Wednesday, December 16, 2015

Ethical Practices of Technology Usage



PLO 5 : Exemplify ethical practices of technology usage.

Ethical Practice of Technology Usage
        I will discuss a prior class assignment from course out of my MATLT and then want to demonstrate my knowledge of the program learning outcome (PLO) number five to "exemplify ethical practices of technology usage".  The discussion will be in regards to bullying on Internet and ethical rights in the classroom when using the computer. I will include a discussion about the principles and theories, discuss and explain the how Cyber Bullying involves the use of technology to intimidate, or harass others. It has been considered in some ways more dangerous than any other form of bullying.  The discussion will be in regards to bullying on Internet and ethical rights in the classroom when using the computer. I will include a discussion about the principles and theories. I will discuss and explain Cyber bullying in the classroom. As I reflect on the bullying of students in the classroom setting, one can easily tie these two design principles (Learners build personal interpretation of the world based on experiences and interactions & knowledge acquisition is described as a mental activity that entails internal coding and structuring by the learner) to the situation of bullying. Bullying issues have become a problem for many, specifically, students who are easily influenced by their peers, because they tend to learn and adapt to behaviors that are inappropriate.
Cyber bullying or bullying through the use of electronic communication technologies has become a serious problem for children and adolescents. Like traditional bullying, it can be characterized by aggressive, repeated, and intentional acts that involve an imbalance of power between the victim and perpetrator. Cyber bullying is also unique in that it can be transmitted anonymously and reach victimized children and adolescents day or night, at home or at school. The possibilities can expose victims of cyber bullying to repeated and chronic abuse and can lead to high levels of psychological distress including symptoms of depression (Bonanno & Hymel, 2013; Schneider, O'Donnell, Stueve, & Coulter, 2012), anxiety (Aoyama, Saxon, & Fearon, 2011; Campbell, Spears, Slee, Butler, & Kift, 2012), and suicidal ideation (Bauman, Toomey, & Walker, 2013; Gini & Espelage, 2014).
        I have created a Power Point from a prior course from week four of EDU 609 I want to present for reading and comprehension of how cyber bullying or bullying can take place in the learning environment. Students will research the many ways that bullying can take place and what can be done to prevent cyber bullying or bullying.

The theory which stands out to me is G. Karesely Cognitive Flexibility Theory. Karesley, (2000) cognitive flexibility theory, focuses on the nature of learning in complex and ill-structured domains and separates itself from many theories because it deals with the acquisition of advanced knowledge.  Spiro and Jehng (1990) states, “by cognitive flexibility, we mean the ability to spontaneously restructure one’s knowledge, in many ways, in adaptive response to radically changing situational demands… this is a function of both the way knowledge is represented (e. g., along multiple rather than conceptual dimensions) and the processes that operates on these mental representations (e. g., processes of schema assembly rather than intact schema retrieval)” (p. 165.).  Cognitive flexibility theory is a learning theory that enables teachers to promote the use of educational technologies in the learning process, as well as, allow students to dig deeper into the complexities associated with the educational curriculum. In my opinion, if students are educated on the facts of bullying or being the bully, they will be able to build on their prior knowledge and reorganize their thoughts to use technology to help with the learning environment instead of using it in a negative way toward their peers or fellow colleagues. Students will learn to respect others rights as an individuals no matter what choices he or she may make in life.
Bullying issues have become a problem for many, specifically, students who are easily influenced by their peers, because they tend to learn and adapt to behaviors that are inappropriate. However, students can be taught to understand the ethical, cultural, and societal issues to relate to technology. Respect others ideas and background and acknowledge their contribution, Students can be taught a collaborative approach with others, both in person and technologies, to identify information problems and to seek their solutions.

The challenges experienced during the redesign process is second guessing my work. My fear mode kicks in and I began to panic. I will not give in, even though, I find myself in a few rough spots. I have this fear of not doing the correct quotations (APA Style) and design when putting together my Power Point. I will continue the task no matter what the end results may come out to be. I find myself in a bind many times but, I will not give up on my education. I know there will be many challenges that will be more difficult than others, but, I have the will to continue and beat the odds and work even harder toward my goal to, which is, to complete the Master’s program. The more I go back and work with some of the tools the work is better. I am able to designed the Power Point better the second time around. I can see where I made mistakes in the activity with hope they were corrected with finishing the activity.

REFERENCE


  Holfeld, B., & Leadbeater, B. J. (2015). The nature and frequency of cyber bullying                                 behaviors and victimization experiences in young canadian children. Canadian Journal of                School Psychology, 30(2), 116-135. Retrieved from                                                          http://search.proquest.com/docview/1690433295?accountid=32521
Kearsley, G. (n.d.). Cognitive flexibility theory. Retrieved September 7, 2002, from E

          Explorations in Learning & Instruction: The Theory Into Practice Database Web


Meridian: Winter 2001. A Middle School Computer Technologies. Journal a Service of NC        State University, Raleigh, NC Vol (4), Issue (1).  Retrieved from

Ribble, M. (2015). Digital awareness: Using technology appropriately. Retrieved from
Spiro, R, J.& Jehng, J. (1990). Cognitive flexibility and hypertext: Theory and
technology for the non-linear and multidimensional traversal of complex subject matter. D. Nix & R. Spiro (Eds.), Cognition, Education, and Multimedia. Hillsdale, NJ: Erlbaum.





No comments:

Post a Comment