serve.  Ideas from within the information profession are needed as we formulate recommendations for the profession.

The San José State University School of Information (iSchool) received an IMLS grant to investigate ways that blockchain technology can be used by libraries as a community anchor to partner with other organizations and to support city/community goals.  Some suggestions for blockchain applications in libraries include building an enhanced metadata center, protecting Digital First Sale rights, supporting community-based collections, facilitating partnerships across organizations, and more.

The year-long project will provide three opportunities for a national dialog among technical experts in libraries, blockchain technology, and urban planning and members of the information professions to discuss ways that blockchain technology can advance library services to support city/community goals.

  1. The project website and blog includes information and resources about blockchain technology, potential uses of blockchain technology by libraries, and project updates along with a blog to foster open dialog. Seehttps://ischoolblogs.sjsu.edu/blockchains/
  2. The National Forum scheduled for August 6, 2018 in San Jose, CA will be comprised of 20-30 technical experts in libraries, blockchain technology, and urban planning to identify and discuss key opportunities for libraries to serve as community anchors using blockchain technology.
  3. The Library 2.018 conference, Blockchain Applied: Impact on the Information Profession, is designed for presentations and discussion on the uses of blockchain technology in libraries. Registration in this open online conference is free to the profession and public. Scheduled on June 7, 2018 from 12:00 – 3:00 pm PDT. The call for proposals is located on the conference website.

We are seeking nominations of individuals to represent the professional associations (e.g. LITA, PLA, ULC, CLIR, ARL) and information organizations by participating in the National Forum in San Jose, CA (August 6, 2018).  Funding provided by IMLS is available to support most of the expenses (travel, lodging, meals) for the National Forum for invited participants.

Nominations (including self-nominations) are due by February 15, 2018.  Nominees should be knowledgeable about blockchain technology and libraries in order to have an impact on the recommendations that will be made and discussed during the Library 2.018 conference and National Forum.

Nominations to participate in the Blockchain National Forum should be submitted by February 15 using this Google Form.

more for blockchain in education in this IMS blog
https://blog.stcloudstate.edu/ims?s=blockchain

cybersecurity threats for schools

The top 5 cybersecurity threats for schools

BY EARL D. LAING November 29th, 2017
https://www.eschoolnews.com/2017/11/29/cybersecurity-threats-schools/

1. Link Security

From ransomware to phishing and other types of security breaches, direct contact is the number one way that you can create a vulnerability in your system. Those who commit these online crimes are finding smarter and sneakier ways to infiltrate your data every day. Sometimes the attack can even come as an email from a legitimate sender, or appear to be a perfectly normal message on social media. The goal is usually to get you to click on a link.

Solution: Make sure the security preferences for your email account(s) are set up to filter spamming, phishing and executable files that aren’t recognized.

2. Unknown Devices

Solution: Your IT system should include a solution that tracks all devices, including those not owned by your school, that enter the network.

3. Out of Date Technology

Contrary to popular misconception, user interaction isn’t always required for a cyber attack to be launched. The WannaCry attack targeted hundreds of computers all with the same security vulnerability on their Windows operating systems.

Solution: Again, an IT solution that tracks all devices is important, but one that can also check on software upgrades and block access to certain apps is ideal.

4. User Error

A data breach in Florida is just one example of the chaos user error can provoke. This issue didn’t begin with hackers at all. It began with carelessness that caused sensitive information to become public.

User error occurs regularly, and a common root of this is failing to restrict access to files or certain sites that may be compromised.

Solution: Restrict user access to sensitive documents only to those who absolutely need them, and make sure that your site architecture is set up to require a secure login for access. You may also want to create a white list of safe sites and applications and block the rest.

5. No Backup

As disheartening as it sounds, even when you take all the necessary precautions to protect your vital information, data breaches can still occur. When an attack happens, it’s often a major blow to productivity to try and get all the information back into a secure place. Worse, vital work can be lost for good.

Solution: Install a backup system on each school device that sends data to a remote server throughout the day (not just at night) to help make sure nothing is lost.

+++++++++++++++
more on cybersecurrity in this IMS blog
http://blog.stcloudstate.edu/ims?s=cybersecurity

1 2 3 5