Tuesday, November 11, 2008

Graduate Research Project Rubric

I am including a link to my rubric that I am planning to use to evaluate the Descriptive Writing/Picture Narrative my students/subjects are writing and recording using VoiceThreads.com. It is adapted from the Rubric for Delaware Student Testing Program for Writing. The link can be found at:
http://www.rcampus.com/rubricshowc.cfm?code=R26W2C&sp=yes

Sunday, November 2, 2008

Elections -2008

It is difficult to believe that the Elections are only two days away. We need to be in prayer for our national, state, and local elections. If we pray, the Word of God says that He will hear from heaven and heal our land. I pray for Godly Wisdom for the people of this Great Land. May we have discerning hearts and minds. May we be led by our spirits and may we be discerning to cut through the rhetoric and distortions to vote on our core values and convictions.

These elections will determine more than who gets the title of Commander in Chief, but they will also determine the balance of the Supreme Court for many years ahead. It was reported last night that three liberal judges may retire and step down after the results of this election are completed. If liberal judges are willing to step down, our country would see changes that we are not prepared for.

Pray, pray, pray. Hear from Heaven. Take action. Vote!

God Bless America! Pray Here, Pray Now!

Tuesday, October 21, 2008

The New Literacies

Teaching with the Internet K-12: New Literacies for New Times (4th ed.) by Leu, D. J., Jr., Leu, D.D., and Coiro, J. Reflections

Chapter 1 New Literacies for New Times

A New Literacies Perspective considers the Internet as another important technology for literacy similar to pencil and paper thus learning how to effectively use the Internet is a literacy issue, not a technology issue.
There are 5 functions that define the literacies that are very important for using content from the Internet.
i. Identifying important questions
ii. Navigating complex information networks
iii. Critically evaluating information from the Internet
iv. Synthesizing it to address questions
v. Communicating the answers to others.


2. There are at least 3 reasons why the effective use of the Internet is central to our student’s success:

a. The Internet has so many exceptional resources that may be used to get kids excited about learning while learning essential content and skills.

b. The Internet opens up collaborative learning opportunities as others outside our classroom contribute the learning that takes place within our classroom. It is not just an add-on to a curriculum. It must be integrated into our content area classes.

c. There are instructional models for content areas such as Internet Workshop, Internet Project, Internet Inquiry, and WebQuest.

d. Effectively using the Internet allows teachers to make a difference because of the amazing opportunities for teaching and learning.

e. Even if these new literacies aren’t yet tested on an assessment, we can’t wait until they are to include them in our classrooms. This would be unfair to the students we teach.

f. Internet brings special opportunities to learn in socially constructed learning experiences from one another about the world around us.

3. The text tries to explain why the Internet has become so important.
a. It provides information that improves the quality of our personal, civic, and professional lives.

b. Democracy is furthered by informed citizenry which is enhanced through the Internet.

c. Trade barriers are falling and international trade is expanding and making this more of a global economy. At home, at school and in the workplace, the Internet allows individuals to make greater use of the intellectual capital they have to live richer lives.

4. A New Literacies Perspective is an integrated theoretical perspective that helps us to better understand what students need to learn about Internet use and how to best utilize the Internet in our classrooms.

Five functions are critical:

a. New forms of strategic knowledge are key.
b. Learning is often socially constructed within the new literacies.
c. Critical literacies are central to the new literacies.
d. New literacies regularly change with the influx of new technology.
e. Teachers roles change within Internet classrooms, but they become even more important (as facilitators). We become orchestrators rather than sage on the stage. We learn from one another in these new teaching and learning contexts.

Now for my reflections:

I think that the most important part of this chapter that was new for me was Figure 1-5: Examples of Skills, Strategies, and Dispositions Required by the New Literacies of the Internet and other ICT.

We as educators must be forward looking and see the amazing tool that the Internet can be in the skilled hands of students, teachers, and any learner. As students dive into using the technology though, much of these skills become very quickly actualized and intrinsic. Now kids have grown up with so much technology saturation that they are comfortable navigating the Internet from earlier and earlier ages. Yahooligans has made searching for kid-friendly material for research and fun even easier than it was 5 years ago. I think that author has a valid point that we have to help students focus on their task so that they find relevant information. But that is something that teachers are constantly doing with any classroom lesson. Now that children are getting cell phones in elementary school, they are becoming even better at texting than at writing. Instant Messaging, Skype, MySpace, Facebook, are all communities that didn’t exist just a few years ago. Who knows what will develop next with Web 2.0 tools?

Another very interesting portion of this chapter to me was the section was the section on how we are in a post-industrial, global economy with lowered trade barriers, and greater competition globally. For another course I had as a part of my graduate program, we read The World is Flat by Friedman. We discussed how even the downfall of the Berlin Wall was related to the widespread Information explosion. When people are able to share ideas and information and culture across political and socio-economic boundaries, they begin to question and critically evaluate information for accuracy and validity. We as teachers can assist students to become more critical thinkers who are able to collaborate and work cooperatively to problem solve. I agree with the authors in that we will need to pay increasing attention to informational synthesis to support the skills that will be most important in this Age of Information.

Monday, October 20, 2008

Kids Think that you don't know these words, but you need to

According to Betsy Towner of the AARP October 2008 Bulletin, There are many words that kids think you don't know. They include google: searching the web especially Google, vlog: a Web log of video entries, wikidemia: a term paper that was researched entirely on http://www.wikipedia.org/ , BFF- Best friends forever, IDK- I don't know, OMG- Oh my God! ROFL- rolling on the floor laughing. TMI- too much information, sick- extremely cool, mash up- to take elements of existing pieces of music, usually of different genres, and combine them in a new song; also the resulting song.
To learn more of words that tech savvy kids and youth are using, check out AARP's website:
http://bulletin.aarp.org/yourworld/powerof50/articles/power_of_50__what.html

Thursday, October 16, 2008

What is all the excitement about E-Learning?

If you would like to learn all about E-Learning, check out the following wiki on Current Issues in Educational Technology created by graduate students at Salisbury University in Maryland. Click here: E-Learning

Tuesday, October 14, 2008

Internet Safety Presentation

For a link to my college Web Site go to Standard 6 Evidence for Indicator A and D:
http://students.salisbury.edu/~db44715/Portfolio/Standard6.htm I will be linking to a Multimedia Presentation relating to the topic of Internet Safety. Stay tuned.

Monday, October 13, 2008

Promoting Safe and healthy use of technology resources

Deborah Breda

As a graduate student who is interested in technology, I have chosen to address how educators can best promote the safe use of technology resources with middle and high schools students. Standard VI of the ISTE Technology Standards is concerned with social, ethical, legal, and human issues of technology usage. According to the Internet Access in U.S. Public Schools and Classrooms:1994-2005 report, the survey found that in 2005, 94 % of public school instructional rooms had Internet access whereas in 1998, only 51 % had Internet access (Wells and Lewis, 2006). Given the increase in accessibility to the Internet, teachers and parents have reasons to be concerned about students’ access to material that may be unsafe or inappropriate. According to the Wells and Lewis report (2006), nearly 100 % of public schools that have had access to the Internet used blocking/filtering software; and 96 % of schools reported monitoring by teachers or other staff to prevent student access to inappropriate material in 2005. The Children’s Internet Protection Act (CIPA) states that in order to receive federal grants for technology and e-rate discounts, the use of filtering or blocking software must be in place. CIPA also states that a policy for Internet safety must address: Access by minors to inappropriate material; safety when using e-mail, chat and other electronic communications; and unlawful activities by minors. For the purposes of this discussion,
inappropriate material will be defined as material harmful to minors. “Material harmful to minors represents nudity or sex that has prurient appeal for minors, is offensive and unsuitable for minors, and lacks serious value for minors. This material is often referred to as soft-core pornography. There are ‘harmful to minors’ laws in every state. Note: Indecent and harmful to minors material is legal for adults but illegal when knowingly sold or exhibited to minor children” (Hughes and Campbell, 1998).

For the purposes of this discussion, pornography will be defined as,
“All sexually explicit material intended primarily to arouse the reader, viewer, or listener. The Supreme Court has said that there are four categories of pornography that can be determined illegal. Illegal pornography includes indecency, material harmful to minors, obscenity, and child pornography” (Hughes and Campbell, 1998).

Even with the protection that CIPA provides, caregivers of children have additional reasons for concern. According to Anick Jesdanun, in an AP news article (July 19, 2007) on Yahoo! News, one in 25, or four percent of U.S. teens have been asked for sexually explicit pictures of themselves while online. This study was conducted with phone surveys of 1,500 Internet users ages 10-17 (Jesdanun, 2007). In another recent survey, nearly three-fifths of the states responding stated that they have defined the meaning of being “media literate,” in order to ready students for the twenty-first century information revolution, but more is needed. The State Educational Technology Directors Association (SETDA) conducted a December 2006 survey of 38 states and D.C. respondants entitled, “The Changing Media Landscape: Ensuring Students’ Safety and Success in School and in the Future Workplace” (http://www.setda.org/web/guest/toolkit2007/medialiteracy/nationalperspective) . For the purpose of this discussion, I will use SETDA and Cable in the Classroom (CIC) definitions of media literacy: “Knowing how to access, understand, analyze, evaluate, and create media messages on television, the Internet, and other outlets. It also means knowing how to use these and other technologies safely, productively, and ethically” (Stansbury, 2007). The report states that 29 states said they have “safety policies and/or guidelines to protect children from online predators, to protect personal information online, to prevent cyber bullying or hacking, and to counter copyright violations. The SETDA organization also furnishes a Toolkit that provides a compilation of resources for parents and teachers about Internet safety and media literacy (Stansbury, 2007). Safety online is such an important critical issue.
My interest in the topic of Internet safety came about when my sister-in-law, Beth, and my nephew, Tyler, had pornographic material pop-up during a computer session in a public library in the mid 1990s. Tyler was around eleven years old, and he gone online at a local New Jersey town library. Tyler told his mom what he had seen. Beth spoke to the librarian and told him about the offensive materials her son had just encountered online. He explained that this was a public library and he could not be responsible for what had happened because they did not have any filters on the computers. These computers were used by adults as well, and nothing would be done. To summarize the events that followed, Beth made attempts to get action taken and was unsuccessful. She tried to appeal to the local mayor, town council, and library Board of Trustees, but they were not in favor of any censorship. Beth continued to see what could be done to prevent the unsafe use of computers by children in the local public library. Eventually, Beth was contacted by Congressman Bob Franks of New Jersey. Congressman Franks requested that she testify at a Congressional press conference addressing the danger to children online. As a result of this incident and follow up after the incident, I became aware that many of our public libraries and schools had computers for student use without any filters/blocks to protect or safeguard our children. As my sister-in-law began to educate me, I took action and checked in my local community to see what protections were in place. My local Public Library had filters on the computers as early as the late 1990s. As a parent of young children, I was comforted by this. When I became employed at a local elementary school as a teacher, I became even more aware of the need for filtering and blocking software for all student computers. I also became aware that the local County public schools require students and faculty to sign an acceptable use policy (AUP) agreement before using the Internet resources on school computers. My classes often had use of the computer lab with Internet access. I wanted to integrate technology into my lessons without the risk of student exposure to material that was harmful to minors.
After reading Critical Pedagogy (Wink, 2005), I have learned to reflect critically and to think about new ways of looking at an issue. In researching the critical issue of how to keep minors safe on the Internet, I have been faced with other questions related to my topic. Here are a few I’ve pondered:
How do we protect children from unwanted pornography without
limiting their ability to search important sites or violating their privacy?
What are some of the disadvantages to having Web filters?
Do Web filters work?
Do we want to trust software to keep our students safe?
Who do we want to teach responsible use of the Internet ?
Should students be allowed to override filtering software for academic purposes?
What should we include in acceptable use policies?
What barriers hinder schools from improving Internet security?
How effective are acceptable-use policies (AUP) agreements?

I have learned that there are advantages and disadvantages to using blocking and filtering software. This is a very complex issue. Filters can protect students and teachers from accessing inappropriate material at school. Blocking can keep students from going on social chat sites during academic time. However, these devices can also prevent students from visiting “clean”, appropriate sites if the key words in the web address (url) cue the software to block the site. Oftentimes, the administrator or information technology (IT) staff isn’t sure how to override filtering software. Tech-savvy students know how to get around the protections by using proxy servers. Since software alone cannot keep students safe while online, I think a school district should have a multifaceted approach to cyber security. CDW Government, Inc., a division of CDW Corporation, conducted a survey of K-12 public school and produced a report entitled, “K-12 School Safety Index 2007” (CDW-Government [CDW-G], 2007). When IT directors and security directors were surveyed, they shared some of the tactics that schools use to protect kids from dangers on the Internet. These included: blocking or limiting Web sites; placing computers in view of adults; monitoring Web activity; and maintaining a closed district network (CDW-G, 2007). As I thought about ways to improve secure Internet access for middle and high school age students, I began to think that students would benefit from safety education. I propose that students will be more likely to make wiser choices on the Web if they understood the dangers of cyber security breaches than if they are uninformed. If so many youths have been exposed to pop-ups, unwanted sexual harassment, and cyber bullying while using the Web, it seems logical that educators and parents should partner in educating students about how to protect themselves from inappropriate Internet experiences. The CDW-G survey reports only 8% of reporting districts provide Internet safety training to students, 15% incorporate adult supervision as a security measure, and 18% monitor Internet activity. I don’t think that software should substitute for educating students about the hazards of identity theft, physical danger, and the potential impact that can occur when students post unsuitable content on a social networking site. The student’s future academic and professional plans can be hindered if future employers access their MySpace or Facebook accounts and find material that does not reflect the image that they are looking for in future students or employees. Students recently have been known to post inappropriate photographs and digital images of themselves or of friends that might be considered pornographic. Many youth do not realize that the Internet is an extremely dangerous public forum where voyeurs prey on unsuspecting teens.
Since Web filters are imperfect, I recommend using a multifaceted approach to insuring students have safe access to the Internet. I think that Web filters should be used by school districts. Schools should have a competent and adequately staffed IT department to make adjustments and overrides when the filters are too restrictive. I think filtering is the first line of defense, but I also think that tracking and monitoring of online behavior should be incorporated in the school system. According to Dr. Steve Garner, professor at Salisbury University, EDUC 585, Technology Tools for Teaching and Learning, accountability and consequences need to be addressed in an AUP agreement. In a graduate course on technology tools, Dr. Garner taught that a school’s AUP should address a list of acceptable and unacceptable uses, copyright violations, illegal downloads, exchange of personal information, access to Internet without supervision, access to chats, access to private e-mail, access to blogs and social networks like MySpace, access to games, and the consequences for violations to the AUP. Another line of defense in addition to AUP agreements is education. Education plays a key role in safe Internet access for pre-teens and teenage students. Parents and/or guardians of students need to be educated about how to monitor students’ network access as well. They need to understand how to oversee the use of technology in the home. Parents need to be encouraged to talk about the dangers of unsupervised Internet usage. Students should be taught not to give out any personal information online. As a teacher, I will take action to instruct teens, parents, and the school faculty in order to make them aware of the benefits and pitfalls of online media. I have located several Web sites that can be helpful to parents and teens: www.ctap4.org/cybersafety/ , www.staysafeonline.org/practices/eight.html. www.protectkids.com/youthsafety/index.htm. , http://www.blogsafety.com/., http://kids.getnetwise.org/safetyguide/tips/teens.php., http://www.safeteens.org/., and http://www.securityfocus.com/news/10940. These sites provide information that will help stakeholders understand the critical issues pertaining to safe use of technology resources such as the Internet.
As teachers, parents, and administrators join in partnership to educate themselves and their students about the safe use of the Internet, there may be obstacles to accomplishing this goal. One hindrance to protecting youth on the Internet is that some students who are tech savvy are not necessarily safety savvy (Einsenstock, 2006). Students intentionally use encrypted abbreviations such as POS, ASL, and F2F which translate to mean “parent over shoulder,” “age, sex, and location,” and “face-to-face” meeting. Parents and teachers need to understand the millennial generation and their “tech-speak” so that they can caution youth about predators (Eisenstock, 2006). According to the CDW-G report on school safety (2007), the greatest impediment to Internet safety was “a lack of funding and sufficient staff resources.” Other hindrances enumerated in the report were hardware/software barriers, lack of user participation, and lack of defined policies (CDW-G, 2007). Students in this twenty-first century need to be able to access, analyze, evaluate, and create using a variety of media. The Internet is an essential tool in their educational arsenal. Many teachers are hesitant to venture into uncharted waters because of fear of the dangers of the Internet. Creating a positive learning environment where students can safely access educational media and incorporate the digital world they are familiar with will enhance their learning. Educators and students need to think critically about how to responsibly use the emergent technologies available through the Internet.

References

CDW Government, Inc. (2007). CDW-G K-12 school safety index 2007. Retrieved on July 26, 2007 from http://webobjects.cdw.com/webobjects/docs/pdfs/CDWG_School_Safety_Index_2007.pdf.

Eisenstock, B. (2006, July/August). New media, new rules: Simple advice for complex times: parenting a digital generation. Retrieved July 20, 2007 from
http://www.ciconline.org/c/document_library/get_file?folderId=13&name=CIC0706NewMedia.pdf.

Hughes, D. and Campbell, P. (1998). Excerpt from Kids online: Protecting your children in cyberspace. Grand Rapids, MI: Fleming H. Revell Company. Retrieved July 26, 2007 from http://www.protectkids.com/dangers/porndefinitions.htm.

Jesdanun, A.(2007, July 19). Study: 1 in 25 youths asked for sex pics. Yahoo!®News Retrieved July 20, 2007 from http://news.yahoo.com/s/ap/20070720/ap_on_hi_te/sexual_photos_online_7;_ylt=Av%20ItYTmdQTmljWWnwMbt424E1vAI
.

Stansbury, M. (2007, July 12). ESchool News online ™: Where K-12 education and technology meet. Groups push for media-literacy education:SETDA, Cable in the Classroom call attention to the importance of media literacy in preparing students for an increasingly digital world. Retrieved July 16, 2007 from http://www.eschoolnews.com/news/PFshowstory.cfm?ArticleID=7252 and http://www.setda.org/web/guest/toolkit2007/medialiteracy/nationalperspective


Wells, J. and Lewis, L. (2006). Internet access in U.S. public schools and classrooms:
1994-2005. Retrieved July 15, 2007 from http://nces.ed.gov/pubsearch/pubsinfo.asp?pubid=2007020.


Wink, J. (2005). Critical pedagogy: Notes from the real world (3rd ed.). Boston: Pearson Education, Inc.

Wednesday, April 9, 2008

Professional Development Conference at Delmar

Today I participated in several Professional Development sessions at DMSHS. The sessions were informative and helpful. Ann Lewis was an excellent presenter who encouraged ELA teachers to use specific strategies to enable students to become proficient readers and writers. Aleta Lewis, and Stephanie Miller shared strategies with teachers and paraprofessionals that would easily be transferred into the classrooms across a variety of content areas. The school district welcomed teachers from Laurel and Seaford to participate in the Sussex County Organization to Raise ELA Scores session 2. Thank you to Mr. Shawn Larrimore for putting together such a fine professional development workshop.

Tuesday, April 1, 2008

Twitter another Web 2.0 tool

Well, I'm experiencing cognitive dissonance again. I have tried my hand at adding another Web 2.0 tool to my arsenal. I joined Twitter and added the content to this blog. I want to see how it works and how it might be useful in a classroom setting. You can try it out, too, and then I won't feel so alone. DNB

Wednesday, March 19, 2008

New Technology Web 2.0 Tools

Hello Everyone,
I wanted to share a couple of new tools that I have recently been trying my hand at. There is VoiceThreads and zoho. With VoiceThreads you can upload a picture and then record a comment related to what that picture or image means to you. You can then share the picture and comment on a private website location and invite friends or family to view and leave comments as well. I find it really user friendly and if I can do it , believe me, so can you!

I also have learned about www.zoho.com. which is a web based word processor tool. You can use it to create documents that others can edit and collaborate on with you. If you haven't tried it, just give it a try. It is very similar to a word processor, but you can use it anywhere you can get online without having to copy your document onto your flash drive to take it with you.

I hope you will try this for a new experience.
Thanks for taking your time to read my blog,
Deb

Monday, March 10, 2008

Youth Group at LiveWire in Delmar

Delmar has a super Youth Activity Center on State Street for youth 12-18 years of age on the 2nd and 4th Monday each month. Teens can come and enjoy fellowship, music, and fun with other kids. Youth leader, Andrew Meney, Delmar graduating class of 2006, leads the group along with Pastor Ronald Fullerton. Kids enjoy DDR~ Dance Dance Revolution, video games, pool, ping-pong, etc. in a adult supervised environment. Cornerstone Community Church sponsors the center twice a month. Adult volunteers greet and supervise the students. The purpose of the youth night is to bring students together outside of school to hear positive messages that will encourage them to be strong citizens with character and faith.

Sunday, March 9, 2008

Beef and Dumpling Fundraiser a smashing success!

Today's fundraiser for the band was a hit! We served over 300 people and had some leftover! The help of volunteers made the event flow smoothly. Thank you seems such a week way of expressing our gratitude for all of the help that people gave. The community really came to the aid of the kids and getting their new uniforms. Way to Go Delmar!

Saturday, March 8, 2008

Good Morning!

Good Morning everyone! It's almost time to set your clocks forward for Daylight Savings Time. I am trying my hand at blogging to see if I like this new Web 2.0 tool. I am too tired to spend much time right now, but perhaps another time. Have a blessed day!
Delight yourself in the Lord and He will give you the desires of your heart! Trust also in Him and He will bring it to pass. Psalms 34

TTYL