Technologies Blog Highlights
Over the last eight weeks, I have had the privilege of reading a variety of my colleagues’ blogs on emerging technologies. Each week the class investigated new technologies to improve the practice of teaching and learning. This week the task is to review all the posts and highlight technologies discovered by classmates. The technologies I chose to highlight are Monitoring Technology Misuse & Abuse and I-Safe.
URL: http://digitalcitizenship.net/uploads/T.H.E.JournalArticle.pdf
Carolyn stated that Monitoring Technology Misuse & Abuse is a five step plan for creating a digital citizenship program in schools. It helps administrators and teachers decide if their school’s technology is being properly used, misused, or abused (Ribble & Bailey, 2004). I chose this technology because it is very important that learners know how to properly use the school’s technology and does not misuse it. She also brought about a very strong point that “It is time to focus equally on the effective use of technology as well as the appropriate use of technology. We cannot afford one without the other if we expect to produce productive citizens in the 21st century” (2004). I would use the five step plan in my Career Exploration class as a discussion board assignment. This will cause the students to explore Monitoring Technology Misuse & Abuse and learn how to appropriately use the technology as a digital citizen. Also, I would have the class to present a five minute PowerPoint presentation on the five step plan of Monitoring Technology Misuse & Abuse on addressing cyber-bullying.
URL: http://www.isafe.org
Uchenna stated that I-Safe was created in 1998, and provides digital citizenship education to adults on how to use Information Communication and Technology (ICT) without abusing it. The endless list of misuse and abuse includes hacking into school servers, using e-mail to intimidate or threaten students, illegally downloading music, and plagiarizing information from the Internet, using cellular phones during class time, accessing pornographic Web sites, and playing video games during class” (Bailey and Ribble, 2004). I chose this technology because it helps educators implement internet safety policies to address the unethical act of plagiarizing information from the Internet. Plagiarism is a serious problem in today’s educational environment, especially in the online classroom (Jocoy, 2006). I would incorporate I-Safe in my Career Exploration class by assigning it as a learning group exploration project. The students would be required to explore the emerging technology of I-Safe and create a significant learning experience for learners and meet an 80% proficiency level on the learning experience checklist. Also, I would post a video of the benefits and how to use I-Safe. This should help build and improve the students’ technology and online communication skills.
References
Jocoy, C. (2006). Plagiarism by adult learners online: A case study in detection and remediation. Retrieved from http://www.irrodl.org/index.php/artcle/plagiarism/242/466
Ribble, M. & Bailey, G. (2004). Monitoring Technology Misuse & Abuse. The Journal Online.
Retrieved from http://digitalcitizenship.net/uploads/T.H.E.JournalArticle.pdf