Responsible technology use in public schools
Massachusetts Educational Technology Advisory Council
Internet Safety Task Force 2009-2010

Introduction

Implementing educational technology systems and policies within a school district is no easy task. All of the usual concerns—funding, professional development, staffing, compatibility issues, classroom management—were enough to keep administrators up at night, even before people began talking about student safety. Districts are now being asked to protect students from seeing or posting inappropriate content, becoming victims of cyberbullying, and participating in sexting.

Given these pressures, it is worth taking a step back and recognizing the tremendous importance of preparing our students for the 21st century, and the integral role that the Internet, computers, and mobile devices play in such preparation. Indeed, one of the most important 21st century skills involves the ability to navigate safely and responsibly through the vast Internet landscape, selecting the best tools and information for the task at hand.

How, then, can schools meet the challenge of providing both a safe, secure learning environment and the opportunity for students to learn? This white paper by the Internet Safety Task Force of the Massachusetts Educational Technology Advisory Council attempts to provide some guidance, through observations, examples, and resources. It is not intended to be comprehensive, but rather to provide a lens through which district and school personnel might begin to see new opportunities.

Philosophy

It is the belief of this group that the best way to both protect and educate students is to provide them an environment in which they can learn, experiment, be exposed to role models (including educators and other students), and receive feedback about their behavior. It should be no surprise that a group of educators would recommend this approach. What is surprising is the number of school districts that implement policies geared towards avoidance rather than education.

Such policies are often a result of “worst-case thinking,” an approach that attempts (but often fails) to protect against specific nightmare scenarios. In the words of renowned security expert Bruce Schneier:

Every decision has costs and benefits, risks and rewards. By speculating about what can possibly go wrong, and then acting as if that is likely to happen, worst-case thinking focuses only on the extreme but improbable risks and does a poor job at assessing outcomes.… Worst-case thinking leads to bad decisions, bad systems design, and bad security.

In public schools, this approach often presents itself in policies that prohibit broad categories of behavior or access: banning cell phones, blocking social networking sites, filtering certain topics or words. Taken to an extreme, these policies can lead to results ranging from humorous (one student was unable to do a report on his Congressman, Dick Armey, due to a keyword filter) to truly restrictive (a new policy in one Massachusetts district limits teachers and students to using only online services that have been approved by, and signed contracts with, the district).

To truly educate and protect our students, districts have to find more nuanced approaches to technology. A recent study in UK grade schools found that when schools provided students with latitude in their online use, and teachers corrected inappropriate behavior, the students learned more about cybersafety than in schools where students were “protected” behind strict filters. Professor Craig Cunningham recommends giving teachers the ability to override filters when they block access to educationally relevant content. This allows educators to exercise judgment in the classroom, which opens up additional online resources and in some cases presents a teachable moment for students.

Filtering, however, is only one small part of educational technology systems and policies. The remainder of this document recommends resources for addressing a variety of technology issues through the lens of protecting students through education rather than restriction.

"Swimming pools can be dangerous for children. To protect them, one can install locks, put up fences, and deploy pool alarms. All these measures are helpful, but by far the most important thing one can do for one's children is to teach them to swim." –Dick Thornburgh and Herbert S. Lin

Resources

The resources below are in addition to an extensive set of materials that can be found on MassONE in the TLR section . ETAC did not evaluate the MassONE materials against the philosophy espoused above.

Cyberbullying

Cyberbullying, and school bullying in general, have been in the news a lot in recent months. Here in Massachusetts, new legislation requires schools to take a more active role in the prevention and reporting of bullying, whether it occurs on school grounds or not. Nancy Willard’s Center for Safe and Responsible Internet Use (CS R I U) offers materials, such as the “Educator’s Guide to Cyberbullying,” that address cyberbullying from the perspective of building a safe school environment. Elizabeth Englander’s Massachusetts Aggression Reduction Center (MARC) also offers materials and programs for educators aimed at changing school culture to one that does not accept bullying. MARC collaborated with the Massachusetts Department of Elementary and Secondary Education to post bull y ing p revention resources for parents, as well.

The non-profit Middlesex Partnerships for Youth serves as both a resource for districts (it offers professional development and events related to student safety) and as an example of a successful model where law enforcement and school districts have come together to address cybersafety and other student safety issues.

The Massachusetts Attorney General’s office has a page about school bully prevention programs, though it does not (yet) provide any legal guidance for schools in complying with the new legislation. It does, however, link to a great Guide to Bullying Prevention from the Commonwealth.

A more student-centric resource is the “Time for Tolerance” website, which was developed by children, for children (it says for ages 9-16, but 9‑13 would probably be more accurate). This site focuses its message on building “acceptance and respect for the differences between people.” Here, bullying is treated not as an isolated problem, but one which is an obstacle to the positive goal of building mutual respect. Cyberbullying, in turn, is not treated as something that exists on its own, but rather as a particular form of bullying. The site also has a page with advice for schools on how to combat bullying.

Safety and security advice for students

The surest way to get a child to reach into a cookie jar is to tell him that he shouldn’t; there’s even research on the subject. By all accounts, the “Just Say No to Drugs” campaign in the 1980s was a failure. Yet most cyber security and cyber safety materials for K-12 students take this same approach, listing all of the things kids shouldn’t do online, often in a tone that is perceived as dictatorial rather than informative.

In contrast, the guides produced by WiredSafety and distributed by Cisco for tweens and teenagers focus on building skills that will continue to be useful throughout the child’s life: when and whom to ask for help, how to choose a safe password, how to navigate the web without falling victim to common traps, etc. The tone of these guides is conversational, gently directing their audiences to make good choices and to develop positive online habits.

Involving parents

Navigating online space effectively and safely is a life skill, just like navigating a city. Parents play a critical role in modeling behavior, setting expectations, monitoring out-of-school technology use, and responding appropriately to their children’s concerns.

The Federal Trade Commission recently published a guide for parents on how to talk with their kids about being online. (The guide is also available in Spanish and printed.) The guide emphasizes the importance of open communication and educates parents on everything from cyberbullying to parental control software.

A similar but briefer guide for parents can be found at ConnectSafely.org.

Rethinking acceptable use policies

Many acceptable use policies for students read like a list of unacceptable uses, often with a heavy dose of legalese. Written well, however, an acceptable use policy (or, stated more positively, a responsible use policy) can serve to educate and protect the district.

An ideal acceptable/responsible use policy should be written for students, not for lawyers, and should present clear expectations for student behavior when using district technology resources. The Australian state of Victoria has an outstanding template [in Word format] that is notable for the way it outlines good behavior while defining clear rules that can be enforced in the classroom. (It’s also interesting that the Victoria schools require the student and the parent/guardian to sign the policy.)

Integrating responsible use into the curriculum

In 2004, Patty Yamano at Pepperdine University studied how prepared fourth and fifth grade teachers feel in teaching their students about cyberethics. She found that while most teachers, as adults, have a strong sense of personal ethics and are able to practice that in cyberspace, they have a great deal of difficulty transferring that moral understanding into teaching cyberethics to their students. She also found that even those teachers who were teaching cyberethics were doing so in direct instruction rather than through activities and discussion, the kinds of interactive process so necessary in developing judgment.

Patty Yamano's research shows that to help teachers be most effective in teaching and practicing the everyday acts of ethical behavior in cyberspace, they also need to be educated in using technology in the classroom and in the integration of curriculum objectives and technology resources. Yamano found that these competencies are the functional prerequisites to learning and teaching cyberethics. If teachers do not know how to use technology and are not comfortable integrating technology in their teaching, they will be less able to help their students learn ethical behavior in cyberspace (Whittier, 2006).

The CyberSmart Curriculum’s lesson on managing project teams provides a great example of how to integrate technology use into a lesson about teamwork. The tools and the teamwork skills that students are exposed to in this lesson can be adapted for broader use within the classroom. This would allow an ongoing opportunity for students to experiment with, and be guided in the responsible use of, collaborative online environments.

Further reading

TeachPaperless is a blog about integrating social technology into the classroom.

Classroom 2.0 is a self-contained social network that focuses on the use of social networking and web 2.0 technology in educational environments.

TeachEng.us has a bunch of great ideas about how teachers can embrace technology. It’s geared toward English teachers, though many of the ideas are universal.

Weblogg-ed presents a more theoretical dialog about the changing face of education, with a strong bias towards embracing technology and open access in the classroom.

Tools for the 21 st Century Teacher is an e-book that describes a bunch of web-based tools and how they may be helpful to educators.

The Spartanburg (South Carolina) District 7 Technology Blog is a great example of how a district’s instructional technology department communicates with district personnel. It also highlights many examples of innovative use of technology within districts.

CyberSafety in the Classroom is an article in the June 2010 issue of DistrictAdministration that describes how some experts recommend, and how some districts are implementing integrated cybersafety education.

Technological Pedagogical Content Knowledge (TPCK) is a framework put forth by Punya Mishra and Matthew J. Koehler of Michigan State for understanding and improving teaching. It reinvents Lee Shulman’s widely adopted Pedagogical Conten t Knowledge (PCK) framework, emphasizing technology integration as a key part of pedagogy.

Contributors

This document was created by the Internet Safety Task Force of the Educational Technology Advisory Council, which advises the Massachusetts Board of Elementary and Secondary Education. The task force for 2009-2010 included:

Shelley B. Chamberlain, Director of Information Technology, Newton Public Schools

Edwin Guarin, Academic Developer Evangelist, Microsoft

Charles F. Kilfoye, Director of Instructional Technology, Northeastern University Online

Steven Mazzola, Director of Technology, Belmont Public Schools

Anne K. Sheehy, Instructional Technology Specialist, Lowell Public Schools

Thomas J. Stella, Assistant Superintendent, Everett Public Schools

Maxim Weinstein (task force co-chair), Executive Director, StopBadware

David Whittier (task force co-chair), Assistant Professor, Boston University School of Education

References

Print

Butler, Kevin. “Cybersafety in the Classroom.” District Administration, June 2010.

Fisher, Jennifer Orlet, and Leann Lipps Birch. “Restricting access to palatable foods affects children’s behavioral response, food selection, and intake.” American Journal of Clinical Nutrition, Vol. 69, No. 6, 1264-1272, June 1999.

Mishra, P., & Koehler, M. J. “Technological Pedagogical Content Knowledge: A new framework for teacher knowledge.” Teachers College Record. 108(6), 1017-1054.

Shulman, Lee S. “Those Who Understand: Knowledge Growth in Teaching.” Educational Researcher, Vol. 15, No. 2 (Feb., 1986), pp. 4-14.

Thornburgh, Dick, and Herbert S. Lin. Youth, Pornography, and the Internet. National Academies Press, 2002.

Yamano, P. “Cyberethics in the Elementary Classroom: Teaching Responsible Use of Technology.” Proceedings of Society for Information Technology & Teacher Education International Conference 2006, 3667-3670. Chesapeake, VA: AACE.

Whittier, David. “Cyberethics in the Googling Age.” Journal of Education, Vol. 187, No. 2, 1-6, Spring 2006.

Web

.mass.edu/boe/sac/edtech/

neier.com/blog/archives/2010/05/worst-case_thin.html

puterworld.com/15824/a_simple_fix_for_internet_censorship_in_schools

.edu/openbo o k.php?record_id=10261&page=9

s.gov/legis/laws/seslaw10/sl100092.htm

/

iu.org/cyberbully/

iu.org/cyberbully/docs/cbcteducator.pdf

dgew.edu/marc/index.html

.mass.edu/ssce/bullying/

dlesexpartnershipsforyouth.com/

s.gov/?pageID=cagoterminal&L=4&L0=Home&L1=Community+Safety&L2=Schools+%26+Youth&L3=School+Climate&sid=Cago&b=terminalcontent&f=community_bully_prevention_programs&csid=Cago

s.gov/Eeohhs2/docs/dph/com_health/violence/bullying_prevent_guide.pdf

nkquest.org/07aug/00117/index1.html

nkquest.org/07aug/00117/schools.html

n.org/cgi/conte n t/full/69/6/1264

ksysbycisco.com/static/content/20090629/Kids_and_tweens_Cybersafety_WEB.pdf

ksysbycisco.com/static/content/20090626/teen_cybersafety.pdf

.gov/bcp/edu/pubs/consumer/tech/tec04.pdf

.gov/bcp/edu/pubs/consumer/tech/stec04.pdf

.gov/

nectsafely.org/Safety-Tips/virtual-world-safety-tipsteens.html

nectsafely.org/Safety-Tips/virtual-world-safety-tipsteens.html

web.vic.gov.au/edulibrary/public/teachlearn/ict/Acceptableuseagreementtemplateforschools.doc

tlib.org/ p /22669

c.ed.gov/ERICWe b Portal/custom/portlets/recordDetails/detailmini.jsp?_nfpb=true&_&ERICExtSearch_SearchValue_0=EJ762979&ERICExtSearch_SearchType_0=no&accno=EJ762979

http://cybersmartcurriculum.org/authentic/lessons/9-12/managing_project_teams/

gspot.com/

ssroom20.com/

/

/

/mzimmer557/docs/tools_for_the_21st_century_teacher

o/techblog/

trictadministration.com / viewarticle.aspx?articleid=2428

.psu.edu/viewdoc/download?doi=10.1.1.91 . 7990&rep=rep1&type=pdf

or.org/stable/11 7 5860

.mass.edu/boe/sac/edtech/

Page 2 of 7