Monday, February 9, 2009

E-Learning Assignment - Session 4

Section 1 - Face to face environment

Physical setting : Computer Lab


1. Implementation issue : Classroom management

Strategy

To turn an ICT-integrated classroom into a conducive learning place and develop students’ “higher order thinking skills”, teacher needs to position herself such that she can monitor to ensure that students are involved in the class activities set by her. Each student’s cognitive development is different. Teacher can flash on the screen and give out non-ICT tools like printed instruction sheets that help them with the lesson and outlines functions that students need to access often. Before a lesson starts, teachers can adopt the strategy of doing a brief recap of the previous lesson and move onto to the current lesson. This clearly shows the students how to proceed onto to the next lesson. When their lesson is completed teacher needs to wrap up by connecting what they learn to the next lesson. This can be done using concept maps.


Providing meaningful scaffolding as in worksheets, students will understand and complete their lessons. A teacher’s “with-it-ness” ensures that she can conduct the class by guiding students who are having problems at the same ensuring that the rest of the class is proceeding with the lesson (Lim CP et al, p. 394).


Sharing out of work among teachers, student helpers and technology support staff helps the teacher to focus on ICT teaching activity. This facilitates constructive learning. Designated advanced and assistant students can help their peers who are not IT-savvy and also take care of the routine work such as to collect and distribute lesson materials. Technology support staff can assist when technical failure occurs. Teacher also needs to ensure proper resource planning as in there are sufficient technology related hardware, software and peripherals for the entire class in order not to cause any lesson disruption.


Teacher needs to put in place clear discipline-specific procedures and educational rules (Lim CP et al, 2005). This will ensure that students will be motivated to abide rules and conduct themselves accordingly before, during and after class as they know teacher’s expectations, objectives, lesson sequence and their individual roles.


2. Implementation issue : Time management

Strategy

Teacher can better control the lesson by using timer to indicate that it is time to move on to another task. Progress of the lesson will take place without breaking the momentum of the class


3. Implementation issue : Teacher ITC Literacy

Strategy

Pre-service and in-service teachers should look upon technology as a evolutionary and progressive learning opportunity (Zhao Y, 2002). Armed with a positive attitude, teachers must keep abreast with technology and ICT literacy by attending ICT workshops.


.


Section 2 : On-line environment

1. Implementation issue : Cyber-bullying

Strategy

Cyber-bullying is “bullying using technology” with an intention to harm and harrass others. One strategy is to enforce a strong message that cyber-bullying will not be tolerated and the severe consequences to it. A nation-wide anti cyber-bullying campaign, school workshops, talks, publicity bulletins and raising awareness are intervention strategies. The government, youth groups, police departments, schools and parents can partner to work towards promoting children’s cyber wellness and eradicate cyber-bullying.


Schools can use the MOE’s Cyberwellness Programme to tackle the cyber-bullying and internet pornography issues by educating and empowering the students. Students should learn to take accountability for their actions. School curriculum must also include lessons on cyber-bullying and internet pornography. Interactive channels of communication should be established so that students will not fear coming forward with their problems. Parents need to play an active and vigilant role in supervising their children’s internet usage. They should become IT-savvy so that they are well-equipped to provide the support and protect their children from cyber-bullies.


2. Implementation issue : Internet pornography

Strategy

Students should be made wary of the dangers of giving their personal details, particulars, family and friends’ details and their whereabouts to strangers on the internet and social network. Paedophiles with the protection of anonymity, can easily chat up and befriend children with the intention to exploit them. Parents must make children understand the dangers and must be kept informed of their children’s internet activities.


School counselors and the National Committee on Youth Guidance and Rehabilitation are two places where help can be sought. An intervention strategy is schools and parents can ensure that they switch their web browser to “safe search” mode and install filtering software. Parents can install the McAfee Parental Control which has filtering protection for instant messaging and chat rooms and the Predator Guard which effectively scans all text on computer screen in software and captures objectionable messages and languages


References - Journal article

Campbell, M A (2005). Cyberbullying : An old problem in a new guise? Australian Journal of Guidance and Counselling 15 (1) : 68- 76.


Lim, C.P, Pek M.S. Chai, C.S. (2005). Classroom Management issues on ICT Mediated learning Environments. Journal of Educational Multimedia & Hypemedia, Vol. 14, p 391 – 414.


Lim, C. P., Teo, Y. H., Wong, P., Khine, M. S., Chai, C. S., & Divaharan, S. (2003). Creating a conducive learning environment for the effective integration of ICT: Classroom management issues. Journal of Interactive Learning Research, 14(4), 405-423.


Zhao, Y., Pugh, K., Sheldon, S., & Byers, J. L. (2002). Conditions for classroom technology innovations. Teachers College Record, 104(3), 482-515.


Internet Resources

http://www.cyberbullying.ca

http://www3.moe.edu.sg/edumall/tl/cyberwellness.htm

http://videoweb.nie.edu.sg


Videos

http://videoweb.nie.edu.sg


Radio recordings

Talk with cyber security expert:

http://www.3news.co.nz/audio/Warnchildrenofdangersurgescybersecurityexpert/tabid/375/articleID/52454/cat/73/Default.aspx


No comments:

Post a Comment