eSchool News ran a recent article summarizing a survey conducted by the Business Software Alliance. More than half of the young people responding admitted to downloading music and about 1/3 to downloading games. A significant proportion can provide an adequate definition for copyright and understand the content they are downloading is protected.
The survey suggests that the problem most frequently occurs at home and that parents are aware of what their children are doing.
BSA suggests a “Play it Safe in CyberSpace Curriculum it helped developed for Weekly Reader. This material offers resources for students, teachers, and parents.
Small things amaze me. I am sitting in my popup camper in a county campground a few miles outside of Madison, WI. Our daughter is an undergraduate at the UofW and we are visiting.
This is not a fancy campground and there are few special ammenities – no phone jack, no cable, and pretty much no lights. There is a shower with hot water. What amazes me is that I am on the Internet. We take a laptop with us on nearly all outings and I may write or we may watch a DVD in nearly any setting. When I turned my machine on tonight, I had a wireless connection (and it was unprotected). I actually do not know how this is possible. The only scenario I can imagine is that one of these fancy RVs around us has both a satellite connection and is using wireless within the vehicle. Must be nice. I am sitting in my camper and simply borrowing a little bandwidth.
A significant component of our books have emphasized student multimedia projects. Whether intended for the Internet (web pages) or sharing from a classroom computer (e.g., HyperStudio, PowerPoint, eZedia), the fundamental idea is that multimedia products serve as an effective capstone to an extended learning experience. Creating a product, in effect teaching, encourages a depth of understanding less likely to be achieved when no concrete representation is required. Offering a product to others is also like to serve as a source of motivation.
Oppenheimer’s criticism of K-12 technology strategies included several concerns assoiciated with multimedia projects (e.g., lack of contribution by some students, dead time while students wait for assistance from the teacher, struggles with software and hardware). A theme in several of these issues might be described as inefficiency. The time required in completing the project was argued not to justify the learning that was accomplished.
The question of efficiency is complex and addressing the nuances of this topic is beyond the intended scope of this post. Part of the issue may involve the skills advocates and critics have in mind. Skills of collaboration and higher level thinking may be best developed by dealing with complex and messy tasks. Other learning goals may not require such experiences and may be achieved less efficiently in such settings.
Is there a way to broaden the perspective of “constructing to learn?” Some of our early attempts to justify multimedia authoring were based on work done under the heading “writing to learn.” A recent review (Bangert-Drowns, et al., 2004, Review of Educational Research, 74(1)) has encouraged me to consider this area of research again. Tasks associated with “writing to learn” need not be lengthy. For example, college instructors teaching very large groups of students may be encouraged to take the last five minutes of class and have students write about a topic from the lecture. One of the findings of the meta-analysis was that longer writing assignments were not necessarily the most productive.
Perhaps we should consider working to create software applications and classroom ideas consistent with a form of multimedia writing to learn. It might be argued that in some ways writing to learn is a limited form of self expression and that some learning experiences are not most effectively captured in text. Sounds (e.g., music, bird calls) and images (e.g., molecular structures, anatomical structures) are part of what students encounter and attempting to manipulate such represents as text seems artificial.
Other conclusions from the review – middle school writing to learn has been less productive, writing about the process of learning has been productive. Great reference list for those interested in this topic.
We spend some time in the summer with relatives in a rented place in Alexandria, MN. These “relatives” have given me trouble over the years because I opened our “Integrating the Internet for Meaningful Learning” book with a story that included them and I described them “only” as relatives. The story described the role of the Internet in helping the community of Grand Forks deal with flood of 1997. This flood required the unplanned evacuation of nearly the entire population of Grand Forks and East Grand Forks and the Internet became a way for the community and acquaintances to reconnect in the aftermath. We drove to our relatives (Scott and Denise Ellingson) in Hinkley, MN and spent several weeks there before returning to Grand Forks.
So – the unnamed relatives are now named. The younger generations are shown in the following pictures.
NASA offers educational materials related to the Cassini-Huygens mission to Saturn. The materials are intended to capitalize on interest in the current mission to teach math and science concepts.
I watched Michael Moore’s “Fahrenheit 9/11” last night. I found it disturbing, but I would highly recommend that others see it. I recognize that there have been complaints contesting the factual accuracy and slant of the film. Why should this be surprising and, if true, why would the complaint be unique to Michael Moore? By way of comparison, I checked my audible.com current best seller list – “My Life”, “Charlie Wilson’s War”, “Plan of Attack”, “Dude, Where’s My Country”, “Against All Enemies”, “Hegemony of Survival”, “Sleeping With the Devil”, “Deliver Us From Evil” were within the top 16 NonFiction Best Sellers. Any bets that these books have somewhat different stories to tell?
My take on the core message of “Fahrenheit 9/11”? There is a hidden agenda and hidden players behind current events. The players include an assortment of political leaders from several countries and the agenda involves huge financial opportunities for these players and the companies or groups they represent. In addition, the human cost of unwittingly implementing this agenda falls to military personnel nearly exclusively from lower income groups.
What does any of this have to do with education or technology? Perhaps a great deal. As technology provides greater access to an increasing amount of information, information literacy seems an essential skill. This concern is often presented as – you can’t believe everything you access through an unedited medium such as the Internet. However, we are also learning that you can’t believe everything politicians, the news media, etc. tell us. One of the first skills in evaluating web resources – who authored this page and what does he/she have to gain by you accepting the information the page presents. Perhaps careful consideration of public information sources should always have been in order, but immediate access to very different perspectives now makes this reality very apparent (see list of best sellers provided above). Awareness of contrasting positions is a good thing.
We offer a database of the online resources we encounter in our activities. There are approximately 550 links in our collection. Approximately twice a year I go through the entire collection to search for dead links. I have taken to keeping track of he number of links that do not function and I am unable to locate with a Google search. This time the number was 12. Obviously, the number of links is partly a function of the type of resources I collect. However, this seems a small % and one way to quantify the stability of web resources.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.