Beyond Management of the Machine

Management of the 1:1 lap top situation in my classroom is not a big deal for me anymore, I’m relieved to say. Don’t get me wrong – it is certainly on my mind. All the time, in fact! I do have to plan out my lessons, thinking in terms of grouping together the computer work, so students aren’t powering up and down through a 45 minutes lesson, which would lose me valuable time.  I use DyKnow Monitor and students know I may be watching them. It’s a wonderful deterrent, despite the lag I sometimes experience. And probably my most frequent management strategy is directing the students to “put your lap top to sleep” or simply “turn the lap top around to face me” so that it doesn’t pose a distraction as I’m giving instructions or presenting a mini-lesson.

What does endlessly fascinate me, however, is all the amazing things we can do with the lap tops – teachers, students, ordinary people in all walks of life  – to simply our personal organization. Here are a few of the tools I have been exploring recently.

Thanks to our IT Director, I have migrated from a simple “snipping” tool to the more advanced Snagit. This is the king in the world of free tools that our school has included in the teachers’ lap top image. Snagit is an easy screen capture software that comes bundled with Camtasia Studio Pro so teachers can create screencasts, training documents, etc.

Compared to our other clunky Windows-associated Snipping Tool, this simple screen grab tool has an impressive list of image editing and annotating features. We can simply copy, save, convert, or edit images, but what I really like about it is that it keeps a history of all things “snagged” in the past for easy  recall. They fan out at the bottom very nicely! It’s window, pictured above, looks a little daunting, and might turn some people off at this point. But it shouldn’t send anyone back to the Snipping Tool. It’s easy to add callout boxes, to send via email with a simple cut and paste, but then there are extra dashing features like the addition of a page curl using the image bar. Students don’t have Snagit yet. That’s the only snag :) right now.

Then there’s Dropbox. This kind of cloud-based file back-up is certainly the wave of the future. Our IT department is seriously threatening to shut down our mainshare access at the end of this year, because it is too costly, so they have been investigating alternatives to offer us during this weaning stage. And this option seems pretty cool to me. Simply, files that we used to save on the mainshare, or on our lap top D-drives, will be accessible anyplace anytime. We can leave the machine behind. We can walk out of the building. No little flash stick thumb drive thingy to lose. Usually tragically! No bulky external drive to lug about.

It is a tri-platform tool. All the basic file types – OneNote, Word, Excel, simple images, etc – can be accessed at home by using a web-based portal or a synchronized computer at home. As long as there is an internet connection. I can simply log into www.dropbox.com and I can get my files instantly. Of course, I can retrieve photos and documents on my iPhone too.

And it’s so easy to use. After installing a Dropbox folder on my computer, files that I save into the folder are automatically saved in the cloud. (For those of us in Asia, that cloud is actually hovering around Singapore, apparently!) It has a very handy “show deleted files” button so you can check back over what you have done – wittingly or unwittingly. You can set it up to sync one way only, to avoid any headaches. And here’s a biggie: the Dropbox people will recover file errors they have made. Now, it is a tool that has been available for some seven years already, so this very powerful, flexible tool seems like a pretty sure thing. The bad news is, for reasons I can’t fathom, it is currently only available for 14-year-olds and up, so that pretty much nixes it for the middle school. It would be perfectly lovely to share a folder with students and thus do so anywhere, anytime. But, for now at least, I will have to continue to rely on the OLC and GApps for file-sharing with students.

Anyway, the first 2G is free. Then there is bonus memory available for inviting friends to join – up to a maximum of 8G. The IT-Director tells me that the school is working on a handsome deal for teachers (because we are being pushed off the mainshare) so we should wait before purchasing for ourselves. But in the meantime I see Dropbox as the long-awaited back-up option for my personal files and photos. Yay!

The funkiest untapped tool I learned about was Evernote. This kind of combines the features of Snagit and Dropbox, allowing the user to capture anything and access it anywhere. The best way to describe it may be as a clipboard for all my thoughts. I can capture a note of simple text, an audio note, an inknote, stuff that I have copy-pasted (e.g. clipping a website – a full page or part of a page, with an annotation option). And I don’t need to worry about pressing “save.” (With my huge reliance on OneNote presently for shared planning and teaming, I have rolled back into bad habits regarding that “save” button!) Everything goes into the cloud, syncing whenever I am online. The list of snippets just goes on growing, a repository of multi-formatted notes whenever I need them.

Actually, Evernote sounds like an organizational nightmare, but the snippets can be filed away into sections, much like OneNote. You can Twitter, Facebook, email, or link the snippets. So it’s like a pumped up StickyNotes (which I have loved, but also loathed because the notes/reminders are then trapped on my desktop). It’s bigger and better than Diigo and Delicious because the user can gather together a greater range of …stuff. Again, 2G is free. The school is investigating an academic version with far greater gig. And, again, its use as a tool for middle schoolers is limited by the 13-years-old-only caveat. Doh! But, in the meantime, I’ll be investigating it for personal use.

Until now, this post has largely ignored my students, because they are just too darn young to be able to use these tools for another  year or so. Therefore, I thought I’d better drop in another tid-bit that is ALL about the students: Hoot.me

This is a cute little concept, one of a number of tools that seeks to blend socializing and studying. It aims to harness the power of Facebook as an online socializing tool – where millions of students are hanging out anyway – and turn its purpose towards study and support. Basically, Hoot.me is an application that turns the social networking site into “study mode.”

While the user remains “inside” Facebook, he or she is moved away from the wall and newsfeed. With a more atypical Facebook prompt, “What are you working on?” students can join live study sessions on that topic, complete with group video-conferencing and/or smart chat. (Smart chart allows students to type in mathematical formulas). Study sessions are saved and archived so students can search for answers in previous sessions. And these study sessions could, conceivably, be used as” virtual office hours” by teachers who are prepared to give help outside of school campus time. (Making this a more attractive option, teachers don’t have to “friend” students to be able to invite them to participate in a study group, and the sessions can be private and therefore not show up in the news feed.)

So, that’s my wrap-up of recent discoveries to enhance lap top use in and beyond the classroom. I am so glad to have that first freaked-out year of 1:1 lap top use under my belt. Yet, even in that first year, once we had the school-wide routines down – the Technology Use Policy (TUP) firmed up; the file-naming protocols sorted; file saving, storage, and sharing figured out; and my own classroom rituals defined – I have been able, for the most part, to move beyond management to enhancement of teaching and learning. Enhancement and exploration of tools, such as these, to make it that much more fun to be doing this teaching gig!

My Digital Footprint Catches Up With Me

Ironically, not long after our last f2f class discussion about digital footprints and the importance of managing our online identities, I learned that my own digital footprint had grown by a photo and a couple of comments past my personal comfort level.


AttributionNoncommercialNo  Derivative Works Some rights reserved by FatMandy

I had brought the conversation about digital footprints into my own classroom with the Fahrenheit 451 theme-related question: “Does the media control you (and how would you know)?” As mentioned in a previous blog, I have found that the following video clip (“Digital Dossier” – a project related to the Digital Native concept, and more specifically, John Palfrey’s book, Born Digital) has elicited quite a sober response from students in the past.

YouTube Preview Image

I have shown this clip a few times now since Palfrey visited our school and shared it with us. And I had always assumed that the students’ wide eyed silence represented a merging of perspectives between teacher and student – that they were finally beginning to “twig” that your digital footprint is a real, permanent, growing, parallel-self database growing out there, largely beyond our control. That this prospect, in turn, gives credence to the idea that the media really does control you to an extent unknown and unknowable. I, personally, feel some helplessness along with this realization. I even see some menace in the idea.

But this year, I discovered I was  mistaken. (Once again! Should I be surprised anymore?!) The students’ response, left to blossom with a little self-reflection, was one of awe, yes, but also one of fascination. Perhaps they were empowered by the sense of having a vastly greater impact on the digital scene than they had previously imagined. Some, I gathered, were a little daunted, but by and large the follow-up exercise produced little ripples of thrill around the room as students completed a digital-use survey.

Although I set this as an optional activity, many of my students were quite enamored with the process of measuring their digital footprint using the  Personal Digital Footprint Calculator.

This tool (as described in an article by the ReadWriteWeb people) “walks you through a questionnaire that calculates your impact based on the responses to questions about your computer usage, email usage, digital camera/camcorder usage, web downloading habits, potential surveillance areas, and geographical information, among other things. …[I]f you take the time to fill out the Digital Footprint Calculator correctly, you’ll be presented with your current ‘daily digital footprint,’ in megabytes. You can then click ‘Start Ticker’ to launch your own personal ticker that increments over time according to your digital information creation. You can even upload this, along with the .swf file, to your own web site and share your results with others.”

This process proved to be a real hit and students were soon busy with survey questions and comparison, and then also surprise at the big numbers that were churning out as a measure of their impact on the digital landscape. Their delight in big digits reminded me again of the generational divide between my feelings about being digitally exposed and their pleasure in this measure of being “out there.”

Here are a few of their digital footsteps:

(My students all came up with higher numbers than the example ticker created with wizard defaults, as presented by IDC, a Marketing and Intelligence Forecasting Firm and creators of the Calculator, sponsored by EMC).

But, back to my own digital footprint. Literally within days of this video/activity/lesson, I received a brief email from one of my quieter students. The subject line read:

“this picture of you taken by [student name] during the field trip”

…and in the body of the email:

“I print-screened the picture and comments.”

(So much for email etiquette, greetings and salutations, etc. But that’s another blog!)

Anyway, when I saw the screen shot attached to the email, I was shocked. It had been captured from a Facebook page. I was the subject of a photo, taken by a student without my knowledge, and now posted on a different student’s account. The commentary beneath lead me to believe that somehow the photographer had been able to upload it directly into his friend’s account (passwords freely shared amongst friends?), with only grudging assent from the owner of the account. I teach these two students, and each had commented. At least two other students, who I know but do not teach, had added comments.

Facebook Photo Surprise - edited

I was stunned by my own lesson hitting so close to home. By my digital footprint finally catching up with me this way. Suddenly my teaching points took on a sharp poignancy regarding becoming aware and beginning to manage your online identity.

Now, the image was not at all demeaning. (I had half a mind to ask for a copy, but that would have diluted the point of the conversation I was going to have to have with the students!) And the comments were more positive than negative. But it was a bit embarrassing, and I would also call it inappropriate.

I called out the two boys in the very next class, and said: “I believe my digital footprint has recently grown by one particular photo and several comments.”

They knew immediately what I was getting at. The Facebook account owner gave the photographer a bit of a shove and an embarrassed exclamation to signal blame-appointment. And the photographer, red-faced and grinning that furious teenage-boy grin of shame, tried a lame: “But it was a nice photo.”

I didn’t need to say much more. They didn’t seem to wonder about how I knew about it. I wasn’t going to give up my source, but it was interesting to note that they didn’t even question the notion that the public eye had somehow seen into a private account.

I asked them to help me reduce my footprint by a photo and several comments. And they shuffled away. (No apology, incidentally. But I wasn’t going to make a scene.) The next day when I made a vague reference to it, the boy said he had removed it.

So there it was – online reputation house-cleaning, one photo at a time.

It occurred to me that what my quiet student-friend had done for me in blowing the whistle on these guys, was exactly the way I want to think we can approach personal digital footprint management. And, it follows too, cyberbullying. I don’t think these two boys would have even remotely associated their actions with this concept, but I certainly was made to feel uncomfortable by the knowledge of that photo and those comments.

But if other students, friends, peers, acquaintances are willing to share what they know, in the way that my student did with a simple emailed screenshot, then what I think we can grow is a kind of Honor Code equivalent in the cyber-realm.

With social media well beyond the control of any one individual, I think this community-watch group-regulation, is critical.

Who is using who here?

Social media tools give us more scope than ever to do what comes naturally: to rewrite our lives to reflect what we truly wish they did.

Which international school educator hasn’t written home to less adventurous friends and family ensconced in middle class suburbia about their new adopted country and omitted to mention … oh, let’s see … the frightful disregard for pedestrians on the roads. Or the neglected, burping sewer system that has to be dodged on the way to work. Or the choking levels of dust pollution courtesy of Gobi desert land degradation. Or the dodgy electrical work behind the sink in the bathroom that the local landlord swears will be dry and safe. Or the fact that even a school on the other side of the world can have the same cast of unsavory characters and political strife and report-writing stresses that any school back home offers up.

Of course, we put our best face forward when we are conscious that our words and pictures will be enshrined for posterity. So, does the invention of Facebook and Twitter change any of that?

AttributionNoncommercialShare  Alike Some rights reserved by escapedtowisconsin

Some people think it does. In the drive to post interesting status updates and profile photos, there are those who stretch the truth beyond an adverb or three in order to dress up the public story of their lives. People, it seems, are doing certain things specifically for the purpose of sharing them on social networking sites. Or, more precisely, so as to manipulate the way they will be perceived online.

Some examples from student reader comments to a New York Times article: “I Tweet, Therefore I Am”

“Sometimes people make their updates angry or depressed so people can be afraid or pity them. ”

” …my friends and I took pictures because we needed a new default profile photo. Without Facebook or Twitter, we wouldn’t have to go through all the trouble of getting a new default; we would just take pictures for memories. Now we take pictures for others to see us the way we want them to see us.”

“Instead of spending time with people to get to know them better, we check their Facebook or Twitter and judge them by what they post.”

“The blend of technology and two other characteristics of our era – communication and the need for individualism – is what makes these sites so popular. “

Teachers know that it is a basic rite of passage for young people to explore their identity. Like parents, we are often left to clean up the resulting mess! But society has changed so this ritual has changed also. These days it doesn’t matter so much where you come from or what your parents do or where you are right now. Anyone can recreate themselves and express themselves using social networking tools. Everyone can find out who they are, interact with others, and make an impact on the world with this technology. But now we also do it because others are watching.

(That’s a deliberate pronoun choice there: “we.” I am deliberately not singling out students now because Facebook has proven to have great appeal across the generations. This is not necessarily a trait distinguishing them from us.)

Any social networking site user can go to great lengths to cultivate and manage their online identity. They can choose how they want to be judged. But now the advent of this technology has significantly changed behavior. As one student commented: “We find ourselves ‘performing’ for others.” It’s not just words any more, but actions that serve our basic desire to re-write personal histories. So, does this extra step mean social media is shaping the consumer as much as the consumer seeks to shape their self-expression? When your life is an act to replay on the stage of Facebook, how significant is this? Is it just the business of life as usual transferred to a new venue – or has the new venue changed the quality of the performance? And do we head backstage much anymore?

AttributionShare  Alike Some rights reserved by boltron-

Sickened by Cyberbullying

Attribution Some rights reserved by mondi

I just read another long, sickening news story (New York Times, December 4) on cyberbullying. There’s plenty of them out there – both cyberbullies and headlines about them. And it’s plain to see that one anecdote after another follows a horrifyingly common pattern:

  1. …Parents notice their child has become withdrawn, miserable; grades drop; skips school.
  2. …Parents prod and student doesn’t communicate.
  3. …Eventually parents dig up the cause: cyberbullying.
  4. …The medium is a social networking site like Facebook or instant/text messages
  5. …The method maximizes the anonymity of the internet and the ease with which identities can be forged; the tyranny of the majority mobilized in a psychological savaging of the victim, unbridled by individual inhibitions
  6. …The cyber-content is sneering, hurtful, obscene; mob mentality quickly escalates the situation.
  7. …The cyber-evidence is unimaginably gruesome, and particularly chilling because it is perpetrated by peers, other young people, often known to the victim, some supposedly friends of the victim; whole groups of peers are attracted by this opportunity to “get in on the action.”

In their own words (article excerpts):

“It’s not the swear words. They all swear. It’s how they gang up on one individual at a time. ‘Go cut yourself.’ Or ‘you are sooo ugly’ — but with 10 u’s, 10 g’s, 10 l’s, like they’re all screaming it at someone.” – Inspector Brunault

Fat bitch.” – someone comments about a 9-year-old girl on her teenage brother’s Facebook wall.

About the proud Facebook photos posted by a 13-year-old New York girl, another girl comments: “hideous” and “this pic makes me throwup a lil.” If she had to choose between the life of an animal and that of the girl in the photos, she continues, she would choose the animal’s, because “yeah, at least they’re worth something.”

At least I don’t take pics of myself in the mirror like a homosexual midget.” Also, “you smell weird.” And “ur such a petaphile.”- Facebook tauntings issued from an impersonated profile.

  1. …When the victim’s parent sees this, the parent is shocked and beside themselves.
  2. …Seeking outside help presents a daunting prospect: Schools seem either impotent or unwilling to handle off-campus matters. The police make very slow, hard work of investigation, if they deem it worthy of the effort at all; prosecutions are rare for “first-time offenders.” Direct contact with website admin or ISPs can  yield disappointing results.
  3. …Parent-intervention or efforts to stop the cyber-bullying may be met with an escalation of the bullying.
  4. …Addressing the perpetrators, if they are discovered, results in anything from dismissal & shoulder shrugging from bullies and the parents of bullies, to pointed fingers at the victim.
  5. …Further investigation reveals the victim has tampered with or deleted crucial evidence, and/or retaliated themselves under the veil of internet anonymity so that the line between victim and bully is blurred and parents are left bewildered and helpless about how to move forward.
  6. …Parents strive but struggle to keep a closer watch over their children’s internet use. All the young people, victim and bully, resent parental monitoring.
  7. …Kids find a way around any barrier erected by their parents. And the vicious cycle continues.

It’s like Lord of the Flies – a fight for survival amongst children who lost their innocence way back in the jungle somewhere. And when the adult arrives to rescue the little savages and bring them back to a world of law and order and civility, his arrival is greeted with bewilderment and tears of grief. Nothing can ever be the way it was before they all came to the island; and the trouble now is that the surprised officer has, himself, lost sight of the ship that would get them off the island.

AttributionNoncommercialNo  Derivative Works Some rights reserved by Today is a good day

It all just makes me sick – physically sick. I don’t plan to offer any pretty platitudes to wrap up this post. I’m guessing there are plenty of unhappy endings.

“Keep Out!” Problematic Perspectives on Privacy

Attribution Some rights reserved by Nathan O’Nions

I guess I had it all wrong.  I was under the assumption that my students really did not care to concern themselves with the hassle of privacy settings in their fast-paced, highly social online worlds. My image of students as quadruple-clickers, seething and raging through any instance of slow computer processing/downloading, suffering serious cases of “Hourglass Syndrome” at the first sign of slow-poke technology, just didn’t align with habits of mind like cautiousness and reflection, which I have associated with the nuanced machinations of privacy settings. Uninhibited social net-casting seemed to be the typical disposition of the digital native, while trepidation, fear, even outright rejection of online communities and sharing tools seemed befitting of the doddery digital immigrant.

But it’s not a case of such opposite extremes, as it turns out. Actually, young people’s expectations have evolved as privacy protection options have expanded, and  Heather West, Policy Analyst at the Center for Democracy & Technology, posits that  young people  value their privacy online a whole lot more than I had first thought. New online technologies are providing internet users (digital native and immigrant alike) with more control than ever before over their information. And young digital consumers have come to expect it.

Research backs up her claim. A new study on behavioral advertising, suggests that the 18-24 year olds care the most about how their personal information is used to make decisions about them to deliver news, advertisements, or discounts. One of the authors of the survey told the  New York Times, “We sometimes think that the younger adults in the United States don’t care about this stuff, and I would suggest that’s an exaggeration.”

Actually, it’s been marketers who have often promoted the idea that kids don’t care about giving up their personal details, citing behavior on  Facebook as anecdotal evidence, and pointing particularly to the sheer volume of content kids share through such online social media. But this interpretation of the younger generation’s internet use relies on a narrow view of privacy values. And it is quite flawed.

Back to Heather West: while kids care about their privacy too, and in that way the natives and the immigrants aren’t so different after all, West still frames her argument as a generational one. The gap is in how the two groups approach the concept of privacy, not their care factor. “Digital immigrants,” she says, “tend to think about privacy as the ability to conceal information from others. Digital natives instead share information within certain contexts, and with granular privacy controls on that information.”

Attribution Some rights reserved by rpongsaj

Teachers like me will be heartened to learn that teenagers themselves are actually taking steps to manage their online profiles and keep sensitive information away from unwanted eyes (including both strangers, and parents). According to studies by  Pew Research Center Internet and American Life Project, “while many teens post their first name and photos on their profiles, they rarely post information on public profiles they believe would help strangers actually locate them such as their full name, home phone number or cell phone number. …Some 55% of online teens have profiles and most of them restrict access to their profile in some way. Of those with profiles, 66% say their profile is not visible to all internet users. Of those whose profile can be accessed by anyone online, nearly half (46%) say they give at least some false information.” (Of course, young people post fake information not only to ensure the security of their online world, but also simply to be silly, or even to be malicious … but more on that in another blog.)  In fact, according to the Pew study only 6% of teens make their first and last name publicly accessible on social networks.

As one of the Pew articles put it,  they want their cake and they want to eat it too. It’s not “an all-or-nothing public or private paradigm.” Internet users, young and old, expect to be able to choose levels of privacy and levels of exposure to the public. West says they want what we all want: “the opportunity to choose not only what content is public, but who has access to that content. This includes privacy control for photo albums, status updates, and personal information.”

Privacy advocates might have an uphill battle against big business, but this new understanding of how kids value online privacy should  help them make their case to legislators. Meanwhile, I can rest assured that I am on the same side of the fence as my young charges, at least in this case, with the shared perspective that control over personal information is a consumer right, not a privilege.

AttributionNoncommercialNo   Derivative Works Some rights reserved by yohann.aberkane

Right in Front of their Faces

I suppose at some point all the whining, worrying, and complaining needs to give way to action, which takes into consideration the fact that the “electronica” is here and the kids are all over it. As educators we know that good teaching starts where the kids are at, and then prompts them to go beyond. So, I guess, that’s where I’m going – just mindful of the excesses.

Certainly, there are plenty of examples of educators and educational institutions capitalizing on their students’ interests and taking their curriculum and learning goals to the students – instead of expecting it to work the other way around.

Purdue University is one such example. According to an October 6 article, a technology team at this university have taken the concept so far as to marry together student learning and Facebook social networking.

Although Facebook is often cited as a distraction to serious learning in schools – at TAS it is blocked to middle school students – the Purdue team’s efforts at “Mixing work and play on Facebook” have led to the creation of an application that sets up an e-learning environment within the site. “Mixable” operates a lot like a traditional study group, except that the meeting space is on Facebook, and the learning and materials are shared and managed by student users.

Using course registration information, Mixable provides a virtual space for students that adheres to the basically free-form principles of Facebook use: users are free to discuss whatever they want, to make posts available to some users and not to others, and to participate or not. In order to “bring academics into social media,” the application does much of the administrative work such as automatically creating groups and pages for students enrolled in the same courses. It also organizes files the images, videos, links, podcasts, and documents that students post to the course page into library spaces, so they can be accessed more readily – all within Facebook.

In order to explain why this learning management tool has been created specifically for Facebook, Gerry McCartney, Purdue CIO, invokes the bank robber, Willie Sutton. When asked why he robbed banks, Sutton apparently said, “Because that’s where the money is.” McCartney follows this up with: “So why go to Facebook? Because that’s where the students are.” Perhaps Facebook could yet catch on as a learning interface like some other Web 2.0 tools have. It’s in the hands of the students now, quite literally.