For several decades, several variations of the technology acceptance model have been used to explain and predict the use of technology by individuals and within organizations. In general, when users perceive IT to be easy to use, effective for their tasks, and similar to that used by others; they are more likely to use it Read More
Category: Edtech for IT
IT Policies and Procedures for Different Users
Protocols and practices are ostensibly objective. The same rules apply to all users and, especially those that are controlled by technology are applied with precision. The reality in schools, however, is that not all users have similar capabilities and some protocols and practices appropriate for one group of users may not be appropriate for others. Read More
IT Policies and Procedures
The policies that guide the definition of IT-related protocols and procedures are also affected by rules that regulate school operations. Because many IT users are children, and much of the data collected and stored by schools are about children, school and IT leaders are obligated to conform to certain laws and regulations that vary by Read More
Web 2.0 & Privacy
Teachers are always in search of lessons, units, and activities that will help them teach. In the decades since web 2.0 tools arrived on the world wide web, teachers have been able to (for example) create online quizzes and make them available to students; after they take the quizzes, teachers can then check their progress. Read More
Elevator Pitch on Data Security
Hackers are individuals or groups who try to gain access to others’ computers. Phishers are individuals and groups who try to trick users into giving them access to a computer system. Both hackers and phishers are generally after either computing capacity or data. In some cases, they want to use our computers for nefarious purposes, Read More
On Collaboration in Decision making
To minimize the threats of incomplete or inaccurate understanding of the work done by others, effective IT decision-making in schools requires the collaboration of individuals who approach them from very different perspectives, and it is unusual to find single individuals who have expertise in more than one of these perspectives. When designing and redesigning IT Read More
Ethics are Active
Stephanie Moore and Heather Tillberg-Webb’s Ethics and Educational Technology: Reflection, Interrogation, and Design as a Framework for Practice by Stephanie L. Moore and Heather K. Tillberg-Webb (9780415895088) continues to deliver on the promise summarized on the cover. Ethics, we have seen, should be approached from a design perspective. As designers, we are encouraged to be Read More
School Users of IT
Compared to IT users in business, school populations are different. They bring different skills to the IT they use, they need more flexibility more often than business users, and their needs change over time (only to return to the original need). These characteristics arise from the facts that students have emerging literacies; it is not Read More
How We Handle Ethics in #edtech
Ethics and Educational Technology: Reflection, Interrogation, and Design as a Framework for Practice by Stephanie L. Moore and Heather K. Tillberg-Webb (9780415895088) could not have arrived as a more propitious time. For six months, we in education (k-12, community college, university, professional, and all other settings) have been dealing with ChatGPT and other generative AI. Read More
#edtech for IT: Digital Divides
Since about 2010, one-to-one computing and cloud-based computing have come to dominate school computing. In many schools, students carry Chromebook with them, and sometimes they take them home. (While the market share of educational computing devices is difficult to ascertain, estimates are that Chromebooks represent over 60% of the devices purchased for school users.) Some Read More