ET 502 Information Access and Evaluation

13
Kevin Beck March 2012

description

ET 502 Information Access and Evaluation. Kevin Beck March 2012. Student Access. TF South is slightly below the computer to student ratio when comparing it to the national averages of other school with similar characteristics in most categories. (Robledo, 2012). (Wells & Lewis, 2006). - PowerPoint PPT Presentation

Transcript of ET 502 Information Access and Evaluation

Kevin BeckMarch 2012

Student AccessStudent Access

 

Computer to Student Ratio 

TF TF South South High High

SchoolSchool

Public schools

Secondary schools

Large schools

City school

50% or more

minority schools

50-74% Eligible for Free/Reduced Lunch

3.43.4 3.8 3.3 4.0 4.2 4.0 3.6

TF South is slightly below the computer to student ratio when comparing it to the national averages of

other school with similar characteristics in most categories.

(Wells & Lewis, 2006) (Robledo, 2012)

TF South does have 2 classroom TF South does have 2 classroom sets of iPads for both teacher use sets of iPads for both teacher use and classroom use. We do not and classroom use. We do not have a lending program.have a lending program.

images.search.yahoo.com

Professional Development for Professional Development for TeachersTeachers

How do we use the internet in the classroom???

images.search.yahoo.com

I chose to compare our computer to student ratio to the national averages because if we are to incorporate the internet into the classroom, we need to increase the ratio of computers to students.

I also chose to compare our hand-held computers (in our case iPads) to the national average because we have recently acquired 2 classroom sets of iPads and the statistics show that not many schools are using hand-held computers yet.

We used 3 different databases or search engines to learn how to find reliable sources.

(Google Scholar, 2012) ProQuest, 2012 ERIC, 2012

Teachers need to focus on teaching students how to look for authors who are creditable information which is unbiased and peer-

reviewed, current articles, and articles which pertain to their topic (Su, 2003).

(Currie, Devlin, Emde, & Graves, 2010)

The following are examples of the policies for TF South.

Firewalls

Teacher monitoring

Student monitoring

A) TF South uses firewalls and proxies to keep students off restricted websites.

B) Teachers monitor students access by walking around the classroom.

C) Teachers monitor students access through a software program where teachers can view student’s screens through the teacher computer. D) Students monitor their own internet access.

Currie, L., Devlin, F., Emde, J., & Graves, K. (2010). Undergraduate search strategies and evaluation criteria: searching for credible sources. New Library World, 113-124.Penn State University. (n.d.). Rethinking the Design of Presentation Slides: The Assertion-Evidence Structure. Retrieved March 21, 2012, from http://writing.engr.psu.edu/slides.htmlRobledo, R. (2012, March 6). Building Technology Coordinator. (K. Beck, Interviewer)Su, L. T. (2003). A comprehensive and systematic model of user evaluation of web search engines: II. an evaluation by undergraduates. Journal of the American Society for Information Science and Technology, 1193-1223.Wells, J., & Lewis, L. (2006). Internet access in U.S. public schools and classroom: 1994-2005. Washington: U.S. Department of Education: National Center for Education Statistics.

 

ERIC.ed.gov

images.search.yahoo.com

GoogleScholar.com

ProQuest.org