Panel Topic #7: The conflict between school security issues and the innovative technologies of Web 2.0 - Classroom 2.02024-03-28T10:20:03Zhttps://www.classroom20.com/forum/topics/649749:Topic:46888?groupUrl=office20con&commentId=649749%3AComment%3A47296&x=1&feed=yes&xn_auth=noGreat stuff. I like Dr. Muir'…tag:www.classroom20.com,2007-09-06:649749:Comment:472962007-09-06T01:48:53.266ZSteve Hargadonhttps://www.classroom20.com/profile/SteveHargadon
Great stuff. I like Dr. Muir's solution.
Great stuff. I like Dr. Muir's solution. There are of course Federal g…tag:www.classroom20.com,2007-09-05:649749:Comment:472582007-09-05T23:01:35.269ZPamela Livingstonhttps://www.classroom20.com/profile/plivingston
There are of course Federal guidelines about filtering that have to be in place if a school or district is to accept Federal money, including eRate funding. However, we just were talking about this last night in a grad school course I teach - our "IM guest" was the wonderful Dr. Mike Muir of the Univ. of Maine, one of the architects of Maine's laptop program, and a thinker of great repute in educational technology. He said he thinks we need a three-pronged approach - 1. filtering, but set low,…
There are of course Federal guidelines about filtering that have to be in place if a school or district is to accept Federal money, including eRate funding. However, we just were talking about this last night in a grad school course I teach - our "IM guest" was the wonderful Dr. Mike Muir of the Univ. of Maine, one of the architects of Maine's laptop program, and a thinker of great repute in educational technology. He said he thinks we need a three-pronged approach - 1. filtering, but set low, so the most offensive stuff doesn't make it through 2. engaged teaching - so kids are very interested in what's going on 3. policies to address inappropriate actions by the students. At The Peck School where I was tech dir., and described in my book (please attribute if you quote as my publisher requests it so "1-to-1 Learning: Laptop Programs That Work" from ISTE, 2006, Livingston, P.) we came up with a student-centric easy way to teach appropriate use. All computer activities had to be L-Legal, A-Appropriate, R-Responsible, and K-Kind - and we taught what that meant. It became a shortcut with the kids, you'd ask, "was what just happened here LARK" and you could see them silently going through the letters in their heads L - A - R - K and stopping at the letter and saying, "oh, yeah, you're right." Because if we are to teach these ideas we need to make sure it's clear. I would link 2,3 and 7. We ne…tag:www.classroom20.com,2007-09-05:649749:Comment:471152007-09-05T19:25:23.862Zmichael hotrumhttps://www.classroom20.com/profile/mhotrum
I would link 2,3 and 7. We need to get administrators thinking about how to use and teach effective use of technologies rather than ban and censor. Children do not learn by our dismissive and fearful stances - they just entrench their own ways and disregard our intentions. We have to be able to redefine our positions on learning - not entrench the "old" way - and be willing to teach by modelling appropriate behaviour and allowing student freedom, and repositioning ourselves as shepherds of…
I would link 2,3 and 7. We need to get administrators thinking about how to use and teach effective use of technologies rather than ban and censor. Children do not learn by our dismissive and fearful stances - they just entrench their own ways and disregard our intentions. We have to be able to redefine our positions on learning - not entrench the "old" way - and be willing to teach by modelling appropriate behaviour and allowing student freedom, and repositioning ourselves as shepherds of learning, not owners/masters of education and enculturation. The internet is not disappearing - the networks are not diminishing - and the students will increase the use of the web on their own time - we can choose to be poart of this and evoilve or ignore it at our, and their peril.