130 likes | 209 Views
ET 502 Information Access and Evaluation. Kevin Beck March 2012. Student Access. TF South is slightly below the computer to student ratio when comparing it to the national averages of other school with similar characteristics in most categories. (Robledo, 2012). (Wells & Lewis, 2006).
E N D
ET 502Information Access and Evaluation Kevin Beck March 2012
Student Access TF South is slightly below the computer to student ratio when comparing it to the national averages of other school with similar characteristics in most categories. (Robledo, 2012) (Wells & Lewis, 2006)
TF South does have 2 classroom sets of iPads for both teacher use and classroom use. We do not have a lending program. 2 1 images.search.yahoo.com
Recommendations Professional Development for Teachers How do we use the internet in the classroom??? images.search.yahoo.com
Student-Focused Elements I chose to compare our computer to student ratio to the national averages because if we are to incorporate the internet into the classroom, we need to increase the ratio of computers to students. I also chose to compare our hand-held computers (in our case iPads) to the national average because we have recently acquired 2 classroom sets of iPads and the statistics show that not many schools are using hand-held computers yet.
Strategies for Resource Evaluation We used 3 different databases or search engines to learn how to find reliable sources. (Google Scholar, 2012) ProQuest, 2012 ERIC, 2012
Recommendations – Strategies for Resource Evaluation Teachers need to focus on teaching students how to look for authors who are creditable information which is unbiased and peer-reviewed, current articles, and articles which pertain to their topic (Su, 2003).
Design Elements – Strategies for Resource Evaluation (Currie, Devlin, Emde, & Graves, 2010)
Legal and Ethical Issues Student monitoring The following are examples of the policies for TF South. Firewalls Teacher monitoring
Design Elements – Legal and Ethical Issues A) TF South uses firewalls and proxies to keep students off restricted websites. B) Teachers monitor students access by walking around the classroom. C) Teachers monitor students access through a software program where teachers can view student’s screens through the teacher computer. D) Students monitor their own internet access.
References Currie, L., Devlin, F., Emde, J., & Graves, K. (2010). Undergraduate search strategies and evaluation criteria: searching for credible sources. New Library World, 113-124. Penn State University. (n.d.). Rethinking the Design of Presentation Slides: The Assertion-Evidence Structure. Retrieved March 21, 2012, from http://writing.engr.psu.edu/slides.html Robledo, R. (2012, March 6). Building Technology Coordinator. (K. Beck, Interviewer) Su, L. T. (2003). A comprehensive and systematic model of user evaluation of web search engines: II. an evaluation by undergraduates. Journal of the American Society for Information Science and Technology, 1193-1223. Wells, J., & Lewis, L. (2006). Internet access in U.S. public schools and classroom: 1994-2005. Washington: U.S. Department of Education: National Center for Education Statistics.
Image References ERIC.ed.gov images.search.yahoo.com GoogleScholar.com ProQuest.org