“Ninety percent of what you hear is gone after 30 seconds!” David J.P. Phillips explained in his TedXStockholm presentation five design principles to follow to improve presentation slides so the audience will retain the information you are trying to impart.
One message per slide to keep the focus
Include an image of your message and a few words to highlight your point
Size-The main idea should be sized bigger
Contrast-What you are talking about should be brightest. No white backgrounds.
Objects-No more than six.
Phillips finished up by reminding us it is not the number of slides in the deck, it is the number of objects in each slide. In other words, when admin tells you to only use one slide for your lesson to keep it easy for your students, they’re wrong-according to Phillips. Forcing you to have10 messages in one slide to cover your content defeats the purpose of keeping it simple.
“If companies would have as little respect for business as they have for presentations the majority would go bankrupt.” -John Medina, Ph.D.
Less is More
Zen principles can apply to everyday life, like when designing presentation slides. Garr Renolds told us in his blog, Presentation Zen, to keep our visuals simple. He showed us before and after slides as examples of how to improve visuals. Simplistic changes can make the slides more relevant, such as making sure images match the message, using declarative statements as the title for the slide, and using the image as the slide itself instead of placing the image on a slide.
Renolds’ speech explained several ways to improve presentations and the importance or advantage of including storytelling too.
Visually organized=Digital planner space
After reading, watching, and listening to Phillips and Renolds, I brainstormed different ideas for which visual aid (slide, poster, anchor chart, etc.) I would like to update. After considering a few ideas, I decided to create a Google slide to help me quickly find planning documents in my Google Drive-what I’m calling a digital planner space. There are several steps to find the planners in the shared Drive (see image below) and I always spend a lot of time searching for what I need. My digital planner space was something quick to create and easy to find in my Drive
I took Renold’s suggestion about making a photograph the actual slide. I used a photo I took while on vacation in Las Palmas a few years ago. I chose this photograph as a reminder of simpler times. The photo was not as wide as the slide so I horizontally flipped a second copy of the photo to cover the white space. I considered changing the size of the slide to match the size of the photo; however, I have tried that in the past and felt it too time-consuming. Next, I included sticky note images and made them links to the different planning documents. I shared the slide with my grade three team and asked them if this type of visual helped them or am I the only one struggling to find the planning documents. I shared my visual aid with the grade three team and asked if they found it helpful. One out of the four teachers responded with feedback. The teacher wrote, “This is awesome! Thanks for sharing. I love the virtual sticky notes!”
It was a lot of fun to play around with this week’s topic about making data and information visual. I explored infographics and created a timeline using Google Slides, I started a draft of my next resume and added several diagrams, and finally, I created an infographic using Piktochart to help me remember how to do my breathing exercises my vocal tutor has me do.
Infographics are great visuals to make information more accessible to our students and I’m excited to incorporate more in my teaching. I am also looking forward to having my students create their own infographics. I’m certain they will enjoy creating them as much as I did. What a great way to learn! This topic was a great reminder of the power of using visuals in our teaching.
Thinking routines is a new concept for me although it has been around for years. I watched Project Zero Thinking Routines to gain a basic understanding. I learned these are strategies like See, Think, Wonder (STW), people can use to guide them towards a productive way of processing information that becomes so routine, it’s easy. Harvard Graduate School of Education shared, “Thinking Routines loosely guide learners’ thought processes and encourage active processing.”
Visible thinking routines
Next, I took a look into Visible Thinking Routines (VTR). In his blog, Sean Hampton Cole defined VTR as, “having a carefully chosen set of embedded cognitive and meta-cognitive tools to think with and to use to understand better.”
I found out from the Padlet attempt I have been a part of STW activities in the past but I hadn’t made the connection it was a visible thinking routine. I will update my blog as I receive more collaboration on my Padlet.
I wholeheartedly agree collaborating with my colleagues is a wonderful way to learn and improve my practice. Also, I see the value in planning a collaboration for my students. Currently, I work a lot one-on-one with students right now. I haven’t begun working with groups of students yet. I will be thinking of ways I can include collaboration among students and keep an eye out for how my classroom teacher colleagues might be able to also.
ISTE Standards for Educators
6.c. Create learning opportunities that challenge students to use a design process and computational thinking to innovate and solve problems.
Boring! You could have scored my blog’s visual hierarchy level fair at best. I realized I needed to make changes on my blog to better communicate with my readers. What do you think of the new and improved version?
My blog before the changes.
We tell our students to show, not tell when writing. I’m afraid I did a lot of telling and not a lot of showing. The blog is text-heavy and I worry readers will skim or scan without wanting to read the post. The colors are muted. It may not look appealing or draw the reader into the topic.
My blog would be more aesthetically appealing if I could improve the images, font sizes, the colors on the page, and the layout of the text.
I decided to remove the picture of myself on vacation. I realized if this were a travel blog it might make sense; however, since it is a teacher-tech blog it is not fitting.
I changed the title to make it simpler and spelled out the acronym in smaller text. I included different size headings to guide the reader to see what is more important.
I changed the colors of the blog to try to appeal to my readers and improve the readability.
I shortened my paragraphs and included more headings to chunk the information to make the content clearer.
As you can see on this page, there were a few changes I made to my blog to make it more appealing to my readers. Leave a reply below. I’d love to hear what you think about the changes and any suggestions you have for me!
My three-woman group for this project was Erika, Andrea, and myself. Erika and I work together in second grade at our school and we collaborated on the final project in Course One. We work well together so I asked her right away if she’d like to collaborate on this project together. I knew from reading the Cohort 12 blog posts at the beginning of Course One, Andrea is also a second-grade teacher so I sent her an email asking if she’d like to join Erika and me on this project. Fortunately, she was able to join us.
The collaboration on this project went very well. Erika and Andrea out-did themselves with the lessons, resources, and their contributions. It is wonderful working with motivated, responsible professionals! Kudos to Erika and Andrea and I’m grateful to have had such a positive experience working on a virtual group project.
Although it can be rewarding working with a group, it is also challenging. We were all dealing with a pandemic, being in different time zones, and the jet-lag from traveling across the globe. Luckily we had the time for people to be able to provide their contributions. When collaborating on a unit planner with others who you never have face-to-face (f2f) meetings is different from planning sessions with coworkers at school. The personal connection aspect is missing. There are no quick hallway-meetings to ask questions or five-minute discussions. However, it is similar because we go back to our own computers to complete the work. We send messages and emails to get clarification and share ideas, just like our f2f coworkers.
We chose Option One, create a unit planner, because it was practical for Erika and Andrea to have created it for use with their students in their classrooms. Although our technology integrationist at school provides an introduction to internet safety to our students at the beginning of the year, this unit goes much more in-depth to helping students understand how to be proficient digital citizens. ISTE Digital Citizen 2 standards were the basis for the goals set for this unit.
This learning experience I helped design is different from my normal instruction because I am usually adapting or designing lessons for my English learners or my students with learning disabilities, not creating units of instruction. It is helpful for me to participate in the process Andrea and Erika used to create this unit. Of course, it is not completely different from what I usually do. This experience was like the instructional big picture instead of the snapshots I typically work on.
The Digital Citizen unit we created synthesized many of the ideas we learned in Course Two. Ideas like respecting the intellectual property of others, connecting with others on social media (safely), managing digital identity and protecting data, and differentiating between truth and misinformation. The ISTE standards for educators support the work we are doing with students and the Digital Citizen unit planner we created was based on the enduring understandings of Course Two.
My Course Two final project was a globally collaborative project. We used the UbD lesson template and included desired results, learning goals, and opportunities for students to show evidence of their learning.
There is no acceptable use (AU) policy for students at my school, only for adults. The AU can be found on the school’s website and in the faculty handbook and I have included the AU at the bottom of this blog. Honestly, this was my first time reading through it carefully and I had two main takeaways. First, the school wants everyone to use the WiFi provided and second, don’t do anything inappropriate while using it.
While reading the AU, I considered if it empowers stakeholders to make positive contributions to local and global communities. In the AU, it said, “Our goal in providing this service (WiFi) to users is to promote educational excellence by facilitating resource sharing, innovation, and communication.” However, taking into consideration what Scott McLeod shared in his TEDx talk, Extracurricular Empowerment, it seems to be a way of controlling users out of fear something bad will be done. It is unclear to me how the AU is promoting any sharing, innovation, or communication. I believe the AU is laying out the rules and if anyone breaks them, then you won’t be allowed to use the WiFi at school. For teachers, it could mean disciplinary action from the administration. McLeod encouraged us to let go of the fear and the need to control in order to empower the students, and in this instance, the people. That being said, of course, I believe the students’ privacy would be honored and we should behave professionally.
Media literacy is an on-going process of growth. Technology is evolving at the speed of an expert typist’s words-per-minute and it’s a continuous journey to learn what’s new, relevant, and useful. I have a degree in instructional technology and distance education yet here I am taking another tech certification so I can continue to improve my media literacy. I am always asking my students to teach me what they’re doing online. I offer help to my colleagues with any tech issues they may have that I can help them with. Sometimes it feels like a blow to the ego not to be the ultimate media literacy expert since I have that ITDE degree (that I’m not even using); however, I swallow my pride and ask anyone and everyone for help to improve my tech skills and continue to learn.
Participatory culture is a term used to describe how people are creating self-made content then sharing their videos, audio, text, and images on social media (Mindjet, 2008). I have embraced this culture and I enjoy putting myself out there. I have always loved making digital stories (DS) and I have been posting my videos on my YouTube channel for a while. I find the best way to learn something new is to practice it on yourself. In 2017, I wasn’t able to attend my graduation ceremony in the states so my friends celebrated with me in Russian style-selfies and a big party. I created my ITDE digital story to remember it by.
Recently, I discovered Tik Tok. I believe this is a prime example of participatory culture and just this week I posted my first video on TikTok. So far, I have three followers! (Two are personal friends but it’s still a start.) Seriously though for me, contributing my work to the web isn’t about how many followers, likes, or subscribers I have. I do appreciate all that of course but I enjoy the process of creating and have a warm sense of accomplishment when I upload and/or post my creations for the world to see and judge-or not. In the past, I have had students create their own digital stories. They would write a story, create illustrations, record themselves reading their story, take pictures of their pages, then share them with others. I’m not the only one who enjoys this process of creating for a purpose and audience.
Deanna Troi was my mentor in learning about empathy. Counselor Troi and my lived experiences of almost a half-century have helped me become a more empathetic person. I’ve learned to listen to others, try to consider perspectives different from my own, and being naturally introverted has helped. When someone is mean to me, I consider the possibility his wife beats him at home. When a student is being a jerk, I imagine she has an older sister getting all the attention at home and is acting out with me because she knows I’m safe. When I notice a student or peer is not being empathetic, I try to support them by asking questions about the situation to try to get them to see another perspective and possibly feel empathy. Empathy comes from nature and future. We’re born with it, or not, but there’s always room to learn the ways of the Betazoid.
Extracurricular empowerment (McLeod, TEDxDesMoines) FacultyHandbook(2018-19 September). pp. 35-38 PuttingtheParticipatory Culture to Work. (2008). Retrieved from http://download.mindjet.com/static/pdf/us/wp_participatoryCulture.pdf
COMPUTER AND INTERNET STAFF ACCEPTABLE USE AGREEMENT The School offers electronic communications and network access to all users. Access to the network provides users with Internet access in addition to other resources. All employees, students and visitors are encouraged to use the school wifi or wired internet connections (not to use data from cellular networks). Our goal in providing this service to users is to promote educational excellence by facilitating resource sharing, innovation and communication. While the Internet provides a massive information source to our school, we must also recognize that some material available may not be considered of educational value in a school setting. The responsibility for proper educational use of the network lies with the user. If an AAS user chooses to access resources that are objectionable, adult-oriented, or restricted, the consequence may be withholding or termination of access privileges, depending on the circumstances and intent of the user.
AAS Computer Systems and Internet Use Terms and Conditions
School computers should be used to support education and research consistent with the learning outcomes of the Anglo-American School. Use of another organization’s network or computing resources from school computers must comply with the rules appropriate for that network as well as for the AAS network.
Network Etiquette – Users are expected to abide by the following rules of network etiquette. These include (but are not limited to) the following: a. One should be polite and never abusive in messages to others. Using vulgarities or any other inappropriate language will not be tolerated. Hate mail, harassment, discriminatory remarks and other antisocial behaviors are prohibited. Messages should not contain profanity, obscene comments, sexually explicit material, or expressions of bigotry or hate. Such remarks may fall under purview of the AAS Harassment Policy. b. E-mail is not guaranteed to be private and may be monitored at any time. Messages relating to or in support of illegal activities may be reported to authorities. c. E-mail chain letters should never be forwarded to or from AAS e-mail accounts. d. The personal address, phone numbers, or passwords of users of the AngloAmerican School, including one’s own, should not be revealed without the employee’s permission other than on a need-to-know basis. e. The network should not be used in such a way as to intentionally disrupt its use by others. f. Files downloaded or transferred via removable media should be checked for viruses. Deliberate attempts to degrade or disrupt system performance will be viewed as a severe offense. g. Illegal downloading of files is prohibited. h. Files stored in public storage areas may be deleted by the school at any time. Users should save files either on removable storage or on their home network directory. i. Files stored on the school computer local hard drives are not backed up and should be saved on either removable storage or in user home directories on the network servers.
Accuracy of Information – Use of any information obtained via the Internet is at one’s own risk. Users are responsible for determining the accuracy or quality of information obtained through school accounts. Users should not alter any computer configuration on a school computer (without express permission). This includes installing ANY programs from home, the Internet, etc. If a user needs a particular program for school use, the user should contact their divisional administrator (principal or direct supervisor) and/or Tech.Support@aas.ru with the request.
Security is a high priority, especially since the system involves many users. If a user identifies a security problem on the network, the user must notify a teacher, librarian or principal, without demonstrating the problem to other users. Users should not intentionally seek information on, obtain copies of, or modify files, other data, or passwords belonging to other users, or misrepresent other users on the network. Attempts to gain unauthorized access to system program or computer equipment will result in the cancellation of user privileges.
Vandalism – Vandalism will result in revocation of privileges as well as other sanctions cited in the AAS handbooks and Board Policy Manual. Vandalism includes any malicious attempt to harm, modify, destroy, or remove from the AAS premises computer hardware, software, or data of another user.
Any software installed must be properly licensed and evaluated by AAS IT Department prior to the installation.
Computers and other electronic equipment available for checkout may not be removed from the AAS campus by AAS Staff without explicit, written permission. Lists of available items for checkout will be updated regularly. AAS Staff members may checkout approved devices for professional use only. When checking-out and using an AAS school-owned ICT device, AAS Faculty and Staff members agree to the conditions and procedures outlined below: a. AAS ICT devices are only to be used to support our school’s Mission and Vision. Personal, non-school related use is inappropriate and prohibited. b. AAS school-owned ICT devices off-campus use is short-term only (i.e., overnight/weekend). c. AAS Staff members are 100% responsible for the off-campus care and appropriate use of the AAS school-owned ICT devices checked out to them. d. AAS staff members are liable for any associated costs due to on or off campus damage/loss/theft, including repair/replacement costs. e. All AAS school-owned ICT devices must be checked out through the current prescribed circulation system. Any subsequent extensions of checkout periods must include a visual inspection and verification of the AAS school-owned ICT device by the ICT / IT staff. f. In the event of the loss or theft of an AAS school-owned ICT device, on or off campus, the user must notify the following immediately — AAS Security, immediate supervisor or Divisional Principals, and the ICT / IT staff. (This will ensure that recovery procedures can be activated as soon as is possible including device tracking and security surveillance.)
Damage to AAS school-owned ICT devices must be reported immediately to the employee’s immediate supervisor or Divisional Principals.
AAS Administration reserves rights to monitor any information which is stored on the AAS Network Servers or transmitted over AAS Intranet, Extranet, or Internet communication links. This includes (but not limited to) any data sent over AAS wired and wireless communication systems.
SOCIAL MEDIA AAS respects the right of employees to use blogs and social media as part of their professional network and as an extension of their personal and professional lives. We do not want to discourage employees from self-publishing and self-expression, but employees are expected to follow the guidelines and policies set forth to provide a clear line between you as the individual and you as the employee in order to preserve the environment that is based on focusing on students at all times.
General Provisions – Employees should not allow social media or blogging for personal reasons to create a distraction to the learning environment consistent with our similar expectations for students and as noted in Acceptable Use Agreements. Blogging or other forms of social media or technology include but are not limited to social media, video or wiki postings, personal blogs or other similar forms of online journals, diaries or personal newsletters not directly affiliated with AAS.
Consistent with standard privacy expectations in other areas of this handbook, employees should not publicly discuss students, employees or work-related matters that would typically be considered confidential in other forms. Employees are expected to protect the privacy of the school and its employees and community, and are prohibited from disclosing information and any other proprietary and nonpublic information to which employees have access. Such information could include but is not limited to student and parent information, images of students, student work, financial information, admissions data, etc.
Instructional Blogging – The goal of instructional blogging and instructional social media is to promote sharing of ideas, collaboration, and expanded exchange of information. Instructional blogging/social media may be used to convey information about the school, promote and raise awareness of AAS activities, and communicate with employees, students, and parents to brainstorm, discuss divisional-specific activities and events. To start an instructional blog or social media site, you should consult with technology leadership in your division and coordinate with the Director of Communications and Development. When blogging or using other forms of web-based forums, AAS must ensure that use of these communications maintains our highest standards of conduct, integrity and reputation while minimizing actual or potential legal risks, whether used inside or outside the workplace. We also have an interest in maintaining connected integrity of our systems and these leaders can provide support in ensuring tight integration with existing systems.
Personal Social Media – It is important to remember that the use of social media networking implies personal responsibility and a complicated separation between personal and professional speech. Individuals can be held personally and/or professionally liable for public commentary that is considered defamatory, obscene, proprietary or libelous by any offended party, including AAS. In order to maintain a professional and appropriate relationship with students, employees should not communicate with students who are currently enrolled (or former students under 18 years of age)using personal social media sites.
o Staff should not issue or accept student friend requests or follow individual students on personal social media accounts. o Staff should decline students’ friend requests on personal social media accounts. Employees are strongly encouraged to maximize “privacy” settings on personal social media accounts and should not share or allow access to these accounts with students. Staff should not have online interactions with students on social media outside of forums/platforms intended for educational purposes. Employees should refrain from using school-owned equipment, including computers, company-licensed software or other electronic equipment to conduct personal blogging and should not access personal social media during work hours, if said use will constitute a distraction to the learning environment and detract from a staff member’s primary duties as assigned. Professionals should never use social media to harass, threaten, discriminate or disparage other employees, students or anyone associated with or doing business with AAS. If you choose to identify yourself as an AAS employee, please understand that some readers may view you as a spokesperson for the school. Because of this possibility, we ask that you state that your views expressed in your personal social media site(s) are your own and not those of the school, or of any person or organization affiliated or doing business with the school. Posting school logos or other proprietary documents on personal social media sites constitutes a breach of copyright. In addition, it is recommended that employees obtain expressed consent of each of any person(s) in the photograph(s) or other image(s) that they choose to post online. Photos of students or individual student work should not be posted on an employee’s personal social media site. While traveling or participating in school-funded business, professional development, school sponsored/funded activities or trips, employees should refrain from posting photographs or accounts of personal entertainment, unprofessional behaviours, unprofessional comments or questionable social activities. Abuses associated with the above guidelines are consistent with similar behavior in other forms of media, print and in real life. As such, adjudication of problems or complaints in this area will be addressed through the appraisal process as appropriate to the Professional Responsibilities domain. If you have any questions related to these guidelines, ask your principal, supervisor, or Human Resources.
Butler University’s division of student affairs shared a mnemonic device to use before doing anything on social media on their website. It resonated with me-T=Is it true? H=Is it helpful? I=Is it inspiring? N=Is it necessary? and K=Is it kind? Several times I have noticed my friends and family repost social media news I doubt is true, I might find offensive, or I may not appreciate. Butler recommends we should, “Be critical about what you post, like, and forward. Utilize your research skills to check fact from fiction.” I wish there was a way to get this message out there to my friends and family! Oh wait, I can start by reposting it on my Facebook account:
Butler went on to suggest we should be active bystanders. Active bystander?! This is taking action which is a little less comfortable for me than just sharing an article on Facebook. In the past, I have directed people to Snopes.com when I find something that’s been reposted which is not factual. That part is ok, I’m comfortable with it. However, does this mean I am supposed to tell someone when they are posting information I find unhelpful, uninspiring, not necessary, or unkind? Is my opinion more important or more correct than theirs? Is posting information I find mean just their freedom of speech? I can imagine having this conversation with a student but with an adult-seems sticky. Butler has given me something to ponder and next time I see a post, I will have to THINK carefully about how I will respond and how I can be an effective active bystander.
How can I teach my students to critically question what they’re reading online, to question if it is true? My students are at an age when they are learning to read, they are beginning to distinguish between fact and opinion; also, they are learning the difference between fiction and nonfiction. Gaining these understandings is paramount for students to be able to critically question if what they are reading online is true. Seven-year-olds may not yet be ready to fact-check news articles or find original sources for posts online; however, they can begin to hear about the concept of people posting false information online. When we start teaching students about researching online, teachers can give students a consistent message they should consider the possibility someone might have posted misleading information online just to lead them astray, just to mess with them. At this age, teachers can begin to plant the seed of doubt in students’ minds which will lead them to begin questioning the validity of online information. This is the first step for students becoming critical THINKers.
Keep your posts rated G and do not friend students! This was the first idea that came to mind for maintaining my privacy, and it was concerning social media. I was warned years ago by my school system I could get in trouble for having pictures of myself at parties or being online friends with students. I realize now as I’m reading about privacy, this was also a protection issue – not just privacy.
The information my students and I are posting and sharing online could be considered sensitive and there are people in the world who might take advantage of the information for financial gain or other purposes. Just because this would never have occurred to me, that people are doing bad things with children’s data, doesn’t mean I shouldn’t be aware of the issue or relieved of my responsibility to protect my students in every way possible.
Specifically what I have done to maintain my students’ privacy is to not share details about them with non-stakeholders. I don’t post pictures of students and I won’t mention their names online. I am sure to shred sensitive documents and not place them in the trash or recycling. For my own privacy, I have passwords for accounts, I do not consent for anyone else to see my medical records, and I still don’t post pictures of myself at parties on FaceBook.
Last year, there was a rumor high school students had hacked into the school’s online grade book and changed grades. Assuming the rumor is true, I’m unsure how secure the sensitive information is; however, this type of rumor is the stuff movies are made of but should keep us aware of the potential issues. My school protects students’ privacy by having students use class codes to join and then use their passwords to enter websites the school has subscribed to. In addition, the school keeps its accounts password protected and we are careful when using online platforms. The students are aware of what behavior is expected of them online and we teach them how to be digitally responsible. When students are given their iPads at the beginning of the school year, there is a class discussion concerning expectations and appropriate behaviors online and the correct treatment of their technology.
As a reminder, a copy of the policy is placed inside the iPad case. Just like the students, an infographic is also placed inside the teachers’ iPad cases of our Acceptable Use and Digital Citizenship policy. We’re all doing our best to try to keep up with privacy issues and keeping our students safe.
“Ping me!” The first time I heard this from my friend, I was too embarrassed to tell her I didn’t know what that meant. I mean, in context I understood, but I didn’t want to ask her to explain because obviously I was out of the loop on the current lingo. My students communicate in the same ways as when I was seven years old. We talk at school, play together in the neighborhood, and once in a while make a call; albeit the calls today are not from landlines like back in the dark ages when I was a kid. Even as an adult, my students are making video calls to their friends, just like I am. Living abroad increases my use of video conferencing more than my normal, but my students are also international so they are experiencing the same long distances from their extended family and friends.
My thoughts about social media has changed during the recent past. One thing that has changed for me is my understanding about keeping my social media settings private. In the past, I didn’t give privacy settings a second thought; however, through discussion with my son and reading about it from Lara and Sofia in Like. Flirt. Ghost: A Journey Into the Social Media Lives of Teens (Choi, 2016), I have come to understand I should keep my social media accounts private. It’s still not clear to me what bad can come from it but if the cool kids are doing it, then I guess I should too!
Kids today spend more time now than before with friends virtually than face-to-face. With mobile, devices, and gaming technology becoming more affordable and available, more and more children and teens are connecting online with their friends and others. With the new technologies, there are new social norms, new language, and new expectations all around. Adults need to at least be aware of these norms so they can be aware of why the younger generation is poking fun at them on social media. For a funny example, check out Rob Lowe’s Sons Keep Trolling Him On Instagram (Balčiauskas & Laurinavičius, 2019).
In second grade, there isn’t a lot of social media use happening, and for my position as a support teacher, even less. We use Seesaw as a platform for students to post their work to share with parents but there is barely any communicating beyond a comment from parents saying how proud they are of their child’s work.
As the year progressed, I have noticed classmates will now comment on other’s work. “I like your drawing, Junseo!” This is the first year these students have had the opportunity to use a form of social media in school. They have not been told they have to make comments on others’ work but a few have learned from the parents and teachers modeling, it seems. We know the feedback on our work is important and seeing students supporting each other is amazing. I realize I could support these comments better by encouraging students to do this more often. In addition, this example from my lived experience shows me “Social media is a key form of communication, bonding, and friendship among people today.” This is starting at a very young age and traversing several generations. Excuse me, now I should go Facetime my mother.
Can the powers-that-be make this any more confusing?! I have the mindset people have positive intentions. This helps me to have better interpersonal relationships and better communication with others. In the same vein, I believe people try their best to follow the copyright rules but the rules are so complicated it’s hard to do.
I only started to hear about and understand copyright in the last 10 years or so. Copyright is still somewhat confusing to me; however, even before COETAIL Course 1, I knew I should give credit for images I use and not steal pictures from the internet. I like to use Google to search for images so I can filter by copyright use. I’ve advanced in my copyright use sensitivity to the point I will now create drawings I need if they are not fair use. Creative Commons and Fair Use are still fuzzy and I need to learn more about these areas. Also, I have been assuming when inserting images into Google slides and docs using the web search, these images are available for use without having to cite the source or request permission. Now, I’m wondering if I’ve made an inaccurate assumption and I need to research this further. I hope to know the answer by the end of this course.
Informing students and informing peers about the importance of respecting the intellectual property of others would be different conversations in my situation. I generally explain or remind students of the rules for using images in their presentations. Classroom teachers give a lesson to their students about Copyright usage and I try to reinforce the idea when I’m working with students. I don’t say anything to peers. Before this week, it hadn’t occurred to me it would be my place to tell a peer they need to check their copyright usage. I assume my peers know at lease as much as I know about the subject and are doing their best. If I were more confident in my understanding of respecting the intellectual property of others, I would be more willing to try to explain it to a peer.
As I was reflecting on intellectual property, I asked my 19-year-old son if he uses copyright rules in his school work. He’s a sophomore in college at UNC Wilmington and in general, I would expect he wouldn’t bother following the rules. However, he said he does sometimes.
“I mean it depends upon how serious it is. PowerPoint I threw together in 2 hrs for my history class heck no. Semester long project then yeah ima do the google image search thing where you make it only show images available for reusable.”
The importance of respecting the intellectual property of others is an issue at my school. It doesn’t seem to be considered a high priority since it is not consistently enforced. Students turn in work without following the copyright usage rules and the work is accepted by the teachers. However, it is understandable when you’re trying to teach a seven-year-old to research and write on a topic, nitpicking about citing the source of images is not a high priority.
As an educator, I feel an obligation to teach my students about copyright. It is a normal part of education now and like teaching someone to drive a car or how to have appropriate online etiquette, students need to be directly instructed on the rules and expectations. In addition, I believe we should encourage our students to take their own photos and create their own drawings. Of course, this is more time consuming; however, the pride of ownership students gain will help them to be more conscientious of why we should respect others’ work.
In countries where international copyright law is not clearly defined or followed, I can teach copyright in two ways. First, I can model appropriate use in my own work. Second, I can point out unfairly used images when I come across them. It is my goal to become a better role model by the end of this course