Sunday, July 22, 2007

Online Voting

Ethics for the Information Age Chapter 6

I was fascinated by the section about online voting. I had known some of the benefits and risks but this section did a very thorough job of laying them out. Some of the benefits include giving more people a chance to vote, improving efficiency of vote counting, and lowering costs. Some of the risks include potential privacy risks, the increased chance of buying votes, and the risk of vote tampering. I have always been concerned that if we begin online voting, the vote could be tampered with by hackers. Of course, in the long history of elections, there have been many cases of election fraud. However, I would think many hackers would take it as a challenge to change the results of the election even if by only one vote. I could also imagine an election where the side with the best hackers would win. The side who could change as many votes as possible and leaving the system without a trace would win.

Privacy Issues

Ethics for the Information Age Chapter 5

I found the section about privacy and trust very interesting. Privacy is on the rise in our society. One-family homes, televisions, automobiles, and other things allow us to go about our daily lives without interacting with many people. The "small town" feeling in which everybody in the community knows everybody else and what they do is on the decline (although not entirely gone). However, with so much privacy, it can be hard to determine who to trust. A good example of this is credit reporting. Banks and other companies are in the business of lending money to people. However, if they just lent money to everybody, many people would not or could not be able to pay them back. Thus, credit agencies exist to keep track of pertinent information so banks can make informed decision when determining who to lend money to. The credit report exists as a form of trust between the bank and the customer. However, the trust comes at the expense of privacy. Sensistive personal information is collected and sold to organizations requesting it. Negative information is often recorded with little or no explanation. A person who has to pay late because of a crisis may look just like a person who was intentionally trying to steal. False information can easily makes its way onto the report and it is left to the customer to put the effort into removing it. There are many horror stories of people who have had false, negative information put into their credit report because of company errors. Companies refuse to admit mistakes and negative information can remain with little concern from the company who put it there. Credit reporting is meant to prevent untrustworthy people from lending money. However, credit reporting punishes trustworthy people and can often harm them. This violates the Kantian idea of never using people as means to justify an end.

Saturday, July 7, 2007

Larry Magid: Keeping Kids Safe On-line

I agree with many of Larry Magid’s opinions about online safety. I agree that the internet is too valuable to keep from kids and that kids need to learn appropriate ways of using the internet. From my own experience, I know it is easy for kids to get by the internet filters at school. I observed some kids getting into games directly blocked by the filter (the games were not inappropriate just non-educational). They did this by googling the game and getting on through another site that wasn’t blocked. I found his websites very helpful and I will use those sites as well as others to guide students toward safe and respectful internet use.

Ensuring Student Privacy on the Internet

I read this article because I take this issue very seriously in my classroom. Every once in a while, I will catch a student trying to sign up or log into a site that asks for specific personal information. I do not believe students should be giving that information at school or at home. I often question why I am giving that information in situations not involving the internet. I think there are too many people out there willing to misuse that information for their own gain. Just look at all the identify theft issues going on with information stolen from a company not the person themselves. If that information were never collected and stored, the problem would not exist. I do not believe teachers should have the right to provide personal information for students instead of parents. However, the more I think about it, I am probably doing so in an indirect way. I am sure personal student information is getting back to the company with the Accelerated Reading and Math programs. Thanks to this article, I will probably take a few more walks down the hallway to give academic information about students rather than give it over e-mail.

The Educator’s Guide to Copyright and Fair Use

This article gets down to the nitty-gritty on what media is acceptable to use in the classroom. The article gives very specific guidelines to follow if you plan to use an item that may be copyrighted or protected in some way. The general rule provided is that if you are not sure if a work is copyrighted or prohibited from use, seek permission from the holder just in case. I really liked that the article gave instructions for how to seek permission for use. This article would be very helpful to me if I had a technical question about what I could use in the classroom. I typically do not run into problems that could be answered by this article. I am careful to not load unauthorized software, show clips taped from television, etc. if nothing else than to set a good example for the kids. In the past, I have taped shows from PBS but I made sure I followed the instructions provided on their website for such use. I did not have this problem in my classroom, but I noticed that students were using copyrighted pictures from websites for Power Point presentations. The article did not answer my most pressing question on the issue (which I think I know the answer to but am not quite sure) which is can I show a DVD I have purchased legally to my class if it is for instructional purposes only.

Blue Nowhere: Computer Addiction

I just love the description of the hackers in this novel. I find it very interesting that the fingers of hackers are calloused over and they often break their keyboards. That shows an obsession I am not even close to achieving. I also love how Wyatt spends a lot of time obsessing over Pop Tarts even when he is offered better food. The prison he was in had to set special protocals to prevent him from gaining access to the internet. He could even turn basic appliances into modems and such.

Blue Nowhere: Real World vs. Computer World

I find it very interesting how the real world and the computer world are seperate but often intertwined throughout this novel. Phate is playing a "game" that started on the internet but then carried over to the real world when the online game was shut down. Phate could not be a "real" person unless he was online. When he was in the real world, he was always social engineering and pretending to be someone else. I also found it interesting that the team tracking Phate produced many leads online but those leads were often anticipated and resulted in damage being down to the investigation. However, many leads often surfaced through good old-fashioned police work and these often put Phate on the run (even though he came out on top until the end). I also found it interesting that Wyatt and other hackers in the story did all of these great exploits on the computer but still kept an ethical framework.

Thursday, June 28, 2007

Assistive Technology Benefits All Students

I found this article to be extremely interesting just because I would like to get some of this assistive technology in my classroom. I know some of the technology is available to special education students in the special education classroom. However, I would like to get the technology for my classroom. I was especially intrigued by the programs that would read highlighted words to students and the program that allowed students to scan books and have them read. Some of the special education teachers in my school are writing a grant for the classroom amplifying system. I am excited about the prospect of using that system. I also like how the founder of the company was motivated by his own and his child’s needs. He is actually making technology that would be helpful to him.

Filtering Software

I believe filtering software is absolutely necessary in an elementary school classroom. The only question is how the filtering software is managed. So many malicious websites are set up so they may be found by accident (or on purpose) by kids. Unfortunately, you often cannot perform web searches without bringing up a whole list of inappropriate sites. I am sure many people would relish the thought of their inappropriate material making its way into schools.
I also believe some important management steps must be taken. First, the teacher should take the responsibility to teach students ethical ways of using technology, how to avoid trouble, and what to do if you accidentally do something wrong. No matter how carefully teachers monitor, students will find a way to misbehave. Second, a mechanism must be in place to easily make blocked sites available for teachers. I actually had a website specifically created to support one of the classroom textbooks blocked because the web address was too long. The website is still blocked. I find that ridiculous.

In Classroom , Computers Often Yield More Glitz Than Guts

I completely agree with the article. The debate over whether or not technology is increasing student learning will not be decided by what type of technology is in the classroom. Instead, the important factor is how the technology is used. If students are left to do what they will with the technology in the classroom, not much learning will occur. Teachers must find meaningful and productive ways to use the technology in the classroom. Technology used in this way can introduce students to worlds they may not be able to visit and help students/teachers navigate around obstacles to learning. For instance, in my previous class about balanced literacy, I learned about TrackStar. TrackStar allows you to make a guided tour through internet sites about a topic. TrackStar allows you to annotate each site so you can specifically communicate to students what you want them to do at each site. This type of activity can significantly enrich learning in the classroom. Instead of just having students google “weather,” I can give them specific websites they will find useful about weather.

Thursday, June 14, 2007

ISTE Standards Self-Evaluation

While my students get to experience many of the activities in NETS performance indicators for grades 3-5 (I teach 4th grade), we only have the opportunity to significantly touch on a few of the standards. We have many opportunities to use input/output devices, discuss issues with technology, determine what technology is useful for a situation, and determining the accuracy and bias of an online resource. While I consider myself at least a somewhat technology literate person, I could do a better job of providing opportunities to my students in the classroom. A day does not go by that I don't use technology to enhance learning in my classroom. Of course, some days are more effecient than others. I do a pretty could job of achieving the majority of the indicators for teachers, but I could, of course, do much better. I find that teachers (especially this teacher) are usually hindered by either the lack of a specific type of technology or the overwhelming nature of the technology that is possessed.