RSS

Tag Archives: eCitizen

SO, What’s THE CHANGE For Teachers In 21st Century Education!?

SO, What’s THE CHANGE For Teachers In 21st Century Education!?

.

Evolution of Education: Wordle Logo

.


SO, What’s THE Change For Teachers In 21st Century Education!?

.

sharing iconThis is a general overview only to explain in simple words:

I get asked very often and get also a lot of discussions with people and also teachers about what’s THE real CHANGE in 21st Century Education and especially for teachers, even that MOST people tell me that “THE CHANGE” is very difficult to understand! BUT it’s actually very easy to understand, BUT it needs to get accepted from the teachers! This is my point of view, let me explain, please:.

What really changed for teachers is the way they will teach the students, THEY are NOT anymore “THE BOSS” in the classroom, ===> THEY are NOW a coach! <=== Someone who is guiding the students (learners) in THEIR way of learning and showing THEM how to learn and to deal with the BIG DATA on the Internet! It is NOT anymore a classroom of silence, it is a classroom where learners sit together in groups to solve problems in a team, solving the problems and learning together with the skills THEY acquired through previous teaching lessons.

It’s NOW ===> Us and THEM <===, WE try to work as a team for getting BEST results, it is NOW learner-centered! WE as teaching persons are NOT anymore THE most important one, BUT WE change THE way how WE are TEACHING and WE focus on what OUR mission is: giving OUR learners (students) the BEST Education to face the REAL WORLD outside of the “School-Cocoon“, thus meaning: WE need to know what the skills are that the REAL WORLD needs!

.

students-workforce

Image source: Prepare Learners for the Global Workforce

The teacher is NOT anymore in front of the class, BUT s(he) is together with the learners in the classroom. WHERE the term CLASSROOM needs to get redefined!

=> THE CLASSROOM is not anymore inside the schools, ===> NO “School-Cocoon” anymore! <=

 ===> THE WALLS are broken and Teaching and Learning takes part everywhere, outside the “OLD definition of CLASSROOM”! <===

It is ALSO the WE as WE are looking for a win-win situation between OUR learners and us as teachers, WE try to get out the BEST “Team-Work” as it is that skills are needed in the REAL WORLD from the employers! Students (Learners) should know about “Team-Work” as they will face it once out of school and being employed!

The biggest mistake teachers actually make is thinking that by using the newest educational ICT tools and technical devices will make them a 21st Century teacher, NO ===> NOT AT ALL!

[Start Text from: Don’t Confuse Technology With Teaching] Educators are coaches, personal trainers in intellectual fitness. The value we add to the media extravaganza is like the value the trainer adds to the gym or the coach adds to the equipment. We provide individualized instruction in how to evaluate and make use of information and ideas, teaching people how to think for themselves. [End Text from: Don’t Confuse Technology With Teaching]

THIS ALL needs a serious up-to-date of Professional Development! Check below for more information about PD, please:

.

21tCentury-Pedagogy-Assessment

Image credit ===> http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=A+Simple+%28Not+Easy%29+Pedagogy+Assessment

.

.

Learn more:

.

Check out ALSO these SlideShare examples, great stuff:

..

Check out this Infographic, please, which explains BEST for understanding:

.

Morphing into a 21st Century Teacher

Infographic credits: http://edudemic.com/2013/04/27-tips-for-becoming-a-digital-teacher/

.


Important to know: The Difference Between Contemporary And Traditional Learning

Check the infographic below who explains very well, please:

.

teaching-learning-style-comparison

Click image to enlarge! Image credits: http://edudemic.com/2013/03/contemporary-and-traditional-learning-difference/

.


How to know which skills the market needs!? 

.

book-question-markThat is also something I get very often asked: WE don’t know about the future jobs as every day NEW ones getting created emerged by the ICT and especially because of “Social Media“, so how to know about what to teach!?

That is certainly a well founded question and needs to get answered a bit differently by applying Howard GARDNER‘s view in his book “5 Minds For The Future“, see screenshot below, please.

.

5 minds 4 the future

.

By reading the above, I think the question is answered very well and with your pedagogical background you will know how to adapt your courses to it! OR??? Perhaps ALSO revising what you learned before you got your diploma, a little refresh of knowledge helps also…

Check out also my multilingual book selection (EN, FR, DE):

.


It’s about the learning, not the tools

.

iste-standardsLots of teachers have misunderstood what a 21st Century teacher should be and are doing nothing else as using the new educational tools, which is NOT the right way, sorry! The tools ONLY help making the courses more engaging and also more fun for the learners when well applied. They are necessary, BUT it is STILL the updated pedagogical knowledge of the teacher who is more important!

[Start Text from EDUDEMIC] However, if teachers change their approach to focus on transferable technology skills (i.e. the NETS-S) it will make the integration of technology more meaningful and prepare our students with skills they can take with them in the future.

The International Society for Technology in Education (ISTE) has developed a set of “standards for learning, teaching, and leading in the digital age that are widely recognized and adopted worldwide.” Those standards, known as the National Education Technology Standards (NETS), have several benefits including:

  • Improving higher-order thinking skills, such as problem solving, critical thinking, and creativity
  • Preparing students for their future in a competitive global job market
  • Designing student-centered, project-based, and online learning environments
  • Guiding systemic change in our schools to create digital places of learning
  • Inspiring digital age professional models for working, collaborating, and decision making.

[End Text from EDUDEMIC]

Read the complete article here, please:

.

And as I was talking ALSO about the “updated pedagogical knowledge“, known also as “Professional Development“, check here, please, to find out if YOUR PD is up-to-date:

..

Another BIG mistake is to focus ONLY on Apple devices and Apple resources in schools, such as iPad and iPhone Apps and more… Teachers like to play with them and students certainly also, BUT:

  • There are more employers who use Windows machines than Apple machines worldwide and the students need first the knowledge and the skills to work with that “Operating System” (OS)!
  • Once out of school and applying for a job, these “Windows Skills” are a ===> MUST to get a job!!! <===
  • NOT every employer allows a “Bring Your Own Device” (BYOD) strategy inside its company for different reasons, mostly for Cyber-Security reasons!

.

Check also these articles, please:

..


Social Media As Well Is NOW Included For Teaching And Learning

.

First of all, let us take a look about what “Social Media” is, watch the video below, please:

.

.


Why Social Media Should be Taught in Our School Systems

.

sharing-iconSocial Media (Twitter, Facebook and…) is part already of commercial strategies in most companies worldwide and if not yet it will be as companies must follow this trend to stay competitive! SO, the students (learners) need to have these “Social Mediaskills as well to be able to use them later in their future working place(s)!

.

I think the BEST way to explain it is to check my curation of professional articles, read them, please:

.


What are the trends in 21st Century Education?

.

As a good introduction, I think it would be good to watch first this video:

.

.

What are the learning futures? Check below:

.


BUT How Could I Follow With My Professional Development!?

.

sharing-iconFirst of all check out what is offered from your Education Ministry and then you might check my blog to find out what is needed to complete your PD:

.

If you are a self-learner, an autodidact, I suggest to you to use Twitter together with Curation and trying to build up a “Personal Learning Network” (PLN) and to participate on Twitter-Chats.

A very good practice would be ALSO to invite teachers who are NOT YET ready for the 21st Century Education in a classroom as an observer for learning together with an experienced teacher and giving him ALSO the right to teach, the moment s(he) wants to say something when the experienced teacher is giving the course(s)! This needs to get briefed before the course(s) start… This would made him (her) feeling part of it and encourage also…

.

Watch the video below to listen what the experts say:

.

..

Find the explications here:

.


What are the barriers to overcome for that THE CHANGE happens?

.

1ibdy1vf6wghd-n05dgl-aigainformation1Without a lot of talking myself, I invite you to read the following articles which explain  at its BEST:

.

Quote from [https://twitter.com/kimgarst] “If you don’t leave your past in the past, it WILL destroy your future. Live 4 what today has to offer, not for what yesterday has taken away.

.


Final Word

.

This is what I see as THE CHANGE with my actual knowledge, but if YOU dear reader have some more information, feel free to leave constructive comments, suggestions and even constructive critics…

Of course there are ALSO the Parent-Teachers meetings and other changes, BUt I wanted to show ONLY the changes for the teachers who are THE CHANGE for the mind… Once accepted these changes in the mind, it will take some time to adapt

.

.

Stay tuned for next posts 😉

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

Bring Your Own Device: Advantages, Dangers, Risks and best Policy to stay secure

. .

Learning IT-Security

.

Bring Your Own Device (BYOD) is more complex than most people know, read further to learn…

.

.

.

Keywords for this free course:

.

motivation, engagement, heroes, Security-Scouts, critical thinking, stay out of the box, adapt to new technologies, be aware of the malware, nobody is perfect, knowing the dangers and risks, responsibility, responsibility of School, responsibility of IT-Admin, responsibilities of BYOD users, Apple insecurity, Insecurity of Apps, Principals responsibilities, Mobile Device Management (MDM), Mobile Application Management (MAM), risks of BYOD, BYOD-Policy, IT-Security Infrastructure, Teacher-Parents Meeting, Cyberwar, Cyberwarfare, Government, Internet-Safety, IT-Security knowledge basics, UK govt encourages insurers to reward good IT security…

  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

===> Being ignorant is not so much a shame, as being unwilling to learn. <===

Benjamin Franklin

.
.

.

.


WHAT is The Pedagogy Of Education 3.0 And WHY Should WE Embrace It?

To make it very short, WE SHOULD embrace it as “mLEARNing” has more positive aspects as negative ones, please check below…

.

Education 3.0 and the pedagogy of Mobile-Learning

 

Click here to go to the original article ===> http://fr.slideshare.net/jgerst1111/education-30-and-the-pedagogy-of-mobile-learning <===

.

Check also my “Curation” about Mobile-Learning (mLearning):

.


What Teachers + Educators should learn about BYOD

TeacherMost of articles, blogs and Tweets written by educational people are showing the advantages of “Bring Your Own Device” (Hashtag for Twitter = #BYOD) and they embrace very well BYOD, which I do also; but…

.

There are some more things to consider such as:

  • A BYOD Policy in the campus, school…
  • Prepare for BYOD in your organization, thus meaning: training for ALL!
  • MDM: Mobile Device Management
  • Internal IT-Security Infrastructure
  • A special IT-Security Insurance

Read my complete curation about BYOD it here: http://www.scoop.it/t/21st-century-learning-and-teaching?q=BYOD where you will find also best articles and blogs who describe at it best what BYOD is as well as blogs from teachers who explain the benefits for Education…

===> Read and learn also about IT-Security, YES that is a MUST in 21st Century in Education, especially when using BYOD: <===

Learn also about eCitizen, Digital Citizenship where Teachers should stay there as good example and knowing about their responsability:

Responsability as eCitizen (Digital Citizen) for the Government, be a good patriot and know how to defend your Government against Cyber-Attacks and Cyberwar, why and how?

.

.

Principals: did you also think about your Schools, University reputation!? Imagine that there will be a data-breach, the Press would talk about and your reputation then!? You need to get protected by having a strong BYOD-Policy and a strong IT-Security infrastructure, think on that please…

Read more:

.

.

===> The above mentioned must be included in Education and especially when using BYOD, read these blogs and curated articles and you will understand that they are a MUST 😉 <=== 


Suggestions for a good BYOD Policy

.

BYOD

.

..

.

We need to know and to understand first that “Nobody Is Perfect”, no OS (Operating System) is 100% secure and there are vulnerabilities present, which need to get updated asap! This is not ONLY the IT-Admin’s task and responsibility, but our own responsibility!

.

.

Read also:

.

 

 

BYOD is becoming a prevalent Information Security and IT Focus

Image source

..

.

===> There is a need to for a healthy Cyber-Culture, a Cyber-Hygiene introduction for a more secure Internet! Read more: Cyber-Hygiene <===

.


Why our responsibility?

.

Question mark iconThe IT-Admin’s responsibility is to keep secure the School’s Network and to keep it safe from Malware and attacks; if it’s a good IT-Admin with good IT-Security knowledge he will even block infected devices to access the school network, that’s his good right! So imagine that you give courses with BYOD Infrastructure and some devices are infected and the IT-Admin blocks those, your course couldn’t get held as not all of your learners can access the school network, not funny at all that situation, isn’t it?

.

Check the complete slideshow here

My suggestions to prevent this is to organize a weekly security day in school for any class where the learners together with the teachers control their devices for latest updates and antivirus updates to make sure that they all are secure and don’t represent a danger and risks for the school network! Check the image below and read also the complete report from McAfee…

.

Total Mobile Malware Samples in the Database

McAfee Threats Report: Second Quarter 2012 

I suggest also that some teachers with good IT-Security knowledge create a “Security Club” in school where they train the learners about “IT-Security” to become “Security Scouts“, people with good IT-Security knowledge who can help others to stay secure. You will build up a secure community and the “Security Scouts” will be proud about their title and their responsible function. YES, responsibility that’s the right word which needs to get spread! In 21st Century Learning IT-Security and Internet-Safety are a MUST and should get maintained! Give a help to create the new 21st Century Heroes, the “IT-Security Scouts“!

Find below my blogs and other resources on How-To:

.

  1. IT-Security Scouts
  2. 5 minutes tutorials on How-To get smart about IT-Security
  3. BYOD in education–TechNet Jump Start training to help your planning
  4. MDM: Mobile Device Management
  5. 6 Keys To A Flexible MDM Strategy
  6. BYOD-Security-Becomes-a-Pervasive-Issue
  7. Is BYOD a Nightmare for IT-Security
  8. Apple, Mac, iOS4, iPad, iPhone and (in)security…
  9. UK govt encourages insurers to reward good IT security

The Internal Security of the School Network

.

Attention iconText from Higher Education-Data Breach [Start]Institutions of higher learning need to think like businesses AND consider the enormous financial and reputational dangers of a data breach. Unlike many businesses, colleges and universities are under constant attack, from within as well as without. [End]

A School Network has also data bases where the information of the learners are stored and which needs to kept private! Most countries have even laws about Privacy where the head of school could get taken responsible by court for a data breach, thus meaning: the principal would face severe punishment by law if the private data of the school staff and the learners would be made public by a data breach due to no IT-Security Policy in School’s.

Best way is that the Principal and his staff talks together with the IT-Admin on How-To build up best protection, especially when using BYOD, as BYOD could be dangerous and security risks are present in the School NetworkThere is also to consider supplement costs because of new staff for IT-Security and the costs of the whole IT-Security Infrastructure…

.

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

UneducatedEmployees_IG_554

Click image to go to source and to learn more…

.

Read also and stay always informed about news of Cybersecurity:

.


Tips for the IT-Admin

.

Chat iconLot of schools don’t have a professional IT-Admin, a person who has learned about IT-Security and who has the necessary skills about IT-Security, so here some Tips at least to give them some help:

.

.

.


Recommendations

.

sharing iconIt is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!

Parents could help their kids to achieve a weekly security task, reminding them about to do it by rewarding them and also by “punishing” them with a “Task-List“, check my FREE Online Google docs here:

.

Worksheets on Google Docs: 


What did we learn and what we must follow and respect!

..

 WHAT YOU MUST KNOW!

1ibdy1vf6wghd-n05dgl-trafficlightgreendan01

.

        • Automatic Windows Update must be enabled
        • For Apple devices: ALL the updates must be installed also!
        • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
        • Browsers (ALL) need to get updated! This is also a MUST for Apple devices!
  • While using “BYOD” (Bring Your Own Device), we ALL (Teachers, Educators and Learners) are responsible, not the IT-Admin alone!
  • While using “BYOD” we need a strong “BYOD-Policy” at least!
  • While using “BYOD” it is recommended to have also a “MDM” (Mobile Device Management)!
  • We learned that there is a need for “Mobile Device Management (MDM)” and “Mobile Application Management (MAM)”
  • It is recommend to organize a “Teacher-Parents-Meeting” to explain the parents that their kids are safe in your school, explaining them the efforts you make and asking them also to help their kids to respect the “BYOD-Policy”!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

Protecting the organization’s network and its data from attack and misuse requires more than just a BYOD mentality; establishing secure, mobile-enabled operations requires a mobility access control program that includes corporate-provisioned, approved employee- and partner-owned devices as well as unmanaged guest devices.

.

.

GUST-AVRIL2014-800px-2L’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

Stay tuned for next course and tutorial…

.


Search Engine Submission – AddMe

.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,