Wednesday, 27 June 2012

Technology Tools Assessment

Throughout the course of my journey here in ED609, my classmates and I were made to use numerous technological tools that many of us have never even heard of, let alone exposed to.  It is startling to realize just how many there are at our disposal, and even more startling to realize how often they are ignored.  The following are eight tools that I have made use of during this course, along with my personal observations for each.  To help you decipher these assessments, please take a look at my rating legend

⚫ ⚫ ⚫ ⚫ ⚪

PROS
free
user friendly
safety features
numerous apps
prevalent
CONS
numerous updates
apps not updated as frequently
java script issues





Moodle

PROS
free
user friendly
numerous functions
grade-keeper
notifs for messages
CONS
no notifs for changes
timezones/dates are off







PROS
free
user friendly
numerous functions
online storage
secure
easy file-sharing
CONS
difficult to switch between accounts








 

PROS
free
easy file-sharing
great organization
houses numerous binders
CONS
boring layouts
not very diverse
lags between options





PROS
special teacher promos
dynamic
plenty of variety
online storage
pre-made templates
CONS
lags in loading
not all functions are free






Weebly

PROS
free
user friendly
variety in designs
pre-made layouts
CONS
simple designs
not that easy to manipulate





Wix

PROS
free
variety in designs
pre-made layouts
numerous templates
dynamic designs
sleek, profesional look
CONS
not that user friendly
difficult to manipulate







DoxWox

PROS
free
presentation-sharing

CONS
limited functions
limited file-sharing
difficult to manipulate



References
  
Unicode characters retrieved from http://dmmarks.com/UnicodeChars.html

Pop-up window thanks to http://paste.plurk.com/

All screencaptures were taken and edited by Jonah Santiago

Monday, 25 June 2012

Individual Presentation Breakdown

Unable to display content. Adobe Flash is required.

If you are unable to view the video, click here to view it on Screencast.com!

Here is a great website that taught me everything I know about animating .gifs on Photoshop!

Image Reference
[Agueda Johnston Middle School picture].  Retrieved June 24, 2012 from http://www.aijms.net/attachments/Image/images/AguedaJohnstonSchoolGuam.jpg

[Okkodo High School picture].  Retrieved June 24, 2012 from http://ebmedia.eventbrite.com/s3-s3/eventlogos/22864490/2465159358-4.jpg

[University of Guam logo (1)].  Retrieved June 24, 2012 from http://www.flexclassroom.com/uog/logo.gif

[University of Guam logo (2)].  Retrieved June 24, 2012 from http://www.uogfound.org/uogendowment/wp-content/uploads/2011/12/big_G.jpg

Music
Artist:  "Sweet Moments"
Teacher:  "Sunny Day"
Student:  "Mini Adventure"
Technologically Proficient Professional: "Rise to the Top"
End Credits:  "Happy Moments"
Free background music from JewelBeat.com 

Tools Used
Photoshop CS3
Jing
Screencast
Media Player Classic
MS Paint
IPhone 4
Blogger
Hex Codes
#E11588
#5CCFFF
#FFDB5C
#51D147
#B148DC



Statistics
Total number of frames:  333
Total number of files:  82
Total number of images:  13
Total number of hours:  Too many  Not enough

Saturday, 23 June 2012

Digital Safety Reflection

If there is one thing that this project has taught me, it is that I still have so much more to learn.  Easily the youngest of this summer semester's small class, it stands to reason that I likely have the most experience when it comes to the Internet amongst my classmates.  I was in my early teen years when I was first exposed to it, and it has been over a decade since then.  My relationship with the Internet has only grown stronger.  And yet during this last project with my partner, I found myself shocked over all the information I had researched.

My partner and I were to present on the subjects of pharming and phishing.  Before this assignment, I never even knew what the two terms meant - or that they existed at all.  I had always referred to the ideas under the blanket phrase of identity theft.  Little did I know that there were very specific ways of obtaining one's personal information.  Without this assignment, I would not have known that pharming deals with the hacker actually deal with redirection to fake websites (Pharming).  It is so much easier to fall for a pharming attempt, because I tend to believe that once I am at the website, and it looks legitimate, then I am safe.  Thanks to this project I can consider myself blissful in my newly gained knowledge.

Screencaptureof our Prezi presentation
For this project, we decided to make use of one of the presentation tools we had both been avoiding for over two semesters - Prezi.  Personally quite comfortable with Miscrosoft's PowerPoint, I always refrained from straying to newer (and perhaps even greener) pastures because it had always looked so complicated, and I never truly had the time to learn how to use it, and use it to its full extent.  Even after this project, I cannot claim any real mastery of the tool.  Certainly, I know my way around the canvas now, but only in the way a tourist knows her way around Times Square using a map she bought off a shady street vendor that had been rained on with the ink all smeared.

Click here for the full-size version!
Regardless, Prezi proved to be as exciting and enticing as others lauded it to be, though I do have one regret.  Apparently, Prezi does not upload animated .gifs.  Originally I had created a background with Photoshop for the presentation that was meant to animate (as seen on the right), but once I uploaded the image, it remained still.  Nevertheless, my partner and I produced a presentation I can still be proud of.    Our combined efforts created not only a Prezi presentation, but through the use of Jing and Screencast, it can also be presented without either of us actually needing to be there!  Despite the technical complications during class, we still plowed on and was able to provide our classmates with the research we had collected.

The other presentations were just as informational and eyeopening.  I thought the topics addressed were relevant and important to grasp, not only as adults, but as educators.  The entire unit seemed to cover all the grounds.  As adults, we now have better knowledge on how to protect ourselves thanks to the presentations on phishing, pharming, and privacy.  As educators, the presentations on cyber-bullying and fair use practices are invaluable.  I found the presentation of cyber-bullying, specifically, to be very helpful.  I am reminded of the handful f workshops from school that addressed the issue, which only just goes to show how prevalent it is becoming.  Now educators and parents must not only worry about face-to-face bullying, but must now also look for signs and ways of prevention against bullying that happens online, where it is much easier to hide the evidence.  Years ago, cyber-bullying wasn't nearly so mainstream.  According to the website, StatisticBrain, 52% of students report being cyber-bullied... which just so happens to be the exact same percentage of teens who do not tell their parents when the cyber-bullying actually occurs (2012).  It is terrifying to realize just how prevalent cyber-bullying has become.

If I could only create one lesson that could be centered around digital safety, I would want to focus on that.  I would shock students, first of all, with the statistics, before drilling into their heads just how even the slightest thing can be construed as cyber-bullying.  It seems to me that teenagers nowadays are not fully aware of the gravity of their words.  The media desensitizes them into believing they can say whatever they want to say with no repercussion.  I have had students say phrases that would normally be considered harassment or threatening, but when confronted about it they always insist they are simply kidding.  What they do not seem to understand is that it might not be so funny to any other party involved.

One activity I would love to have my students do is one that forces them to truly think about the words and phrases they are saying.  I would have a list of dangerous or offensive words or phrases commonly used and I would ask the students to write down what they think each mean.  Then I would implore them to write a new sentence to convey the exact same meaning.  This can show them that they need not use such harsh language to say what it is they want to say.  It is a meager assignment, and certainly does not fully address the issue of cyber-bullying, but I feel it is still a good start.  Hopefully by making the students more aware of what their words mean, then they will be able to recognize forms of bullying when they witness or experience it.  From there, we can then address prevention, reporting, and how to deal with it.  I feel this activity can be a good first step.


References

(2012, March 21).  Cyber bullying statistics.  Statistic Brain.  Retrieved June 22, 2012 from http://www.statisticbrain.com/bullying-statistics/

Pharming and phishing information site.  Pharming Phishing.  Retrieved June 17, 2012 from http://www.pharming-phishing.com/

Images

Screencaptures were taken and resized by Jonah Santiago.
The animated .gif was created by Jonah Santiago.

Monday, 18 June 2012

Digital Safety Presentation: Phishing and Pharming


TOOLS USED
Jing
Prezi
Blogger
Photoshop
Screencast
Google Drive (backup software)

TRANSCRIPT OF VIDEO
WHAT IS PHARMING AND PHISHING?
At first glance, pharming and phishing may sound like summer pastimes from a “Little House on the Prairie” novel. In reality, pharming and phishing are forms of identity theft utilized by criminals on unsuspecting victims.

Guess what?

You are a target.

Phishing usually takes place via mass email messages. For example, you receive and open an email message that appears to be from your bank. The email indicates that there is a problem with your account. You click on the link in the email (which looks legitimate), and you enter your personal information on the website.

WHAMMY!

Guess what?

Your identity was stolen.

That’s right. Criminals who utilize phishing methods of identity theft send mass emails and request urgent information. You, the unsuspecting, tax paying citizen who never drives over the speed limit, innocently open the email messages and enter passwords, social security numbers, and PINs, only to find that the website is a fraud.

Your identify, and your saving account…stolen.

Pharming is a scam in which an individual is redirected to a fake website. Pharming occurs when a hacker (aka. The bad guy.) takes control of the DNS (or domain name service) software. With control of the DNS server, the hacker is able to redirect all of the website traffic to another website that appears the same as any other. The hackers then steal personal information as it is entered on the website.

- From http://www.crime-research.org/news/09.11.2005/1614/
- From http://www.pharming-phishing.com

HISTORY OF P&P?
Unlike farming and fishing, pharming and phishing have been around for about 20 years.

When computers first became household items in the early 1990s, hackers tricked people into entering personal information into email messages.

America Online (AOL), a famous Internet service provider in the 1990s, was the target of hackers. Hackers attempted to steal AOL accounts by pretending to be AOL Staff and sending instant messages to account holders. The hackers acquired passwords, billing addresses, and other sensitive and personal information.

After the turn of the century, hackers became bolder and attacks became more frequent. As the attacks increased, hackers refined their skills in an attempt to outwit the IT personnel and SPAM software programmers.

Pharming is a more recent invention of hacker elite. The famous trading website eBay was hijacked by a teenager in 2004. A year later, the domain name Panix was stolen and redirected users to a website located in Australia.

More recently, Symantec Corporation, the creator of anti-virus software for computers, reported a pharming incident in which users to their website were redirected to a Mexican bank.

- All from http://www.pharming-phishing.com/
- From http://en.wikipedia.org/wiki/Pharming

HOW CAN YOU PREVENT IT?
Practice Safe Surfing!

You are a target. Don’t be a victim!

Follow these simple rules to protect you and your family from pharming and phishing fraud.

SEE IT! Don’t trust emails. Do not open or click links in emails that claim to be from your bank or financial institution. Open your browser and visit your bank’s website to check your account status.

REPORT IT! If you suspect suspicious activity, report it to the financial institution. Forward the email to the Federal Trade Commission at spam@uce.gov. Notify the Internet Fraud Complaint Center (IFCC) of the FBI by filing a complaint on the IFCC’s web site: www.ifccfbi.gov. The only way to stop the bad guys is by telling the authorities.

UPDATE IT! Keep your computer updated with the latest browser and anti-virus software. With updated software, your computer will notify you if your security is compromised.

GO PRIVATE! Why use public computers when you are safer in private? Avoid public computers at hotels and airports. Access personal information from your private computer to avoid the risk of losing personal information via public computers.
- From http://www.techrepublic.com/blog/security/phishing-and-pharming-101-protect-your-identity/251
- From http://www.bos.frb.org/consumer/phishpharm/index.htm 

Monday, 11 June 2012

Enabling Dreams Reflection

It is always so startling when I am reminded of just how fortunate I am, but even more startling still how often it happens.  That I had been so blessed to have been born without a disability should never be an afterthought or mere idle notion in the back of my mind.  It's jarring just how often and how easily our good health and fortune can be taken for granted... and disturbing still how often we tend to overlook the basic needs of others who are not so fortunate.  Ken Ellis' video on assistive technology and its importance within the classroom is not only emotionally powerful, but also insightful and eye-opening.  Through several individual stories, the audience is made to realize how something as prominent (and taken for granted in its own right) as technology can mean the difference between failure and success in a person with disabilities' life (Ellis, 2005).  What many of us might consider a convenience is, to a person with disability, their lifeline in the world.  In education, there is a number of opportunities and technologies available for students with disabilities, but like the video mentions, not very many are aware of it (Ellis, 2005).  It is this sad but honest truth that can not only hinder a person's success in life, but it can also get in the way of simple but necessary self-fulfillment.

Though I am already three semesters into the Masters of Arts in Teaching program at the University of Guam's School of Education, it was only one semester ago that I had taken a class devoted entirely to special education.  While the class proved useful in introducing me to the various disabilities identified on Guam and several ways a teacher can prepare for them, we were regrettably not too well-informed about the various technologies available that can help us help them.  Though self-advocacy is a primary focus in teaching students with disabilities, it is a little unreasonable to expect them to advocate tools for themselves if they are not even aware of what tools are available for them.  Similarly, teachers should undergo more extensive training that not only mentally and emotionally prepare them for teaching students with disabilities, but workshops should also be available to educate teachers on the various ways in which technology can assist them.

Helpful, though, is the assigned textbook for the special education class, which not only breaks down each common disability but also provides a section of helpful tips that include how (and which) technology to incorporate within the classroom - if available (Smith and Tyler, 2010).  More helpful still is the book's breakdown of current laws relevant to special education, though the edition we were assigned is two years outdated.  As a first-year teacher whose first brush with special education was nothing more than being handed a folder full of names and terms that may as well have been Greek and virtually no briefing on policies or expectations, the book is a life saver - if, regrettably, a semester late.  Still, the class has provided me with sufficient knowledge to at least know, by now, what is expected of me... even if I am still not entirely too certain just how I will or should be doing those things.

This includes, but is not limited to, crafting lesson plans that incorporate the necessary accommodations and modifications as dictated in each students' Individualized Education Program.  If taken on by the same school again next year, I will be faced with the challenge of teaching a student whose vision has deteriorated to the point of near-blindness.  I will then have to ensure that all of my lesson plans can accommodate for that student's disability.  I have been part of several IEP meetings in which the student's needs have been carefully outlined, which includes a one-to-one aide and several Braille-enabled technological tools that will allow the student to participate in lessons.  It would then be my job to incorporate these accommodations into my lesson plans so that they are properly modified.  Some important parts or features in a revised lesson plan that I will need to keep aware of will include the ways in which I disseminate information to my students.  Because of this student's blindness, I will need to make sure that any and all reading materials that she will require will be Brailled and available to her when she needs it.  So materials, notes, and any activity that require sight will need to be reassessed and revised, so that she is still able to learn the content with the rest of the students.  This will force me to be a little more creative as far as distributing information to my students.

It is, of course, important that teachers revise lesson plans in order to account for students with disabilities.  The law requires that every child, regardless of the status of their health, be allowed free appropriate public education thanks to the Individuals with Disabilities Education Act (Smith and Tyler, 2010, p. 15-16).  I personally believe that any kind of education should be made available - if at all possible - to anyone who wants it.  Knowledge should never be withheld from people, least of all persons with disabilities, because it is not as if they can help it.  It is misfortune that plagues them, so why punish someone for something they could not prevent?  Every person should have the opportunity to succeed in life, and if education is indeed the key to success, why not do all we can to ensure that everyone has a shot at it?



Resources

Ellis, K. (2005, February 02). "How assistive technology enables dreams." Retrieved on June 11, 2012 from http://www.edutopia.org/assistive-technology-enabling-dreams-video

Smith, D. D. and Tyler, N. C.  (2010).  Introduction to special education: Making a difference.  New Jersey: Merrill.

Images

[Introduction to special education: Making a difference image].  Retrieved June 11, 2012 from http://cc.pbsstatic.com/l/64/0564/9780205600564.jpg

Educational Game Reflection

To anyone who ever thought that there can be no learning done from playing games, I say - think again.  There is perhaps no greater cure to that dreadful disease plaguing our students called "apathy" than the sweet marriage of games and the classroom.  Nowadays, teachers are gifted with the opportunity to take it a step further and incorporate educational games that can easily be accessed through the Internet.  Once again, technology comes to our rescue in the most practical and convenient of ways - now with just the point and click of a mouse, a world of fun and interactive discovery can be explored.  As a teacher, it is our job to take advantage of this opportunity and share it with our students.

Admittedly, I never once considered the value of online educational games.  As with most things that deal with technology, I had limited myself with the fact that many of my students would not have access to computers - both at home and in school, for no classroom aside from our technology classroom housed enough computers to accommodate twenty-eight students.  However, thanks to the discussions we have had in class, a little self-discovery, and personal research on the topic, I must admit to the advantages of introducing online educational games to my students.  Several studies have been conducted on the matter, such as the one discussed by Susan Arendt, in which she states that "[v]irtual environments also give kids the freedom to explore their surroundings and socialize in ways that they might not be able to in real life" (2007).  This offers students the opportunity to engage in diverse situations and allows them the freedom of self-discovery within the safety of a classroom or home.  Says Mary Sumry, online gaming can also provide opportunities for both struggling and excelling students by becoming a free, interactive tutoring option as well as offering a challenge to those that crave it (2011).  Through the use of online educational games, teachers will be able to reach a variety of students to not only engage them in the lesson, but to also provide opportunities to experience a diverse way of learning.

Click here to play the game!
Now as with most things on the Internet, the options are endless.  A simple search of "educational games" on any search engine will produce hundreds of results, all varying in style, content, accessibility, and even competency.  The game my partner and I wound up choosing is called Free Rice.  While rather simple in design, it offers a wealth of benefits that affect not only the player, but people all across the world.  However, it was not only the game's benevolent goal that was the reason we had chosen it to be the subject of our presentation.  Upon initial exploration of the game, my partner and I found ourselves at an interesting impasse - I enjoyed it but he did not.  It was this dissonance that encouraged us to continue further.  With the two of us presenting both sides of the bias, we felt it would be a beneficial presentation for everybody involved.  We would present our pros and cons, and with the help of our rubric, we would be able to conclude to the class whose opinion was supported by the data.  Essentially, we wound up making a game out of our game.  (I won.)

Perhaps the biggest issue for us was time.  Because I was regrettably backed up on another assignment, I could not devote as much time to this one as I wanted to.  With my partner's impending trip off-island, our face time and actually work hours were cut even shorter.  Communication still happened through emails and shared documents, but time differences made for lags in between replies that just could not be avoided.  Regardless, our team pulled through.  We got most of the framework done together while we were given that time in class, and my partner's diligence and Superman-like ability to produce in record time had been our lifeline.

Click here to access our website!
The rubric itself was a collaborative effort between my partner and myself, though most of its construction had been my partner's handiwork.  In all honesty, it was an odd experience to create a rubric for something I did not originally construct.  Up until then, I had only ever written rubrics for assignments that I created and intended to assess.  Never before had I evaluated something I did not already know what to look for, so while I am satisfied with what we came up with, I know it can still stand to be fine-tuned.  For instance, a few categories can be made more specific and focused.  However, despite this, I still feel that my partner and I did rather well, all things considered.

The creation of the rubric got me thinking of the NETS*T standard 2C, which requires that teachers "identify and locate technology resources and evaluate them for accuracy and suitability" (International Society, 2011).  The rubric forced my partner and I to look at varying aspects of the online game, which included accuracy in content as well as suitability for students expected to play it.  As teachers, we are still responsible for what we expose to our students, and so it is very important that we evaluate the tools we offer to them - especially if it is found on the Internet. We must never lose sight of the educational part of educational games, otherwise it would all be for naught.

Because the game itself is so broad, and there is no real flexibility in terms of the actual content-within-the-content that it quizzes you on, it is best used as a supplementary tool rather than one to build an entire lesson around.  I can see myself using it in class to enhance students' vocabulary; perhaps within classes I can set up a little competition every week or every other week, where the highest scorer can earn his- or herself some extra credit points.  Or, to make it more mandatory for students and to encourage more participation on their part, I can set up a "minimum grains required" for every week, and they are to go in on their own time to achieve that quota.

All in all, this assignment taught me the value of never being afraid to incorporate activities into the lesson, even if accessibility to it is not so easily obtained.  Students should at least get the chance to be exposed to such an option, even if only once.  The cost of obtaining the resources might be plenty, but the value of introducing students to another form of learning (and engaging them with it) is priceless.


References

Arendt, S.  Study: Online gaming good for teens.  (2007, July 7).  Retrieved June 10, 2012, from http://www.wired.com/gamelife/2007/07/study-online-ga/

International Society for Technology in Education.  (2011).  Retrieved June 10, 2012, from http://www.iste.org/standards/nets-for-teachers.aspx

Sumry, M.  The advantages in using online educational games.  (2011, February 8).  Retrieved June 10, 2012 from http://ezinearticles.com/?The-Advantages-in-Using-Online-Educational-Games&id=6002169
Images

[Screencapture of Freerice.com].  Retrieved June 10, 2012, from http://santiagosmit.weebly.com/lets-play.html

[Screencapture of EDU Games rubric].  Retrieved June 10, 2012, from http://santiagosmit.weebly.com/our-rubric.html

Friday, 8 June 2012

ASSURE lesson plan


Before this assignment, my experience with technology within the classroom stretched little further than PowerPoint presentations and Youtube video clips.  I can readily admit that I did not bother to imagine lesson plans that incorporated any more than that, always limiting myself with the notion that it would only be a waste of time.  As it is, the only way a teacher can get access to more technology is by having the good fortune to work in a private school or GCC.  (Unless, of course, a teacher decides to make the necessary purchases his- or herself, but with a fixed pay salary of an emergency-certified teacher, I am disinclined to make such sacrifices.)  The public schools are not yet equipped to cater to the technology needs of all students, and so I never bothered to plan for lessons that would incorporate tools I will not even have access to.  However, as I ventured into this assignment, I began to realize that just because I will not have the opportunity to use this lesson plan in the near future, does not mean I will not have the opportunity to use it at all.  A tool is still a tool, regardless of when one can use it.

What I like best about this lesson plan is its flexibility.  It is simple enough in design and concept, making it easy to adjust.  Its framework is minimalistic, so I can easily use its skeleton as a template for other assignments that would incorporate students creating posters to display collected data.  The lesson itself is meant as a refresher course and an introduction to Glogster, which makes it quite easy.  This leaves plenty of room for revising to make it more challenging, such as incorporating a presentation aspect of the lesson that might require the students to record their presentation through the use of a video-recording tool, and adding that to their online poster. Students can also challenge themselves by creating several diagrams in one, or attempt to incorporate several of the multimedia tools the website offers.

The assignment itself had been a challenging one, if only because it is so multifaceted.  It not only required us to create a lesson plan centered around a given topic (nutritional facts/labels) using a format many of us were not even aware of, but it also required us to step outside of our comfort zones and incorporate multimedia tools that we had only just been introduced to.  Then, on top of all of that, we were made to present said lesson plan using a digital spreadsheet.  However, as daunting as the assignment itself had been, I found myself having fun.  This is the first time I had ever used Wix but after this assignment, I know it will not be my last.  That was my favorite part about this assignment - creating it.  I enjoyed watching this website come into fruition and had fun learning how to manipulate the website's tools to do what I wanted.

I also appreciated how this assignment forced me to consider factors that I, unfortunately, let slip past me on a regular basis.  As I had mentioned earlier, the separate components of the ASSURE model breaks things down so simply and so tediously that it feels near impossible to have an oversight.

With that in mind, I feel that NETS*T standard 3B best applies to this assignment.  This standard states that teachers "use technology to support learner-centered strategies that address the diverse needs of students" (International Society, 2011).  Thanks to the format of the ASSURE lesson plan, I found myself much more aware of the students I am teaching.  The format forces the teacher to break down the demographics, so that no one can slip through the cracks.  Because of this focus, the lesson itself becomes that much more student-centered.  One cannot help but cater to the needs of the students, with it broken down so plainly and in text.  These diverse needs can range from special education needs to the different types of learning styles a group of students can have.  By becoming more aware of the different learning styles of the students within his or her classroom, a teacher can plan a more effective lesson that can engage most if not all of his or her students (Multiple Intelligence Theory, n.d.).

There is really only one thing I found regrettable about this assignment, and that is the short amount of time I had to do it in.  This, however, was more my slight than anyone else's.  The flu, combined with the end-of-the-school-year rush and missing a vital class lesson that addressed this assignment had all made for an unfortunate and stressful time that might have been easily avoided had I had better time management skills (and a greater immune system).  Still, I enjoyed this assignment, and I look forward to the day that I might be able to apply this lesson plan in my classroom.  After all, the public school systems are constantly changing, and the boom in technology does not seem to be decreasing any time soon.  Fourteen classroom computers cannot be that far out of reach.



References

Multiple Intelligence Theory.  Retrieved June 6, 2012 from http://www.multipleintelligencetheory.co.uk/index.aspx

International Society for Technology in Education.  (2011).  Retrieved June 6, 2012, from http://www.iste.org/standards/nets-for-teachers.aspx