Professional Documents
Culture Documents
ORG
International Journal
of
Learning, Teaching
And
Educational Research
p-ISSN: 1694-2493
e-ISSN: 1694-2116
Vol.10 No.3
PUBLISHER International Journal of Learning, Teaching and
London Consulting Ltd Educational Research
District of Flacq
Republic of Mauritius
www.ijlter.org The International Journal of Learning, Teaching
and Educational Research is an open-access
Chief Editor journal which has been established for the dis-
Dr. Antonio Silva Sprock, Universidad Central de semination of state-of-the-art knowledge in the
Venezuela, Venezuela, Bolivarian Republic of field of education, learning and teaching. IJLTER
welcomes research articles from academics, ed-
Editorial Board
Prof. Cecilia Junio Sabio ucators, teachers, trainers and other practition-
Prof. Judith Serah K. Achoka ers on all aspects of education to publish high
Prof. Mojeed Kolawole Akinsola quality peer-reviewed papers. Papers for publi-
Dr Jonathan Glazzard cation in the International Journal of Learning,
Dr Marius Costel Esi Teaching and Educational Research are selected
Dr Katarzyna Peoples through precise peer-review to ensure quality,
Dr Christopher David Thompson
originality, appropriateness, significance and
Dr Arif Sikander
Dr Jelena Zascerinska readability. Authors are solicited to contribute
Dr Gabor Kiss to this journal by submitting articles that illus-
Dr Trish Julie Rooney trate research results, projects, original surveys
Dr Esteban Vzquez-Cano and case studies that describe significant ad-
Dr Barry Chametzky vances in the fields of education, training, e-
Dr Giorgio Poletti learning, etc. Authors are invited to submit pa-
Dr Chi Man Tsui
Dr Alexander Franco
pers to this journal through the ONLINE submis-
Dr Habil Beata Stachowiak sion system. Submissions must be original and
Dr Afsaneh Sharif should not have been published previously or
Dr Ronel Callaghan be under consideration for publication while
Dr Haim Shaked being evaluated by IJLTER.
Dr Edith Uzoma Umeh
Dr Amel Thafer Alshehry
Dr Gail Dianna Caruth
Dr Menelaos Emmanouel Sarris
Dr Anabelie Villa Valdez
Dr zcan zyurt
Assistant Professor Dr Selma Kara
Associate Professor Dr Habila Elisha Zuya
VOLUME 10 NUMBER 3 March 2015
Table of Contents
The Nature of High School Students Experiences at a Great Lakes Biological Field Station ...................................... 1
Marc Behrendt
A Needs Assessment Survey on Teacher Readiness of Science Pre-Service Teachers: Towards a Contextualized
Student Teaching Enhancement Program (STEP) ............................................................................................................ 17
Darryl Roy T. Montebon
The Experience of Hidden Curriculum on Selecting a Supervisor from the Perspective of Students ...................... 27
Fatemeh Robati and Forouzan Tonkaboni and Mohammad Mohammad Bagheri
Lessons Learned from Teaching Teachers how to Teach about World Religions ........................................................ 43
Derek Anderson, Holly Mathys and Joe Lubig
The Impacts on the Educational Landscape ahead the Free Internet Offers, Traps and Surveillance that Threatens
the Safety and Privacy on the Web .................................................................................................................................. 102
Rogerio L. Roth
Using Social Network Analysis for Analysing Online Threaded Discussions .......................................................... 128
Roberto C. Rodrguez-Hidalgo,, Chang Zhu, Frederik Questier and Aida M. Torres-Alfonso
1
Marc Behrendt
Ohio University
Athens, Ohio, USA
Abstract. The purpose of this case study is to explore how high school
students experienced a four-day field trip at Stone Laboratory Biological
Field Station, from a visiting students perspective, in order to understand
the value of that field station and its impact on science, science education,
and students lives. Chosen from a population of fifty students, six rural high
school student participants attended a four-day field trip, involving of two
days and three nights at Stone Laboratory and excursions to two neighboring
islands. Participants were given cameras to record their experiences during
the field trips to record anything they found significant or meaningful. After
the trip, students were asked to select the five most significant images and
write a paragraph, describing the significance of each image. Each
participant was interviewed three times in semi-structured and unstructured
formats. Analysis consisted of open coding using apriori and emergent
codes. Significant findings included: 1) Stone Lab provided a unique and
novel venue where the equipped laboratories, the managed shorelines, and
the natural areas provided the ingredients for awe and wonder; 2) the field
stations unique setting inspired curiosity and motivation among students; 3)
in reference to science education, the payoff for these experiences was
increased interest in science; 4) three of the six participants redefined their
career goals after their four day immersive Stone Lab field experience;
5) students developed a sense of appreciation for the Lake Erie environment.
Introduction
Biological field stations create a uniquely positive learning environment for students,
where each student is able to explore, discover, and reflect over the things that they
personally find interesting (Malinowski and Fortner 2011; NRC 2009; NRC 2014;
Organization of Biological Field Stations 2014; Woodhouse and Knapp 2000).
Students in preschool through graduate school find biological field stations
interesting and motivating. The field station experience can be life changing. Many
biologists and environmental scientists proclaimed a field station experience
strongly influenced their decision to pursue biology as a career (Arvey and Riemer
1966; NRC 2014).
For the purposes of this article, the definition of a biological field station (henceforth
to be called a field station) will be a facility located in an isolated, natural area. The
field station may be focused on research, education, community outreach, or
conservation, with a focus on that regions habitats, ecosystems, flora and fauna, and
environmental issues (Arvey and Riemer 1966; NRC 2014; Organization of Biological
Field Stations 2014). A field station is typically a college or university satellite
facility. In the early 1900s, most field stations focused on nature study. Arvey and
Riemer (1966) recognized that research was a primary mission for roughly half of
existing field stations, the other half focused partially or entirely on student
education and field experiences. Field stations were often the entry point where
scientists performed and honed their research.
Arvey and Riemer (1966) recognized that little information was published about
field stations, although field stations provided a significant service connecting
students to authentic science experience. A literature search yielded research
illustrating that field stations are recognized as a venue of research, but the
pedagogy and methodology is barely explored. In 2014, National Research Council
(NRC) published an extensive document that examined the value and sustainability
of field stations and marine laboratories in the 21st century (NRC 2014). The
committee encountered a significant challenge to empirically demonstrating the
value of field stations due to the lack of aggregated data on their activities and
impacts on science and society (NRC 2014 p. 8). The lack of research concerning
field stations extends to outcome and impact of field station pedagogy (NRC 2014).
Because a major goal of any field trip is to create student learning, a brief look at
learning will connect the functions of field stations to the students experiences. Kolb
and Kolb (2005) identified six key factors concerning learning:
1. Learning is a process, not an endpoint. It requires feedback, reconstruction
and reflection of the experience;
2. All learning is relearning, which is maximized when student beliefs and
ideas are included to develop assimilated, new refined ideas;
3. Learning requires understanding an experience through opposing methods
of experiencing, feeling versus thinking, or doing versus watching;
4. Learning consists of feeling, thinking, doing and watching;
5. Learning occurs from an experience between the person and environment;
6. Learning creates knowledge (Behrendt 2014, p. 38).
Learning has also been defined through the use of an ecological framework, the term
ecological meaning the relationship between the physical environment with the
cultural environment and its associated individuals. Each involved individual
possesses unique personal development and differences in his or her background
due to finances, education, family traditions and beliefs, and associations with peers
(Bronfenbrenner 1977; NRC 2009). The ecological framework recognizes three
different lenses in which to analyze informal science learning: the cognitive/affective
or people-centered lens, the place centered lens, and the culture centered lens (NRC
2009).
The place centered lens focuses upon the physical aspects of the informal science
experience, including the setting, resources, tools, and equipment being utilized. The
place-centered lens will vary depending on the venue. Individuals will respond
differently depending on the physical setting and the equipment available (NRC
2009).
The culture centered lens focuses on the relationships the individual has with the
community of friends, teachers, and other individuals directly or indirectly involved
in the experience. The community may provide values, skills, knowledge and
personal identity to the individual, and the individual may provide values, skills,
knowledge and personal identity to the community. An individual will act, perform,
experience, and learn differently depending on the composition of the community
(NRC 2009). These lenses were significant and were utilized during transcript
analysis to determine apriori codes.
An informal learning venue is any non-school location where learning might take
place, including museums, science centers, zoos, and field stations (Falk and
Dierking 2000). A venue is defined by its purpose. Visitors at a zoo will observe
animal exhibits in a manipulated setting, visitors at a science center will experience
interactive stations in a manipulated setting, and visitors at a field station will
encounter both formal learning through classroom lectures and informal learning
through hands-on, personal experiences while immersed in a natural setting (Falk
and Dierking 2000).
Biological field stations may be associated with general habitat types, including
freshwater, saltwater, terrestrial, and wetland (Arvey and Reimer 1966). Field
stations are also differentiated as research-based, instructional, or both. Marine
biological field stations tend to be larger and more instructional because aquatic
habitats are not as overwhelmed by constant student usage. Inland biological field
stations are often research-based, fearing that an influx of humans would alter the
terrestrial environments.
For this study, a field station with a goal of student instruction was desired. The
Ohio State Universitys Franz Theodore Stone Laboratory (henceforth to be called
Stone Lab) was the primary option for this study due to convenience as well as
having met the needs of this study. Stone Lab is a freshwater marine biological field
station located on Gibraltar Island, a six-acre island located in western Lake Erie,
owned by The Ohio State University and managed by the Ohio Sea Grant College
Program. To support and implement its mission of promoting research, education,
and community outreach, Stone Lab is equipped with three large research boats and
several motor boats (Ohio States Stone Laboratory 2013). The classroom building
has two large laboratory workrooms on the first floor and smaller workrooms on the
second and third floors, equipped with instrumentation and tools ranging from high
quality microscopes, digital equipment, binoculars, nets, and boots.
The spring and fall workshop curriculum has been crafted and shaped over decades
of workshop programs. Instructors, typically recent environmental science or
biology graduates or upper level environmental and biology major college students
gaining work experience, give a short classroom presentation, and then take the
students outside to explore and discover what was just taught. Workshops are
usually one or two days in length, although some schools opt to extend the stay. The
visiting schools teacher preselects the workshops that the students will experience,
and occasionally, the teachers will do much of the initial classroom teaching, leaving
the Stone Lab instructors to lead the field and laboratory experiences. There may be
up to five different workshop classes going on at one time. Attending students
separate into cohort groups, and then rotate between different workshops. Each
workshop class lasts a maximum of two hours in length, but usually ends 15 minutes
early to allow students some personal time between workshop classes. In this study,
the student group thatconsisted of 50 high school students, divided into four cohort
groups that participated in the immersive courses: ornithology, aquatic invertebrate
biology, island botany, plankton biology, fish biology, and activities on BioLab,
one of the large research vessels.
This reported case study is a small segment of a larger case study that investigated
how high school students experienced an extended and immersive field experience.
This study specifically explored how high school students experienced a field station
during a field trip. A case study design was utilized, a format suitable to explore
real-world situations, cultures, and programs, to investigate and understand what
goes on there and how participants perceive things (Creswell 2013; Stake 1995; Yin
2009). The case study was bounded by participants (the student participants
attending a single rural high school), setting (Stone Labs specific program; Stone
Labs geographical location on an island), and time (a four-day immersive field
experience). The case study utilized interviews, photovoice, and observations,
leading to analysis searching for patterns of common meaning derived from the
student participants experiences during the field program, culminating with a final
case description (Creswell 2013) .
Participants
Participants in this study consisted of students ranging from ninth through twelfth
grade at Rural Ohio High School (ROHS) (pseudonym), which was selected because
biennially, a group of students traveled to Stone Lab for a four-day immersive
science experience. All students in the school science club were invited. Although
expected to pay for their experience, students could participate in fund raising
events to pay for the field trip. For this study, the two cooperating teachers made
their classrooms and students available for interviews. The participant pool
consisted only of students who planned to attend the field trip and provided
parental permission forms to participate in the study. Six students were purposefully
selected to participate in a case study, stratified by gender and interest in science,
resulting in four female and two male students, three self-identified as high interest
and three as low interest in science. All other participants in the pool participated in
focus group discussions. Internal Review Board permission was sought and granted
by Ohio University.
Credibility and validation were important priorities. The rationale for the decision of
type and quantity of participants was defined by the question and by the available
sample pool (Patton 2002). Sample size is an issue in which little consensus is found
throughout the literature (Onwuegbuzie and Leech 2007; Patton 2002). If
interpretations and theories remain strictly localized, then the size of the sample is
not as crucial (Onwuegbuzie and Leech 2007, p. 115). The context within the current
study was very narrow, bounded by location, time, event, and participants. The
sample sizes needed be large enough to achieve data saturation in which no new
emergent themes are uncovered with further data collection, yet small enough to
develop depth. Guest, Bunce, and Johnson (2006) suggested that data saturation
occurred with twelve interviews, illustrating that 92% of codes developed from a
series of transcripts were created after twelve interviews in one study, and 88% of
the codes developed in another study. However, the overarching themes in those
same studies were thoroughly established after six interviews, suggesting six
interviews may be sufficient to develop meaningful themes and interpretations
(Guest et al 2006, p. 78). In this study, there were six participants, and each was
interviewed three times, for a total of 18 interviews.
Site selection
Procedure
The goal of this study was to gain insight to how high school students experience a
field station during a field trip. Qualitative research methods were utilized,
specifically semi-structured interviews, observations, and photovoice with essays
and unstructured interviews. Semi-structured interviews were conducted at the
school prior to and following the Stone Lab field trip. Unstructured interviews were
conducted after the field trip, to allow each participant an opportunity to comment
on the photographs that they had taken during the field trip as part of the
photovoice activity.
Photovoice is a method that allows the researcher to see an experience from the
viewpoint of the participant (Wang and Burris 1997). An image is powerful when
associated with the participants explanation or purpose for the photograph.
Photovoice also helps students to relive their experiences, to help them remember
their experiences. In this study, each participant received an Olympus VR 310 digital
camera with an 8 GB graphics card. They used photovoice to show what they
thought was significant as they participated in the four-day field experience.
Participants were asked to take photographs from the moment they left the school
until they arrived home again four days later.
To gain context and understand the students perspectives of the field station
experience, it would assist the reader to understand the general field trip experience
at Stone Lab. To set foot onto Stone Lab, a student first must ride a school bus, then a
ferry, to South Bass Island, a bus to the opposite side of the island, and then boats to
Gibraltar Island. Once students arrive, they cannot leave the island; they are
immersed in a science culture for the duration of their stay on the island.
On this field trip, students arrived at the island on a sunny, 70F day. The first
evening included an organizational meeting, followed by evening activities,
including volleyball and a bonfire. Student free time occurred whenever they were
not obligated to classes, meetings, or curfew. During free time, students were able to
explore or socialize as they chose, within the rules.
The next day began with heavy rain and strong north winds with the temperature
around 40F. Students participated in four 2-hour classes, with an evening program
about Stone Labs history and past research. The third day started with periodic
downpours and strong winds and temperatures around 45F. Students completed
their fifth workshop class, and then rode a large jet boat to Kelleys Island, where
they hiked approximately two miles to a wildlife area to explore the glacial grooves,
island geology, the Lake Erie shoreline, amphibians and reptiles within the wildlife
area, plants, fossils, and unique habitats in the region such as a local alvar. The
students had the option to explore on their own, in self-determined groups, or with
one of the teachers. The evening meeting at Stone Lab consisted of two scientist
guest speakers, and then a cat dissection for interested students. The final day began
with warmer temperatures and sunshine. Students traveled to South Bass Island,
where they visited Perrys Monument commemorating the Battle of Lake Erie. When
the program concluded, the students hiked and explored a wildlife museum, a
crystal cave, and the South Bass Island State Park shoreline to look for Lake Erie
watersnakes.
Back at school the Monday after the field trip, each participant was asked to select
five images from his or her own camera that best captured what he or she considered
were significant or meaningful experiences. Then the participants were asked to
write a paragraph or short essay for each image, describing why the photograph was
meaningful for them. Once completed, the researcher conducted unstructured
interviews, asking each participant to slowly scan through the full collection of their
field trip images and explain or discuss the images, why they took the image and
what it meant to them.
Observation methods were utilized before, during, and after the field trip. The
researcher was the sole observer and spectator in the science classroom before and
after the trip, where participants were observed during lab activities with the goal to
understand the behavior, activity engagement, and interactions with other students,
all providing evidence of participant interest. The observations provided an
additional benefit by allowing the participants to become familiar with and
comfortable around the researcher, which created open communication during the
interviews. At Stone Lab, the researcher was a participant observer, observing the
participants during the activities.
Each participant was asked to fill out a short survey, which solicited their
demographic information, and concluded by asking the participants to list their
favorite and least favorite subjects, activities, describe their future plans, and finally
to identify his or her level of interest in science on a Likert-like bar. The survey was
created to understand each student, and was not used in any data analysis.
Analysis
Data focused on the participants experiences during the field trip, and was cross
analyzed with the other participants experiences to illustrate themes, and common
and unique experiences. The data were broken down with the research questions in
mind to direct the analysis. Questions explored in this study included, how did high
school students experience the Stone Lab Biological Field Station during a four-day
field trip? What aspects of the experiences led to development of interest? The
observations and interviews were transcribed, coded using apriori codes derived
directly from the ecological framework, and emergent codes derived from the
participants words or actions. Codes specific to the physical lens of experience dealt
primarily with setting. Codes specific to tools were usually implied.
Photovoice images were linked to the accompanying essays, and were coded
together. Each essay was treated as an interview transcript since it was the
participants personal voice, or photovoice. Since the participants selected these
images and essays due to the photographs meaningfulness, all coding of photovoice
transcripts was considered significant.
Results
All themes and patterns from the larger, original study connected to Stone Lab in
some way. The purpose of this study was to explore how high school students
experienced a field station during a field trip, from a visiting students perspective in
order to understand the value of that field station and its impact on science, science
education, and students. Because the data are entirely from the students
perspectives, supportive evidence to the major themes will consist of the students
words. Only representative quotes have been presented to limit the length of this
section. The names are pseudonyms, followed by the students level of science
interest, H(igh) or L(ow). To further protect the students identities, the dates of the
interview comments are not included. It should be noted that all three aspects of the
ecological framework are represented through the students statements. The physical
aspect is the primary focus of this study, however, also of interest are the portions of
the cognitive/affective and cultural frameworks that integrated with the physical.
Focus on Learning
The three students with high interest in science enjoyed the learning opportunities at
Stone Lab. I like [that] the focus is all on learning, it is fun learning, and I like the
location because I love Lake Erie (Janessa-H, interview). Janessa-H saw the
experience as purposeful learning. It is all applicable, it really helps, it is real
science, not just here, take notes on this, you will never actually use it in life - this is
an actual career, this is actually happening every day (Janessa-H, interview). The
three students with low interest in science participated in and enjoyed the
experiences, but did not reveal the passion for the program topics. David admitted,
Unless you are an important scientist, you are not going to need to know the
birds (interview).
Affective Responses
The significance of affective responses was evident throughout the interview and
photovoice data. Although this study was not designed to examine emotion, the
prominence of the affective comments provides insight to how students experienced
the field station field trip. Among the six participants, 39 different affective
responses were identified. Fun, like, and happy constituted a majority of the
responses, but awe and wonder, and boredom required a deeper examination. Awe
and wonder included feelings of amazement, admiration, or surprise. All six
participants revealed a moment when they saw something and were amazed.
Rainbows and sunsets promoted many comments.
I went out on Alligator Bar and saw this beautiful rainbow behind Perrys
Monument. I was amazed because I hardly ever see them and when I do, theyre
really faint or small. This one is clear and pretty big, which really excited me (Willa-
H, photovoice).
And it was at sunset, that is where I got that really cool sunset picture, too. That
was amazing (Willa-H, interview).
Willa-H had strong negative feelings about snakes during the pretrip interview, but
her feelings changed after finding and holding a snake. I love snakes. I think they
are so cool. And they are cute and cuddly (Willa-H, photovoice). This statement is
significant, illustrating a new understanding while her affective response changed
from fear to wonder.
David-L had never seen the Great Lakes before this trip. He expressed his wonder as
he watched the storms move across the lake, We sat there and watched it, and then
there was a big storm off in the distance, so we came in and it went from dry and
slightly warm to just pouring down rain, that was kind of a, that was a neat thing.
During the post-trip interview, David-L discussed the memory of the moment he
looked out over the lake, And just the vastness. It looks like the seathe way the
water moved, the way you could see the water had been going in the same pattern
for like, a hundred years, it dug a circular shape into the rocksSometimes it made
you feel warm inside, like even though it was cold, it just felt like, something was
really neat about it, like it was different, you cant really explain it, but it was
different.
Lucas-L had little interest in science. His focus was on relationships with peers. He
photographed an image at night and wrote, I love the night because everything is
calm and relaxing. I saw how the moonlight just reflected so perfectly and needed a
picture (Lucas-L, photovoice).
Not all comments were positive. It is noteworthy that the three participants who
made comments about being bored were the three students who were least
interested in science. David-L spoke about his feelings after the plankton lab failed to
collect specimens to examine, I did not get anything. After that, I was really bored
(interview).
Interest
Students identified moments when they were engaged and interested. Willa-H
talked about the surprises and unexpected activities during her trip to Stone Lab,
Going to Stone Lab, I didnt know what to expect in the first place. So everything
was, you turn around and there was something new. And you are, oh, I didnt know
that was going to happen. When I first stepped onto [the beach], I didnt expect it
to be gravel, it was weird, I am used to sandy beaches, like even on Kelleys [Island],
it is sand. It was weird (Willa-H, interview). The novelty of the setting grabbed her
interest and her curiosity motivated her to explore.
Paige-H described triggered interest concerning this trip, Just being able to explore
that and see all the different formations nature has made around it, was pretty cool.
And then you get to see all the plants and animals, mostly plants, all the way back
there and have different teachers point out to you, that is this, and it does this. Thats
kind of cool (interview).
Lauren-L experienced the same activities as the other participants, yet she exhibited
little interest, in spite of the new environment and island activities. On the first day,
she took only four digital images. During the post-trip interviews, Lauren-L did not
discuss anything concerning her experiences of that first days activities. During the
botany class, Lauren-L did discover an interest in plants, and said that while she was
not inspired to take more science classes, she did crave to go out into nature and look
for new plants.
Willa-H-s final comments in her final interview defined her experience at Stone Lab:
It was really intense, I just felt, very curious, but also, [pause], I dont know
how to explain it. Amazed. Because I had never been put into a situation
where you were like in depth, going into all this stuff, it was like, it wasnt in
a classroom, like you were there learning, and it wasnt like learning, you
were exploring, you were doing all this stuff, I was like this is awesome. It
was also very exhausting, you are doing so much and even though it was
like, I was cold and wet and muddy, through all of that, it was just
wonderful, it was great, and I just remember, not when I was at Stone Lab,
but after, when I came home, I just missed it so much, it kind of hurt a little
bit. I just want to be back at Stone Lab. For one more day.
Willa-H was intrinsically motivated. She was curious. She was excited. She wanted
to continue exploring and discovering.
Three students acknowledged that this field trip had affected their career and life
paths. Most profoundly affected was Willa-H, It made me sure of what I want to
do, to go into a science career. I realized there is so much that I wanted to learn and
do and I wanted to be the one who was figuring things out and telling people about
it, so when we were exploring and learning, I really want to be the one exploring and
learning all the time. That is just what I want to do with my life (interview). Paige-
H said that because of her time at Stone Lab, she was changing her major from
American Sign Language to environmental science.
Culture
Codes connecting culture and Stone Lab as related to this study were minimal. Stone
Lab was the setting for social interactions. Many images and comments involved
peers, including during exploration and activities. New bonds formed among the 50
students. Willa-H voiced sadness when she was discussing her gallery of
photographs, and came to the final image of the group photo taken moments before
all the students loaded onto the buses to head home, here we are, now I will never
forget any of you (interview).
Most participants did not make direct, relevant comments concerning the setting,
but regularly inferentially acknowledged the Stone Laboratory and island settings.
Kaylie-H recognized that the Stone Lab setting created a mystique or ambiance that
could not be recreated in the classroom. It has been there so long and so many
students have come there, and have had life changing experiences and learned so
much. I like that it has that feeling of age and that feeling of knowledge in it
(interview).
Most comments focused upon experiences and not the setting, although it was the
unique setting that accommodated the experiences, as illustrated by the following
comment, I liked the macroinvertebrate walk on Alligator Bar. We saw several
[species of animals] that I had not seen before, we found a water beetle that is
actually kind of rare and we dont usually find it, and we found it, and we were kind
of excited about that, laughing really geeky things, that was pretty cool (Paige-H,
interview).
Participants did not initiate any comments concerning tools used on the field trip,
but mentioned tools as a means to explore or discover. Tools were essential to the
experiences and seemed to be considered part of the experience. We were trying, all
of us, tried into the microscope to get pictures (Kaylie interview). Paige used the
identification keys to identify macroinvertebrates, plankton, and plants, I knew it
was Dutchmans breeches, because I had seen it before, but trying to get it to key
(interview). Paige-H and Kaylie-H were able to explore the wetland because they
had the foresight to bring along boots, We had to go into this back area that was
almost too deep, it hit the top of our boots (Paige, interview). During his interviews,
David-L acknowledged using tools on the research vessel to determine water clarity
and depth. The most common tools that participants recognized were microscopes,
identification keys, nets, binoculars, and hammers.
Stone Lab is a modern, high tech research facility for researchers. The high school
students enjoyed using the tools and equipment that is not typically available for use
in traditional secondary school science rooms. Although tools enabled exploration,
discovery, understanding, and knowledge, the participants did not recognize tools
as a source of interest or excitement. Students expected and accepted the presence of
the tools. Tools held no special place in the participants memories.
There was a great divergence in what the students found interesting and significant.
Students already interested in science were excited to participate in the activities, to
explore, discover, and try out new skills. Students with less interest in science
became excited about the novel setting of the big water Great Lakes ecosystem,
where each activity was an entirely new experience. Biological field stations might
consider creating two tier programs that may provide high-science-interest students
activities focused on new skills and knowledge, and providing low-science-interest
students activities focused on experiencing, exploring, and discovering the novel
setting, and how that novel setting is relevant in their lives.
Three of the six high school student participants redefined their career goals after
their four-day immersive Stone Lab field experience. Students may read, study, and
learn about wildlife, botanical, and environmental career paths, but an authentic
experience provides the knowledge and motivation to realize the reality of such a
career (NRC 2014). Not all student participants were so deeply affected by the Stone
Lab experience. Lucas-L attended the field trip to be with his friends and disclosed
he had little interest in the planned activities. After the trip he admitted, Everything
out here was really cool to do, but I just do not like science. On the other hand,
Lucas-Ls photovoice images, which illustrated what experiences he thought were
meaningful or significant, included animals, activities, and poignant landscapes. To
determine a truer level of impact a four-day field trip at a field station may have on
students lives, a study is needed to examine the long-term effects on low and high
science interest high school students.
Effect on Society
The student participants experienced Stone Lab as a new and exciting environment.
What may have seemed ordinary for teachers and Stone Lab staff was a first time
experience for many students. Lucas-L discovered the tranquility of the moonlit
night while listening to the waves lapping the shoreline, Willa-H saw a rainbow,
David-L saw big water for the first time in his life. Seeds for new consciousness and
appreciation for the environment were planted.
For students not interested in science, Stone Lab provided knowledge and personal
connections to the Lake Erie ecosystem and to environmental science. As future
adults, these students may possess a stronger scientific literacy that will guide their
decision making at home, at work, and in the voting booth. Field experiences
associated with inquiry based learning have been shown to improve a students
science scores, self-esteem, conflict resolution, problem solving, motivation to learn,
and classroom behavior (NRC 2014 p. 13.) A positive field station experience may
later lead to participation in citizen science, or as a volunteer in the community
(NRC 2014). The student participants admitted that this Stone Laboratory field trip
indeed altered their perception of Lake Erie, of environmental science, and for some,
the reality that a STEM-related career pathway might be right for them.
Conclusion
American science education is in crisis and people are needed to solve the crisis.
Students need to be prepared for things that have not been invented yet. Students
need knowledge and impactful experiences that will equip them as adults of
tomorrow with the tools necessary to solve these problems. Classroom lecture alone
will not get the job done. Students go into drone-mode and become uninterested and
unmotivated (Behrendt 2014).
The classroom must be taken somewhere new, to where the students are able to
become interested, a place where doors open to intrinsically motivated learning and
deeper knowledge. Students need to understand the interconnectedness between the
fundamentals of science, the environment, and everyday life. Quality experiences
impact student learning through increased interest, increased motivation to learn,
increased knowledge and a broader perspective that will help them to apply their
knowledge to the world around them (Behrendt 2014).
Through the words and lived experiences of the student participants, there is
agreement that the four-day experience at Stone Lab was beneficial in multiple ways.
The students explored, discovered, and reflected over the things that they personally
found interesting. The students developed and discovered interest in many aspects
of biology, environmental science, geology, and the geography of the region. Some
students admitted that the field station experience might have redirected their lives
to a career in the environmental sciences. The students recognized the value of Stone
Lab, and ostensibly any biological field station that provides a focus on student
exploration, discovery, education, and applied knowledge to the STEM fields.
References
American Institutes for Research. (2005). Effects of outdoor education programs for
children in California. [accessed 2014 Dec 29].
http://www.air.org/sites/default/files/downloads/report/Outdoorschoolr
eport_0.pdf
Arvey, M.D., Riemer, W.J. (1966). Island biological field stations of the United States.
BioScience, 16(4), 249-254.
Behrendt, M. 2014. Nature of High School Students Experiences at a Biological Field
Station. [Dissertation]. [Athens, OH]: Ohio University.
Bronfenbrenner, U. (1977). Toward an experimental ecology of human development.
American Psychologist 35, 513-531.
Creswell, J.W. (2013). Qualitative inquiry and research design. LA: Sage.
Falk, J.H., & Dierking, L.D. (2000). Learning from museums: Visitor experiences and the
making of meaning. Walnut Creek, CA: AltaMira Press.
Guest, G., Bunce, A., & Johnson, L. (2006). How many interviews are enough?: An
experiment with data saturation and variability. Field methods, 18(1), 59-82.
Hidi, S., & Renninger, K.A. (2006). The four-phase model of interest development.
Educational Psychologist, 41(2), 111-127.
Hofstein, A., & Rosenfeld, S. (1996). Bridging the gap between formal and informal
science learning. Studies in Science Education, 28, 87112.
Kolb, D. 1983. Experiential learning, experiences as the source of learning and development.
Englewood Cliffs, NJ: Prentice Hall.
Kolb, A.Y., & Kolb, D.A. (2005). The Kolb learning style inventory version 3.1 2005
technical specifications. [accessed 2014 Dec 29]. http://www.whitewater-
rescue.com/support/pagepics/lsitechmanual.pdf.
Malinowski, J., & Fortner, R.W. (2011). The effect of participation in a Stone
Laboratory workshop a place-based environmental education program on
student affect toward science. Ohio Journal of Science, 110(2), 13-17.
National Research Council (2009). Learning science in informal environments: People,
places, and pursuits. Washington, DC: The National Academies Press.
National Research Council (2014). Enhancing the value and sustainability of field stations
and marine laboratories in the 21st century. Washington, DC: The National
Academies Press.
Ohio States Stone Laboratory. (2013). Mission Statement. [accessed 2014 Dec 29].
http://stonelab.osu.edu/about/mission/.
Onwuegbuzie, A.J., & Leech, N.L. (2007). A call for qualitative power analyses.
Quality and Quantity, 41: 105-121.
Organization of Biological Field Stations. 2014. Research at field stations. [accessed
2014 Dec 29]. http://www.obfs.org/research-at-field-stations.
Patton, M.Q. (2002). Qualitative research and evaluation methods. Thousand Oaks, CA:
Sage.
Rennie, L.J. (2007). Learning science outside school. In Handbook of research on science
education, ed. SK. Abell, and NG Lederman. Mahwah, NJ: Lawrence Erlbaum
Associates.
Saylan, C, Blumstein, DT. (2011). The failure of environmental education: And how we
can fix it. Berkeley: University of California Press.
Smith, M.K. (2001). David A. Kolb on experiential learning. [accessed 2014 Dec 29].
http://infed.org/mobi/david-a-kolb-on-experiential-learning/.
Stake, RE. 1995. The art of case study research. Thousand Oaks, CA; Sage.
Wang, C., & Burris, M. (1997). Photovoice: concept, methodology, and use for
participatory needs assessment. Health Education & Behavior 24(3), 369-387.
Wellington, J. (1990). Formal and informal learning in science: The role of the
interactive science centres. Physics Education 25(5), 247-252.
Woodhouse, J.L., & Knapp, C.E. (2000). Place-based curriculum and instruction:
Outdoor and environmental education approaches. ERIC Clearinghouse on Rural
Education and Small Schools Charleston WV. [accessed 2014 Dec 29].
http://www.kacee.org/files/Place%20based%20education.pdf
Yin, R.K. (2009). Case study research: Design and methods. LA: Sage.
Zandstra, A. M. (2012). The impact of an informal science program on students knowledge
and interest. [Dissertation]. [Waco, TX)]: Baylor University. [accessed 2014 Dec
29].
http://beardocs.baylor.edu/xmlui/bitstream/handle/2104/8481/anne_zan
dstra_phd.pdf?sequence=1
Abstract. This research aims to evaluate the level of need of the pre-
service teachers in different areas to design a contextualized student
teacher enhancement program. The respondents of this research are the
one hundred thirteen (N=113) science pre-service students taking up
field study courses at the Institute of Teaching and Learning of the
Philippine Normal University. A qualitative research design was utilized
in this study. A journal analysis procedure was also done to determine
the student perception in different areas asked in the survey
questionnaire. The survey results showed that pre-service teachers have
a moderate level of need in seven out of ten items in the survey (M
2.0).The level of need of the pre-service teacher does not significantly
vary when categorized per major (p 0.05 at sig. 0.05) except on the
teaching strategy (X2(2) =12.453, p = 0.02) area. When grouped per
gender, the mean ranks do not significantly vary on the different areas
being surveyed (p 0.05 at sig. 0.05). Respondents also revealed that they
need to improve themselves to possess good teacher qualities. Thus, it is
recommended that a contextualized student teaching enhancement
program be implemented to help the pre-service teachers with their
needs.
1. INTRODUCTION
The Philippine Normal University has been assigned as the National Center for
Teacher Education in the Philippines (R.A. 9647). Thus, it is the institutions
responsibility to produce quality and excellent teachers. The present curriculum
for the bachelors degree program in the Philippines include Field Study (FS)
courses that enable students to relate the theories and concepts they learned in
their professional education courses with real classroom experiences. In these
courses, pre-service teachers are exposed to various teaching experiences such as
The call for teacher-training programs that are responsive to the growing
diversity of learners is high. The 21st century learners need teachers who are not
only experts in their own field but also are knowledgeable in other disciplines
(Queensland College of Teachers, 2012). This claim has been supported by
Cheng (2009) that the need in teacher education has shifted from effective
movements toward the global movements. He described the paradigm shift to
be waves of change from just merely delivering the content knowledge, to
stakeholder satisfaction, multiple and sustainable development as change in the
society arise. With these changes, university training must be able to prepare
those who are going to be teachers. Teachers should be prepared to handle
situations inside and outside the classroomsthat will effectively promote change
and solve conflicts in the present times (Young, et. al, 2001). Moreover, teachers
should not only be locally competitive but globally as well (Cheng, 2009).
While the practicum program is a good way of inducting pre-service teachers, it
is imperative to look for alternative ways to prepare them. Craig, Kraft, and du
Plessis (1998) suggested that research based programs should be done to address
the call of the changing time. Thus, this research is set to explore ways to that
will help science pre-service teachers in the Philippines respond to the K12
curriculum challenges.
Grossman et al (2009) described that a professional practice with the goal to
develop expert practitioners should prepare a program that orchestrates
understanding, skill, relationship and even the identity of the practitioner. In
practicing a certain profession, it is not easy to identify the practice from the
practitioner. With Grossman et als (2009) idea in mind, it is essential to design a
program that will help practitioners in their field of work. In this case, this
research aims to design a program that will help pre-service teachers as they
prepare themselves to become expert practitioners of education.
The aligned theoretical and pedagogical academic preparations in teacher
education are thought to promote meaningful and worthwhile pre-service
experiences (Ziechner, 2010; as cited by Cheng 2013).To identify the different
factors that pre-service teachers really need, and support them with those needs
can enhance the teacher education programs.
In the Philippines, curriculum change has drastically happened. The former
Basic Education Curriculum has been made into Enhanced Basic Curriculum or
the K12 Curriculum by virtue of the R.A. 10533. The new curriculum calls for the
revision of teacher preparation in the universities. In effect, Teacher Education
Institutions (TEIs) have to reconstruct their existing bachelors programs that
will help meet the demands of the new curriculum. However, the science pre-
service teachers which are still about to graduate are not prepared for it since
their course works are designed for the old curriculum. Thus, enhancement
programs are really needed.
As a response, the Institute of Teaching and Learning of Philippine Normal
University initiated a Student Teacher Enhancement Program (STEP) that will
help assist the outgoing pre-service teachers with their need in adjusting to the
K12 program (Agustin, 2014). A seminar type training was done to deal on the
different areas of the K12 like orientation on the new content standards, mode of
instruction, and methods of assessment. The professors at the institute prepared
lectures that will help pre-service teachers with the K12 challenges.
The participants in the program are the pre-service teachers who are in line for
off campus pre-service training. Based on the evaluation, the STEP initiated by
the ITL department was successful. Thus, this research serves as a follow up to
the STEP program. It is deemed necessary that the STEP be conducted in field
study pre-service teachers to help them not only in their practice teaching within
the institute itself but also as they go out to take their formal off campus pre-
service teaching.
2.1 Research Problems
In view of the literature reviewed, this research aims to design a contextualized
STEP for the pre-service teachers to prepare them for the pre-service teaching
program. Specifically, this research aims to achieve the following objectives:
1. Assess the readiness of science pre-service teachers in the different
areas to be developed
2. Evaluate if teaching readiness varies by
a. Major or Specialization or,
b. Gender
3. Design a contextualized Student Teaching Enhancement
Program(STEP) that will help science pre-service teachers with their
needs based on the needs assessment survey
3. METHODOLOGIES
To interpret the mean obtained in the different areas being surveyed, the
following scale has been set:
Scale Interpretation
0.1 to 1.0 No need at all
1.1 to 2.0 Low level of need
2.1 to 3.0 Moderate level of need
3.1 to 4.0 High Level of need
For the journaling method, pre-service teachers are allowed to write on their
journal on the topic of readiness to be a teacher. They were encouraged to identify
which aspect of teaching they need help the most. The survey was administered
to the respondents after the general orientation in the field study course was
held.
Table 2
Survey Results on the Needs of Pre-service Teachers
Areas of Concern Mean SD
ICT 2.52 .94
Concept Readiness 2.83 .84
Communication w/ Students 2.86 .81
Standards 2.88 .71
Lesson Planning 2.91 .73
Classroom Management 2.95 .77
Assessment 3.00 .73
Teaching Strategies 3.13 .73
K12 Implementation 3.17 .83
Questioning Skills 3.18 .77
Note: respondents used 4 point Likert scale ranging 1 (no need) to 4 (high need)
The survey results showed that pre-service teachers have a moderate level of
need in seven out of ten items in the survey (M 2.0). When ranked, the areas
that ranked low (M 2.91) are ICT, Concept Readiness, and Communication with
students, standards and lesson planning. Though it is still in the range of the
moderate level of need, the item that scored the lowest mean is the integration of
computer assisted instruction or ICT (M=2.52).
Upon the analysis of the data gathered in the survey questionnaire, it can be
inferred that the area where most of the pre-service teachers have the highest
level of need is the ability to facilitate classroom discussion using inquiry based
instruction where questioning skills is a must (M=3.18). A number of forty one
percent (41%) respondents havea moderate level of need and thirty eight (38 %)
percent with a high level of need.
Communication
Implementation
Management
w/ Students
Questioning
Assessment
Classroom
Standards
Readiness
Strategies
Teaching
Concept
Skills
K12
ICT
Chi- 12.45
1.975 1.058 .263 2.381 1.900 2.183 1.570 .235 .144
Square 3
df 2 2 2 2 2 2 2 2 2 2
Asym
.373 .589 .877 .304 .387 .336 .002 .456 .889 .930
p. Sig.
*Note: Grouping Variable: Major
The Kruskal Wallis test of the respondents as categorized per major shows that
nine out of ten factors show no significant differences (p 0.05 at sig. 0.05) except
on the teaching strategy (X2(2) =12.453, p = 0.02) area. Among the different
majors, general science has the highest mean rank of 75.10 compared to biology
education majors (M=48.84) and biology for teachers (M=54.74).
This difference in teaching strategy may have been a result of having the general
science majors observe the teacher-researcher in the classroom longer than the
other two other majors. Also, the said difference may have been the result of
course content difference. Biology majors are more concern with the different
teaching strategy on the different branches of science since most of their content
courses are focused on biology when compared with the General Science majors
who are exposed to the different branches of science. Thus, they recorded a
lesser need for teaching strategies.
Table 4
Kruskal Wallis Test for Gender
Lesson Planning
Communication
Implementation
Management
w/ Students
Questioning
Assessment
Classroom
Standards
Readiness
Strategies
Teaching
Concept
Skills
K12
ICT
Chi-
3.264 1.383 .703 7.612 1.269 .010 .996 .236 2.697 2.333
Square
df 1 1 1 1 1 1 1 1 1 1
Asymp.
.071 .240 .402 .006 .260 .920 .318 .627 .101 .127
Sig.
*Note: Grouping: Gender
The Kruskal Wallis test for gender revealed that there are no significant
differences on the different areas being surveyed (p 0.05 at sig. 0.05). The
differences in mean ranks do not necessarily vary from each other.
5. CONCLUSION
Based on the data gathered and its analysis, it can be concluded that pre-service
teachers have a moderate to high level of need to the different items asked in the
survey. The area with the highest level of need is the ability to facilitate
classroom discussion using inquiry based instruction (M=3.18), while the area
with the lowest level of need is the integration of computer assisted instruction
or ICT (M=2.52).
The level of need of the pre-service teacher does not significantly vary when
categorized per major (p 0.05 at sig. 0.05) except on the teaching strategy (X2(2)
=12.453, p = 0.02) area. When grouped by gender, the mean ranks do not
significantly differ on the different areas being surveyed (p 0.05 at sig. 0.05).
Respondents also revealed that they need to improve themselves to possess the
qualities of a teacher.
doing as they apply their learnings from the contextualized STEP. Below is a
program outline on how the contextualized STEP will be implemented.
Among the ten categories in the survey only the five areas that recorded the
highest level of need were considered since the time that the pre-service teachers
will spend with the institute is limited. It is necessary for the designed program
to be accomplished on time. Further, some areas were clustered since they are
integrated with each other naturally.
To evaluate if the objectives of the program are met, the pre-service teachers will
be subjected to a teaching achievement test. The questions will be taken from the
areas included in the contextualized STEP. Open ended questions will also be
provided to analyze how the program affected them.
REFERENCES
Agustin, M. (2014). Student Teaching Enhancement Program 2014 Guidelines. Institute of
Teaching and Learning, Philippine Normal University.
An investigation of best practice in evidence-based assessment within preservice teacher
education programs and other professions. (Queensland College of Teachers) 2012.
Retrieved from
http://www.qct.edu.au/PDF/PSU/BestPpracticeEvidenceBasedAsessmentPre
serviceReacherEdPrograms.PDF
Aypay, A. (2009) Teachers Evaluation of Their Pre-Service Teacher Training. Educational
Sciences: Theory & Practice. pp. 113-1121. Retrieved from
https://www.edam.com.tr/kuyeb/pdf/en/158ed1df960f59116fd2b27d2e9b66c
eENTAM.pdf
Cheng, E. C. (2013). Enhancing the Quality of Pre-service Teachers Learning in
Teaching Practicum. Retrieved from
http://nevelestudomany.elte.hu/downloads/2013/nevelestudomany_2013_1_
6-16.pdf
Cheng, Y. (2008). Paradigm Shift in Pre-Service Teacher Education: Implications for
Innovations and Practice. Innovative Practices in Pre-Service Teacher Education an
Asia-Pacific Perspective. Retrieved from
https://www.google.com.ph/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2
&cad=rja&uact=8&ved=0CCkQFjAB&url=https%3A%2F%2F
Craig, H.J., Kraft, R. J., du Plessis, J., (1998) Teacher Development Making and Impact,
Retrieved from
http://people.umass.edu/educ870/teacher_education/Documents/Craig-
book.pdf
Grossman, P., Compton, C., Igra, D., Ronfeldt, E., Shahan, E., Williamson, P. (2009)
Teaching Practice: A Cross Professional Perspective. Teachers College Record.
Vol. 111. No. 9. pp. 2055-2100. Retrieved from
https://cset.stanford.edu/sites/default/files/files/documents/publications/
Grossman-TeachingPracticeACross-ProfessionalPerspective.pdf
Joseph, Jann (2010) Does Intention Matter? Assessing the Science Teaching Efficacy
Beliefs of Pre-service Teachers as Compared to the General Student Population.
Electronic Journal of Science Education, Vol. 14 No. 1, 2-14. Retrieved from
http://ejse.southwestern.edu/article/download/7332/5620
Maximo, A (February 7, 2014) Grade Conscious. The Construct. Retrieved from
http://www.alexmaximo.com/deped-k-12-kpup-grading-assessment/
McCawley, P. (2009). Methods for Conducting Educational Needs Assessment
Guidelines for Cooperative Extension System Personals. Retrieved from
http://www.cals.uidaho.edu/edcomm/pdf/BUL/BUL0870.pdf
Teacher Questionnaire. (n.d.) OECD Teaching and Learning International Survey Retrieved
January 10, 2015 from http://www.oecd.org/edu/school/43081350.pdf
Survey Analysis Guidelines (n.d.) Retrieved January 4, 2015 from
http://plus50.aacc.nche.edu/documents/publications/6_SurveyAnalysis.pdf
Ylmaz, H. and ava, P. H. (2008). The Effect of the Teaching Practice on Pre-service
Elementary Teachers Science Teaching Efficacy and Classroom Management
BeliefsEurasia Journal of Mathematics, Science & Technology Education, 4(1), 45-54.
Retrieved from http://ejmste.com/v4n1/Eurasia_v4n1_Yilmaz_Cavas.pdf
Young, E., Grant, P., Montbriand, C., Therriault (2001). Educating Pre-Service Teachers,
The State of Affairs. Retrieved from
http://www.learningpt.org/pdfs/literacy/preservice.pdf
1. Introduction
Hidden curriculum is a relatively new topic which was presented by the related experts
during the recent years. According to Eisner(1995), schools are teaching three lesson-
plans simultaneously including explicit curriculum (formal), hidden curriculum
(explicit) and ineffective or invalid curriculum. This issue is against the current belief on
the curriculum of schools which is presented as a one-dimensional phenomenon and
considers the schools as a place like kindergarten in order to execute explicit
curriculums.
In most cases, the effect of hidden curriculum is more than the formal curriculum as
some individuals do not observe these principles while learning the related principles
and norms. Selecting a supervisor during the researching process and its effect on the
referential valuation of subjects and titles of thesis and also its place in the curriculum
of learning centers is one of the important issues in the curriculum of universities
(Yarmohammadian, 2007).
Occasionally, PhD. students consider some criteria for choosing the professors,
which potentially affect their research course. Highlighting the characteristics of
some professors by PhD. students give an especial value to this course and increases
its significance. The presented paper was done by considering this presumption that
the universities are centers of science and most scientific studies require guidelines;
and also, the students make hard efforts to select a supervisor though different ways.
For this reason, this paper tries to determine the effective hidden factors on selecting
a supervisor during the research course. According to Benson and Snider, there are
no high schools and kindergarten in which the hidden curriculum had been imposed
on the students and the learning boards, but in fact, it affects the whole process of
education (Maleki, 2012).
Ghourchin (2010) allocated the hidden curriculum to teaching the informal texts of
value systems, norms and perceptions, the non-academic beliefs and the informal
aspects of High Educational Centers which result in a training system toward the
governed philosophy, structure and texture of a society.
In any case, there are various hidden factors within a research course which affect
the values and aims of this course and also decrease the validity of PhD. degree and
the students success in this course such as in selecting the supervisor. Therefore, in
this paper the experiences of PhD. graduate students from selecting the supervisor
were studied and also the effective hidden factors in this domain were examined.
Since there are various factors which are not related to the formal curriculum and
the experts of education ignore them (do not consider them), but these factors affect
the thoughts, emotions and the behavior of learners and also they are mostly
effective on the explicit curriculum in most cases. Therefore, the hidden curriculum
determines an extent which is the basis of value and self-confidence of participants
significantly and this hidden curriculum affects the selection of supervisor more
than the formal one.
Certainly, these kinds of hidden curriculums considerably affect the whole process
of the research course. And also, ignoring the negative effects of hidden curriculum
makes the accomplishment of research course aims hard and difficult. Although the
conditions of selecting the supervisor within the explicit curriculum (pre-designed
curriculum) of universities were presented in brief but there are effective hidden
factors in order to select a supervisor which affect the research course.
Therefore, the planners and experts must consider the hidden curriculum in all
educational and research fields within PhD. courses. The writer of this paper, by
reading the books and journals related to the training and learning (education) area,
In a study by Safaeemovahed and Attaran (2013), they found the especial dynamics
of supervisor student relationships in doing the research projects and also
investigate the incorrect norms that the students consider them when selecting their
supervisor. Based on the obtained results from an interview with 6 M.A. students of
Planning Curriculum who were in the stage of selecting a supervisor, the related
norms (for selecting a supervisor) were classified into six groups: behavior and
characteristics of the professors, academic and non-academic norms, possible
support, and limitations. The results showed that the students will access to these
norms through observing the performance of professors in class and defense
sessions and also the informal network such as the former students.
In another study by Attaran, Zein Abadi and Tulaby (2009) relationships between
supervisor and students toward PhD. thesis, they have found that more than 50%
of PhD. learners were unhappy with their supervisors and on the other hand, if the
level of satisfaction from (happiness with) supervisors increases, the students
relationship with their supervisors becomes more satisfactory; it must be mentioned
that there is a positive relationship between the quality and efficiency of thesis with
the students satisfaction regarding their relationship with their supervisors.
This paper was done by an integration of two methods i.e. qualitative and
quantitative methods. At first, by studying the related literature and interviews
with the supervisors or professors who had experiences in completing thesis and
also interviews with PhD. students, 20 indices or indicators as the criteria of a
desirable relationship between supervisors and students were extracted, the most
important ones are: easy access of students to the supervisors, the assistance of
supervisors in order to compile and edit the previous literature and the other parts
(Attaran et al., 2009).
The aim of another paper by Fathivajargah, Arefi and Jalilinia (2009) was to
recognize and study the hidden curriculum in M.A. theses in Shahid Beheshti
University. Based on the definition of Portly (1993) toward hidden curriculum, four
main dimensions were defined in order to shape and design the hidden curriculum
of thesis. They are presented in the following:
The present qualitative paper was done using an ethnography method and it was
conducted on 20 students (in M.A. degree) in three groups of (A): Human Science,
(B): Engineering and Technical Sciences and (C): Basic Sciences by the researcher.
The related findings which were obtained by using various qualitative tools such as
autobiography, observation, image or pictures, semi-structured interviews and the
content analysis done by the researcher indicate that the students gained negative
and positive experiences during the time of writing thesis.(Fathivajargah, 2009)
Stevenson & Evans (2009) reviewed the related studies of the relationship between
students and supervisors during 1990-2009 and found that the quality of
experiences resulted from these relationships was affected by these factors: 1- the
clarity of expectations and 2- the level of support of supervisors from their students.
Bradbury et al. (2007) studied the communicative process between students and
supervisors by using critical discourse analysis. Based on his viewpoint, the
evolution process was associated with features such as responsibility and
The related study from the hidden curriculum in higher education was done by
Margolis et al., in 2001 in which the factors such as educational counseling,
relationships of supervisors and students and the role of professional learning(s) in
re-producing the social inequalities were studied. One of the most important parts
of this project was to study the relationship between supervisors and students
which was conducted by Sandra Acker, who extensively studied the hidden
curriculum within the relationships of supervisors and students in USA, Canada,
Australia and New Zealand. The results show that these relationships are under the
effect of factors such as the culture of major, the culture of educational group, the
rules for accepting students, gender and the unequal position of supervisor and
students in the organizational hierarchy of universities (Margolis, Eric et al., 2001).
Tawnsend (1996) in a case study studied the structural elements which result into a
hidden curriculum in the High Education, and pointed out that elements such as
social structure of a class, the authority of supervisors, the governed rules on the
relationships between supervisors and students and also the structural obstacles
within universities are playing a role in the formation of hidden curriculum in the
Higher Education. Based on his viewpoint, if the support networks and their rules
do not exist in the universities for selecting the supervisors and the manner of their
relationships with the students, therefore, the rule of Survival of the Fittest will be
governed and everyone tries to guarantee his / her position by using the
availabilities.
This paper was done during the academic year 2011-2012. In this paper, all
universities of Iran which have access to the acceptance conditions of PhD. students
and the students who have passed their research course in PhD. degree were
interviewed. In this paper all students of state and non-state (Azad) universities were
participated and all participants were graduates of PhD. degree.
to complete the interviews for studying their experiences research course, telephone
and e-mails were used during the research course.
In order to examine the validity of research instruments, the researcher sent the
guideline form of interview to 5 professional professors during the research course
and asked their idea about the selected questions in this form, after receiving their
feedback and revising some questions, the researcher used this form to complete the
interview. To assure the validity of data and results, the following measures were
done.
In order to make sure about the validity of coding(s) and the named categories by
the researcher, they were sent to two researchers for review, and then by using the
viewpoints of these two researchers, the final categories were formed. These final
categories were presented to the interviewees and their ideas were asked. Their
responses indicated that these categories and the extracted results are relatively
accurate reflections of their viewpoints. Also in this paper, in order to measure the
reliability of this study, the method of kirk & Miller as the Noting Rules was used.
3. Results
One of the main problems of students is to select their supervisor during their
research course. This issue is one of the serious problems for PhD. students as the
researchers must consider and pay attention to their implications in spite of the
above mentioned points in the instructions and the regulation of universities.
Based on several studies and the results obtained from interviews with 54 graduate
students in this paper, 12 secondary themes were found as the effective hidden
factors on selecting the supervisors, which are classified into other subgroups:
The ethical and behavioral characteristics of professors were one the most important
criteria that the interviewees considered for selecting their supervisor. The
interviewees will access to these characteristics within different situations such as
classes, university campuses, and professors offices and also the situations outside
the universities. Within these situations, the professors themselves will show certain
behaviors to different individuals among their students. Based on the interviews in
this paper, it is possible to determine the behavioral characteristics through three
ways as:
In some interviews, the interviewees selected their supervisors due to his/her major
executive position in the university. They believed that by selecting this person
(such as the head of university and faculty) as their supervisors, they will find
access to an indirect power and nobody will reject their views and if a fault is
observed in their works, all of the instructors and professors will ignore it and they
will be more cautious when giving a mark to these students.
The interviewee named H.A. stated that: I preferred, at first, to select a supervisor
who had a major position in the university because the experience of my M.A.
course proved this issue for me and due to its significance, I successfully passed my
thesis course. [Interviewee no.: 23].
In all interviews, it became clear that all interviewees paid more attention to the
scientific position of their supervisors in their PhD. course as they used any
situation in order to select a supervisor who had a high scientific degree and
possessed more articles, books, etc. Certainly, in the universities of Iran, the number
of these supervisors is less and it is not possible for all PhD. students who want to
pass this stage of their education completely.
Based on the view of S.Z. about his/her supervisor: in our university, there was
only a supervisor who received his/her professor position and others were assistant
professors and they did not have access to an international degree; for this reason,
this professor can only accept the thesis of one PhD. student and the other students
cannot [Interviewee no.: 43].
Based on the interviews, it became clear and obvious that most PhD. students prefer
to select a supervisor who is a well-known professor and when someone asked
them who is your supervisor, they showed the cover of their thesis and replied that
Professor proudly. Some students are proud of a professor who is well-known
and they could not hide their happiness.
In this case, H.M. 'graduate of educational management' said: the fame and credit
of a supervisor was so important for me, [] when someone asked me who your
supervisor is, I replied Professor X, loudly and proudly. I liked to hear the feeling of
others to this issue or see his / her name in my article and the other things .
[Interviewee no.: 50].
All PhD. students request their supervisors to help them in completing their thesis
in spite of their problems and they (PhD. students) want to have access to them
(supervisors) easily until they can solve their problems. Based on the related
interviews, it became clear that PhD. students are in contact with their supervisors
in three ways: e-mail, phones and face to face interaction. M.Sh. (interviewee of
general psychology) stated that: when I required the assistance of my
supervisors, it was possible for me to have a meeting with him/her and nothing
was useful for me except having a face to face contact, because I think he/she reads
my work accurately and also I can observe my work, my problems, carefully.
[Interviewee no.: 48].
The other PhD. graduate in industry engineering from [X] university stated that:
issues such as studies outside country, internal and foreign conferences or seminars
of my supervisor were not useful for me because accessing to him / her was not
possible for me. [Interviewee no.: 9].
Based on the related interviews, it became clear that each PhD. student prefers to
select a supervisor who has proficiency in the study, research and statistics and also
can help in different fields of study. A.S. a graduate in philosophy from [X]
university stated that: [Oh] my supervisor did not have enough information
about the method of my study and for this reason, I asked other ones in order to
help me [Interviewee no.: 41].
Having skill and knowledge in an especial field is the other factor mentioned and
considered by some PhD. interviewees in order to select a supervisor. Sometimes, a
student has an interest in an especial field but all professors do not have any
knowledge about it or they did not do any such study or this is not their educational
major, therefore these students must select someone who has information about this
topic as their supervisor.
In this field, one of the interviewees who was a pediatrics student stated that: [] I
looked for a supervisor who has information about a rare disease among children,
although there are prominent professors in our faculty, they did not do any
scientific study about this disease; due to this reason, I decided to ask the other
professor named B.A., who worked in field of rare diseases in children, to cooperate
with me and guide me in completing this work [interviewee no.: 2].
Based on the obtained data from these interviews, their limitations in selecting a
supervisor were grouped into three categories as:
In some cases, the faculties inhibit the students from selecting a supervisor directly;
hence, the faculty of their educational group imposes an especial supervisor; it
means that they deprive the students from this right (to select the supervisor).
An interviewee who was graduated in Electric Engineering (in PhD. degree) stated
that: [] selecting the supervisor during our educational course was same as this
way the student was being invited to an interview after passing the written test,
then, based on his/her interest to the intended subject of the professor and also the
interest of professor to his/her acceptance, the name of student was registered as a
person who got accepted, so the supervisor was being chosen from the beginning of
PhD. course based on the view of university. ... We did not have any right in this
regard. [Interviewee no.: 21].
Based on the views of some interviewees, the force and imposition of universities or
faculties on the students is indirect; which means that occasionally, the students are
being put in some situations as they are deprived from their freedom to select their
supervisors and finally they must accept the viewpoint of educational group and
faculty.
An interviewee named F.Z. said: [I] know why they did not accept my thesis, [it
was my supervisor who was not from our faculty and university] I decided to
select my supervisor someone who is in our city since my university was far away
of my city but the university rejected this view [although he was a well-known
professor] and asked me to change the title of my thesis; it was clear that the
main reason was not the title of my thesis but my supervisor. [Interviewee no.: 37].
Based on the view of some interviewees, sometime the students are put in some
situations that they have to select their supervisor by force; for example, the
students are being forced to select someone as a supervisor without any interest to
him or her because they are friends with each other, they know each other or he
(she) was his (her ) supervisor during the M.A. course and sometimes, the
professors ask their students to select them as their supervisors due to some reason
such as giving them best marks.
In this case, an interviewee stated that; [] when I spoke with him (the supervisor)
about my proposal, it resulted into an ending that I selected him as my supervisor.
Although I hid myself from him, he asked about my work from my friends and sent
me a message to work with him. Therefore, I selected him by force. [Interviewee no.:
52]. Based on the viewpoints of most participants, you may be put in a situation to
be forced to select a supervisor although you are not interested to work with him /
her.
Usually, the students try hard to find the required information for selecting a
supervisor such as informal networks of senior students or friends. For example,
F.R. the specialist of emergency medicine [Interviewee no.: 1]: A.L. PhD. in
physiology [Interviewee no.: 28]; M.M. PhD. in medical microbiology [Interviewee
no.: 27]; H.SH and F.S. PhD. in Pedology [Interviewee no.: 44-45]; A.S. PhD. in
especial pharmacology [Interviewee no.: 33]; etc. used the views of friends and
former students among other methods in order to select their supervisor.
3.10 Gender
The finding of this paper shows that most supervisors for completing the PhD.
works are male and the females' role is less in this field. As a result, the supervisors
of most theses are male. Based on the whole interviews about the gender, of 40
interviews, 35 thesis projects were under the guidance of male supervisors.
F.Q. stated that: [] all professors were men but if the number of female
supervisors were more, I would certainly select a male supervisor because I have a
good feeling with them; the female supervisors are hardworking, more serious
toward works and also they are strict [Interviewee no.: 25].
In accordance with the aforementioned points, it became clear that most students
are very serious regarding selecting their supervisor and their gender and also they
consider it as a criterion during their research course; in this regard, a study was
done by Margolis (2001) on the relationship and cooperation of supervisors with the
students (based on their gender) and he mentioned gender as one of the effective
factors on such relationships [Margolis, 2001].
In general, all students who take step in the research course (before the proposal
acceptance) are seeking a capable supervisor who guides them in order to complete
their thesis, defend them in the defense session and also support them. A.A. PhD. in
mechanics [Interviewee no.: 18], M.Sh. PhD. in general psychology [Interviewee no.:
48]; M.J. PhD. in criminal rights and sociology [Interviewee no.: 34] believed that the
supervisor must be able to defend their students. A.A. said that: [] M.Z.
supervisor defended and supported one of the senior students in a way that I was
surprised. [Interviewee no.: 18].
In some interviews, it became clear that most interviewees selected their supervisors
in order to have a good job in the future, and do most of their research projects with
them and also participate in publishing different scientific books; in addition, some
others expected a good communication with the global scientific society through
their supervisors.
Certainly, some students would ask their supervisors to employ them in the
universities or be their references in order to have a good job. H.KH. specialist in
emergency medicine said that: one of the reasons [for me] to select a supervisor is
that I find access to a good executive position in the ministry because my supervisor
was in contact with the authority individuals or characters. [Interviewee no.: 1].
4. Discussion
This paper showed that the students did not have access to accurate information for
selecting their supervisor during their research course in PhD. degree and they
related this issue to some points such as the negligence of students in order to select
a supervisor, lack of skillful supervisors in an especial field and also the persistence
of universities for selecting a supervisor from their own universities. The students
did not know which factors are effective on selecting a supervisor and how they can
communicate with their supervisors in order to solve their problems easily.
Also this paper pointed out the selection of supervisors as imposed directly or
indirectly from the universities on the students. Other points which were
considered by the students for selecting a supervisor indirectly are as the following:
- Executive position;
5. Conclusion
The results of this paper are consistent with the results of other papers which
studied the effective role of supervisors during the research course [Heinrich, 1991;
Conrad and Phillips, 1995; Donald et al., 1995; Margolis, 2001; Drysdale, 2003,
Fazeli, 2004, Attaran, 2009]. Furthermore, the results showed that among all
effective factors on the research course, selecting the supervisor has a considerable
effect on facilitating the trend of research course and its final quality. This finding is
in relation with the study of these researchers: Ives & Rowley, 2005; Lindgreen et al.,
2002; Ray, 2007; and Grevholm et al., 2005. In fact, more satisfaction of students
from their supervisor makes their relationships with their supervisors more
desirable which affect the research course indirectly.
Regarding the ethical considerations, first a session was held for introducing the
researcher and the research. In this session the participants were informed that they
can leave the meeting at any time they felt unwilling to cooperate without any
explanation, and their information will remain confidential. Finally the study
approved by ethics committee consist of professors.
REFERENCES
Attaran, M. Zeinabadi, H . Tulaby, HR. (2009) Relationship between supervisor and doctoral
student in the writing of a case study. Presented at the Eighth Annual Conference of the
Association for Curriculum Studies. Journal of Higher Education Curriculum Studies.
Tabriz University. 1(1):9-37. [In Persian].
Bradbury, J. et al. (2007). Unity and Detachment: A Discourse Analysis of Doctoral Supervision.
In International Journal of Qualitative Methods
Conrad, L., & Phillips, E. (1995). From isolation to collaboration: A positive change for
postgraduate women? Higher Education, 30, 313- 322
Donald, J. Saroyan, A. & Denison, B.D. (1995). Graduate Student Supervision Policies and
Procedures: A Case Study of Issues and Factors Affecting Graduate Study. The
Canadian Journal of Higher Education, 25(3) 71-92.
Eisner, E. (1995). Educational Imagination; onthe Design and Evaluation on school program,
Macmillan college publishing company, NewYork
Evans, C. & Stevenson. (2009). The learning experiences of international doctoral students with
particular reference to nursing students: A literature review. In Int. J. Nurs. Stud
Fathivajargah K.( 2007). The identity of the new curriculum. Tehran, Abyzh,75-81 [In Persian]
Fazeli, N. (2003). Adaptive study on the causes of ineffective teaching in the university. A letter of
anthropology..1(3),93-132
Ghoorchian, NG. (2010). Analysis of the hidden curriculum, a new discussion of the education
system in unknown dimensions. Vbrnamhryzy Journal of Education. 1:68-48.[In Persian]
Grevholm, B. Persson, LE. & Peter, W. (2005). A Dynamic Model for Doctoral Students and
Guidance of Supervisors in Research Groups. Educational Studies in Mathematics, 60(2),
173-17
Heinrich, K. T. (1991). Loving partnerships: Dealing with sexual attraction and power in doctoral
advisement relationships. Journal of Higher Education, 62(5), 514-538.
Ives, G., & Rowley, G. (2005). Supervisor selection or allocation and continuity of supervision:
Ph.D. students' progress and outcomes. Studies in Higher Education, 30(5), 535-556
Margolis, E. and et al (2001). Hiding and Outing the Curriculum. In The Hidden Curriculum
in Higher Education. London: Rutledge
Margolis, E. (2003). The Hidden Curriculum in Higher Education; Routledge; New York and
London
Tonkaboni, F.(2015). Comparison of hidden Learning of Students in Azad and State Universities in
Academic Interactions from the Perspective of Students, Journal of Global Research in
Education and Social Science, 2(1): 37-44
1. Introduction
Diversities relevant for pedagogical missions transcend demographic traits
and include less discernible, but equally consequential, differences in
ideological perspectives, social class, values, religious beliefs, and the like
(Tienda, 2013, p. 471)
Nearly all states include world religions in their social studies standards, typically
at the upper elementary or middle-school level (Douglas, 2000). Recently, a
collaboration of 15 professional organizations working on national social studies
standards released The College, Career, and Civic Life (C3) Framework for Social Studies
State Standards: Guidance for Enhancing the Rigor of K-12 Civics, Economics, Geography,
and History (www.socialstudies.org/c3). The C3 Framework is part of the Common
Core Standards movement, which despite ongoing controversy, has been adopted
by more than 40 states. Unlike previous national and state curriculum frameworks,
the C3 Framework does not specify the teaching of world religions, but neither does
it specify the teaching of any topics, including particular wars or time periods.
Instead,
The C3 Framework is centered on an Inquiry Arc. By focusing on inquiry,
the framework emphasizes the disciplinary concepts and practices that
support students as they develop the capacity to know, analyze,
explain, and argue about interdisciplinary challenges in our social
world. (p. 6)
Despite the consensus among social studies educators that world religion should
have a place in the curriculum, there is little published research on how teachers
actually approach the topic and even less research on how PSTs learn about
teaching world religions. A need exists to learn more about how emerging teachers
plan for and deliver lessons on world religions. Whats more, it is imperative that
teacher educators better understand how to prepare teachers for a curriculum and
society that demands young people who comprehend the history of world religions
and their role in the world today.
This study is a follow-up to a previous study (Anderson, Cook, & Mathys, 2013)
that investigated how 22 elementary pre-service teachers (PSTs) at a mid-sized
Midwestern public university designed and taught lessons on world religions to 7th-
grade students. This paper compares those PSTs with a subsequent PST cohort
whose elementary social studies methods course addressed the findings from the
initial study. In contrast to the first cohort, the 26 PSTs in Cohort 2 were provided
with specific readings and guidance on how to teach about world religions. This
Institutions serve a vital role in society, and religion is arguably the most influential
institution in history. The National Council for the Social Studies (2009)
recommended that schools teach students how institutions were formed, extended,
governed, and changed over time. Guidelines for teaching about religion issued in
1995 by the US Secretary of Education noted that the institution of religion may be
studied from historical, comparative, literary, and artistic perspectives. Passe and
Willox (2009) recommended that social studies teachers take an anthropological
approach to teaching about world religions, with an emphasis on comparative
religion in order to promote global harmony and economic progress. Others have
suggested that religion can be used as a springboard for teaching about past
indiscretions such as nationalism, imperialism, and colonialism (Risinger, 1993).
Despite the potential for study of world religions to provide students with insight
into our cultural differences and common values, the topic receives scant coverage
in US classrooms. One reason is that social studies has become marginalized over
the past decade due to increased emphasis on mathematics and English-Language
Arts (Anderson, Cook, & Mathys, 2014; Boyle-Baise, Hsu, Johnnson, Sierrere, &
Stewart, 2008; Burroughs, Groce, & Webeck, 2005; Center on Education Policy, 2008;
Good et al., 2010; Leming, Ellington, & Schug, 2006a, 2006b; Lintner, 2006; Rock et
al., 2006). More specifically, mandatory testing in math and ELA has implored
teachers in states without standardized tests in social studies to spend substantially
less time on social studies instruction (Au, 2009; Fitchett & Heafner, 2010; Heafner,
Lipscomb, & Rock, 2006; Wills, 2007).
Another reason why so many teachers choose to avoid the subject is simply that
teaching about religion is hard. Teachers are expected to remain neutral and
unbiased, while also tolerating their students varied religious views, including
students right to express their religious beliefs in their writing, art, and other school
work (Black, 2003). Teaching about religion must be academic and in no way
devotional, yet a daily glance at the news will reveal tensions between teachers
free-exercise claims and violations of the Establishment Clause. From teaching
Intelligent Design in science classes to teaching the Bible as historical fact, teachers
commonly struggle to balance personal ideologies with constitutional obligations
(Schaeffer & Mincberg, 2000).
Often teachers biggest mistakes in teaching about religion come not from acute
classroom incidents but rather from grand curricular oversights where teachers are
left with such limited time to teach about each world religion that students gain
only ephemeral perspectives on each religion replete with stereotypes,
oversimplifications, and the impression that religions are ancient relics (Douglass,
2002). Whats more, teachers often exhibit syncretism, or the combining of multiple
religious beliefs and practices, often with the intent of promoting inclusion (Passe &
Willox, 2009). Despite their best intentions to show students that many of them
share similar existential and philosophical beliefs, teachers should focus on
awareness of others religions, though not necessarily acceptance (Douglass, 2002).
The type and number of methods courses offered by teacher education programs
vary widely, nearly all of which merely scratch the surface of what teacher
educators would like to cover as they help to prepare future teachers. Social studies
methods instructors, like teacher educators in other disciplines, lack the desired
time to teach their curriculum thoroughly. Arguably, social studies methods courses
have even more relative scarcity of time compared with other content areas since
social studies encompasses four pillars: history, geography, civics, and economics.
Consequently, it is likely that PSTs will not receive specific instruction on teaching
world religions during their methods courses. Whats more, the vast majority (94%
of 342) of social studies teacher educators reported that they should not include the
topic of teaching about world religions in their social studies methods courses (Zam
& Stone, 2006). In short, teachers are not likely to be taught how to teach world
religions during their teacher education nor are they likely to see colleagues
teaching world religions effectively, if at all, throughout their careers.
5. Methods
As this field experience has become enculturated for both our teacher education
program and our partner middle school over the past several years, the cooperating
teachers have identified the specific Grade-Level Content Expectations, or
standards, they want the PSTs to teach each semester. For each Fall semester over
the past few years, the cooperating teachers have assigned our PSTs to teach three
(of the 83 total) standards related to world religions, which fall under the following
theme: Explain how world religions or belief systems of Hinduism, Judaism,
Buddhism, Christianity, Confucianism and Islam grew and their significance
(http://michigan.gov/documents/mde/SSGLCE_218368_7.pdf (p. 62).
Incidentally, conversations with the cooperating teachers have revealed that they
have asked the PSTs to teach those particular content standards because they would
rather not teach world religions themselves.
This quasi-experimental comparative case study compared how two cohorts of PSTs
taught lessons on world religions. The cohorts, who participated in the field
experience in successive semesters, were demographically similar; and, with the
exception of instruction on teaching world religions, both cohorts learned the same
curriculum during the course.
The comparative case study allowed us to examine the PSTs in an authentic context,
using multiple forms of data to increase the breadth and depth of our
understanding (Merriam, 2009; Stake, 1995; Yin, 1994). By observing developing
teachers practice their craft of whole-classroom teaching and by interviewing them
about their experiences afterward, we were able to gain thorough and holistic
insights. Case studies allow for a detailed and contextual analysis (Cohen, Manion,
& Morrison, 2011). When teaching can be studied in authentic classroom contexts,
richer description and analyses are possible (Yin, 1994).
After studying how the Cohort 1 PSTs planned, delivered, assessed, and reflected
on their world religions lessons, we wanted to see if providing another Cohorts
PSTs with some guidance about teaching world religions might reduce their
number of missteps. Time constraints were still a barrier, so we limited Cohort 2s
instruction about the teaching of world religions to one hour of class time and one
hour of assigned outside-of-class reading.
First, the 26 PSTs from Cohort 2 (12 and 14 PSTs per section) were assigned to spend
60 minutes reading from a list of six articles about teaching world religions (see
Appendix 1 for links to the six articles). The PSTs were then asked to come to next
weeks class with three take-aways and one question derived from reading the
articles. During the following weeks class, 20 minutes were allocated to PSTs
working in groups of 3-4 to share their take-aways and questions. Next, 10 minutes
were allocated for whole-class discussion. Finally, we spent approximately 30
minutes going through a PowerPoint presentation of our initial study, complete
with findings and recommendations.
5.3 Data
For Cohort 1 we collected an exorbitant amount of data, including pre- and post-
interviews of the PSTs lesson-plans, one or more lesson observations of each PST,
their students written work, their reflection papers, and post-teaching focus-group
discussions.
For Cohort 2, we (in conjunction with three other faculty members) observed each
PST teach at least one social studies lesson. Each observer was given a list of the
common errors made by the PSTs from Cohort 1 (see Table 1). Observers were
directed foremost to look for incidents of the PSTs making similar errors and to
document those instances on a form provided. Additionally, we lead post-lesson
focus group interviews with the PSTs, and we analyzed their required reflection
papers.
Our primary data source consisted of our observations of the PSTs lessons, and we
used a phenomenological approach to situate the researchers as participant
observers (Moustakas, 1994). Because the observers were themselves experienced
teachers and certainly harbored their own personal religious beliefs in some form,
we used note taking, member checks, and iterative conversations to bracket our
assumptions and to challenge each other about our suppositions and interpretations
(Cresswell, 2012; Merriam, 2009).
The common missteps identified from the previous study served as first-cycle codes
from which we sought to develop further conceptual understanding through
second-cycle coding methods (Saldana, 2009). Using the core themes from the initial
study, we tabulated the frequency of PST incidents of each theme using classical
content analysis (Titscher et al., 2000). Next, we associated each corresponding
incident with its text excerpt. Finally, we used elaborative coding to refine and
expand on our preconceived constructs until all of the PSTs actions, comments, and
reflections were represented a theme or subtheme (Auerbarch & Silverstein, 2003).
6. Results
Through this study we sought to determine if PSTs who received a small amount of
specific instruction and readings about teaching world religions exhibited fewer
mistakes in their lessons when compared with a previous cohort of PSTs who
received no specific instruction on teaching world religions. A previous study
(Anderson et al., 2013) found that PSTs from Cohort 1 used biased language, made
assumptions and generalizations, and lacked solemnity and sensitivity.
Furthermore, those PSTs failed to explain to their students that the topic of religion
stemmed from mandated state content standards. Students in Cohort 2, however,
portrayed far fewer of the behaviors of their predecessors (see Table 1).
Assumptions 10 1
Generalizing 10 2
Lack of Solemnity 8 1
Lack of Awareness/Sensitivity 3 0
Proselytizing 2 0
Related to this theme was the prevalence of 7th-grade students who made Christian-
centric comments and the PSTs general disregard of those comments. For example,
during the first year, one PST was showing a short online video about the diffusion
of religion when several students cheered as the geographic footprint of Christianity
grew. In her post interview, the PST recognized the students bias but dismissed
their actions as normal, stating, Its just what they know. In several other
instances with Cohort 1, we observed students dominating class discussion with
information about Christianity while the PSTs did not limit their comments, which
clearly created a Christian-dominant atmosphere. During year 2, students still
attempted to share information and biblical stories, but the PSTs were, for the most
part, willing and able to limit conversation and to keep student comments directly
on topic. During a focus group interview with PSTs from Cohort 2, one PST
remarked, I am glad we learned how to stop kids from rambling, and not just
because of talking so much about Christianity, but in general. Thats a good skill to
use when kids ramble about anything.
6.3 Generalizing
PSTs lack content knowledge about world religions (Anderson et al., 2013, 2014;
Ennis, 1994; Oldendorf & Green, 2005; Subedi, 2006). Associated with that lack of
knowledge is a corresponding lack of nuance, which often presents through
stereotyping and generalization. Because many PSTs know little about religions
other than Christianity, they often make generalized statements about followers of
other religions. For example, at least 10 times a PST from Cohort 1 made blanket
statements like, Buddhists meditate and Followers of Hinduism dont eat meat.
Cohort 2 learned that fewer than 50% of Hindus are vegetarians and that many
Buddhists do not meditate daily, just like many Christians do not pray daily.
Accordingly, we witnessed PSTs making comments such as, Meditation is a central
component of Buddhism, and Hinduism teaches compassion for animals, which
is one reason why a lot of Hindus dont eat meat. Likewise, after explaining how
she tried to avoid using the collective pronoun they, one PST commented, I
remembered how we read about trying not to portray that all people of a particular
religion are the same. Just like how there are so many different types of Christians,
there are that many different types of Hindus and Muslims.
With the best intent, eight PSTs used skits and simulations in attempt to engage
students with the topic they were teaching. For example, one PST had her students
make paper boats that they connected to a slanted string to simulate the Buddhist
procession of Boun Awk Phansa, during which celebrants send lighted and
decorated banana ornaments down rivers to pay respect and to ask for blessing. In
another instance, a PST lead the class in a skit of the Islamic Festival of Sacrifice, Eid
al-Adha, during which the students simulated the sacrifice of a cow and the
distribution of 1/3 of its meat to friends and family and 1/3 of the meat to the poor.
Those PSTs sought to make their teaching enjoyable for their students, but as a PST
from Cohort 2 remarked after reading an assigned article on teaching about world
religions, None of us would ever consider doing skits on some Christian event like
communion or Jesus rising from the dead, so we shouldnt act out scenes from other
religions either. We categorized one Cohort 2 PSTs lesson as lacking seriousness
and solemnity because she lead the students in a meditation exercise during which
the students were acting quite silly. Although the PST mentioned how Buddhism
teaches that meditation is part of the path toward Enlightenment, she never
corrected the students flippant behaviors or explained how meditation is a solemn
spiritual practice.
On the other hand, four of the eight PSTs who taught lessons on Hinduism lead
students in yoga simulations, which we did not place under this theme. There has
been much debate nationally lately about whether yoga is considered an
unconstitutional religious ritual when teachers lead their students in yoga exercises,
either through physical education classes or in the regular classrooms. The PSTs we
observed using yoga as part of their lessons simply used yoga as energizers and
transitional activities, which they did not connect to the Hindu religion, other than
to make a brief statement that yoga originated in ancient India and has roots in
some early branches of Hinduism and Buddhism.
noting that both PSTs who blatantly promoted Christianity in their lessons were
male, even though only 6 of the 43 PSTs were male.
During their social studies methods course in the lead up to the field experience,
Cohort 2 PSTs learned about the critical comments from students during Cohort 1s
experience, and they were advised to post the Grade-Level Content Expectations
they would be teaching in each subject throughout the week. Only one PST from
Cohort reported any negative comments from a student, to which she told the
student, Look up at the sheets we posted. The State says we have to teach about
this.
7. Limitations
There are a number of limitations of this study. Foremost are the threats to
reliability and construct validity due to the number of different observers of the
PSTs lessons. We do not know if each observer accurately documented the PSTs
words and actions. In addition, we lack assurance that two or more observers
would have documented the same phenomena. Though we did not conduct
interrater reliability checks, there were a few instances when two or more observers
sat in on the same lessons, which allowed for discussion leading to informal
interrater agreement. Furthermore, because we compared the lessons and teaching
actions of two different cohorts of PSTs who taught different 7th-grade students, we
do not know the extent to which other variables impacted the phenomena.
Certainly, we intend for this study to be descriptive but not generalizable.
Omitting study about religions gives students the impression that religions
have not been, and are not now, part of the human experiences. Religions
have influenced the behavior of both individuals and nations, and have
inspired some of the worlds most beautiful art, architecture, literature, and
music (http://www.socialstudies.org/positions/religion).
Learning about each others religious beliefs and orientations deepens our respect
for and understanding of one another (Douglass, 2002).
Yet, despite what is to be gained from studying how religions originated, grew, and
influenced society, teachers regularly avoid the subject (Ayers & Reid, 2005;
Glanzer, 1998; Marty & Moore, 2000; Rogers, 2011; Wright, 1999; Zam & Stone,
2006). Without specific instructions or readings on teaching world religions, the
PSTs in our study exhibited their lack of knowledge and awareness of world
religious in several ways from biased language, lack of solemnity and sensitivity,
assumption-making and generalizing, and even some instances of overt promotion
of Christianity. Because there is little research on how teachers actually teach world
religions in their classrooms and even less on how PSTs construct and realize
lessons about world religions, this study holds potential to help teacher educators
prepare future teachers for a vital topic that is found in nearly all states social
studies content standards.
Our previous research (Anderson et al., 2013) revealed that elementary PSTs, who
were predominately Christian, exhibited a number of biased actions in their
teaching of world religions as a result of their lack of lack of world religions and
their lack of awareness of how their personal beliefs and culture might bias their
teaching. Recognizing that teachers lack knowledge of world religions and tend to
avoid teaching the subject is an essential step, but does not solve the problem,
however.
Teaching about world religions is not easy. Teachers should present historical and
contemporary information in a way that is accessible to adolescent learners without
oversimplifying (Norton, 2001). While most students come to school with some
construction of religious teachings, comparisons between different religions and
their prophets and leaders is unfeasible and ill-advised (Douglass, 2001). Whats
more, due to the deep personal connection between religions and students, teachers
should avoid simulations and role-playing activities when teaching about world
religions (Nord & Haynes, 1998). Instead, teachers should use primary source
documents when teaching about world religions (Douglass, 2001; Nord, 1990). Most
importantly, teachers need to aware of their inherent biases most of which are
unconscious.
This study suggests that social studies teacher educators can have an impact on how
PSTs teach world religions, even if the teacher educators devote a relatively small
amount of methods course time to the topic. Certainly, more research in this area is
needed, but this study suggests that an hour of time in a methods course and a few
assigned readings might eliminate many of the pitfalls of teaching world religions --
a topic that is regularly avoided and marginalized, at societys peril. As
References
Adler, S. (1991). The education of social studies teachers. In J. Shaver (Ed .), Handbook of
research on social studies teaching and learning (pp . 210-221). New York: Macmillan.
Anderson, D., Cook, T., & Mathys, H. (2013). Pre-service teachers middle-level lessons on
world religions: Planning, teaching, and reflecting. Journal of Education and Learning,
2(4), 1-12.
Anderson, R. (2004). Religion and spirituality in the public school curriculum. New York: Peter
Lang Publishing.
Au, W. (2009). Social studies, social justice: W(h)ither the social studies in high-stakes
testing? Teacher Education Quarterly, 36(1), 43-58.
Auerbarch, C. F., & Silverstein, L. B. (2003). Qualitative data: An introduction to coding and
analysis. New York: New York University Press.
Ayers, S., & Reid, S. (2005). Teaching about religion in elementary school: The experience of
one Texas district. The Social Studies, 96(1), 14-17.
Black, S. (2003). Teaching about religion: Where schools sometimes go wrong is ignoring that
little word 'about'. American school board journal, 8(1), Retrieved from
http://paws.wcu.edu/churley/8_1_black.pdf
Boyle-Baise, M., Hsu, M., Johnnson, S., Sierrere, S. C., & Stewart, D. (2008). Putting reading
first: Teaching social studies in elementary classrooms. Theory and Research in Social
Education, 36(3), 233-255.
Burroughs, S., Groce, E., & Webeck, M. L. (2005). Social studies education in the age of
testing and accountability. Educational Measurement: Issues and Practice, 24(3), 13-20.
Center on Education Policy. (2008). Instructional time in elementary schools: A closer
look at changes for specific subjects. Washington, DC: Center on Education Policy
(CEP), 1-8.
Center on Educational Policy. (2007). Choices, changes, challenges: Curriculum and instruction in
the NCLB era. Washington, DC: Center on Educational Policy.
Cohen, L., Manion, L., & Morrison, K. (2011). Research methods in education. London:
Routledge.
Creswell, J. W. (2012). Qualitative inquiry and research design: Choosing among five approaches.
SAGE Publications, Incorporated.
Douglass, S. L. (2000). Teaching about Religion in National and State Social Studies
Standards. Executive Summary.
Douglass, S. L. (2001). Building a comfort zone: Teacher training and standards-based
education about religion. Religion and Education, 28(1), 40-57.
Douglass, S. L. (2002). Teaching about religion. Educational Leadership, 60(2), 32-37.
Ennis, C. D. (1994). Knowledge and beliefs underlying curricular expertise. Quest, 46(2), 164-
175.
Evans, C. (2008). Religious education in public schools: An international human rights
perspective. Human Rights Law Review, 8(3), 449-473.
Evans, M. P. (2007). Learning to Teach about Religion in Public Schools: Perspectives and
Experiences of Student Teachers in the Program for Religion and Secondary
Education at Harvard Divinity School. Religion and Education, 34(3), 19-47.
Fitchett, P. G., & Heafner, T. L. (2010). A National Perspective on the Effects of High-Stakes
Testing and Standardization on Elementary Social Studies Marginalization. Theory &
Research in Social Education, 38(1), 114-130.
Glanzer, P. (1998). Religion in public schools: In search of fairness. Phi Delta Kappan, 80(3),
219-22.
Good, A. J., Heafner, T. L., O'Connor, K., Passe, J., Rock, T. C., Byrd, S. P., et al. (2010). The
de-emphasis on social studies in elementary schools: Teacher candidate perspective.
Current Issues in Education, 13(4), 1-22.
Graves, E. P., Hynes, J. W., & Hughes, T. A. (2010). Teacher perception of the role of
religion in East Texas Public Schools. National Forum of Educational Administration
and Supervision Journal, 27(4), 1-19.
Grossman, P. L., Wilson, S. M., & Shulman, L. S. (1989). Teachers of substance: Subject
matter knowledge for teaching. In M. Reynolds (Ed.), The knowledge base for beginning
teachers (pp. 23-36). New York: Pergamon.
Gudmundsdottir, S., & Shulman, L. (1987). Pedagogical content knowledge in social studies.
Scandinavian Journal of Educational Research, 31(2), 59-70.
Haynes, C., & Thomas, O. (2001). Finding common ground: A guide to religious liberty in
public schools. Nashville, TN: The First Amendment Center, Retrieved from
http://www.freedomforum.org/publications/first/findingcommonground/FCG-
complete.pdf.
Heafner, T. L., Lipscomb, G. B., & Rock, T. C. (2006). To test or not to test? The role of testing
in elementary social studies, A collaborative study conducted by NCPSSE and
SCPSSE. Social Studies Research and Practice, 1(2), 145-164.
Leming, J. S., Ellington, L., & Schug, M. (2006a). Social Studies in Our Nation's Elementary and
Middle Schools. Hartford, CT: The Center of Survey Research and Analysis.
Leming, J. S., Ellington, L., & Schug, M. (2006b). The state of social studies: A national
random survey of elementary and middle social studies teachers. Social Education,
70(5), 322-327.
Lintner, T. (2006). Social studies (still) on the backburner: Perceptions and practices of K-5
social studies instruction. Journal of Social Studies Research, 30(1), 3-8.
Marty, M. E., & Moore, J. (2000). Education, religion, and the common good: Advancing a
distinctly American conversation about religion's role in our shared life. San Francisco:
Jossey-Bass.
Merriam, S. B. (2009). Qualitative research: A guide to design and implementation. Jossey-Bass.
Moore, D. L. (2010). Guidelines for teaching about religion in k-12 public schools in the
United States. American Academy of Religion, Retrieved from
http://www.aarweb.org/publications/Online_Publications/Curriculum_Guideline
s/AARK-12CurriculumGuidelines.pdf
Moustakas, C. (1994). Phenomenological research methods. Thousand Oaks, CA: Sage
Publications.
National Council for the Social Studies (2009). Powerful and purposeful teaching and
learning in elementary social studies. Social Education, 73(5), 252-254.
Nord, W. A. (1990). Teaching about religion in the public schools: A model for teacher
education programs. Religion & Public Education, 17(2), 223-227.
Nord, W. A., & Haynes, C. C. (1998). Taking religion seriously across the curriculum.
Association for Supervision & Curriculum Development.
Norton, J. (2001) Teaching About Religion in the World History Classroom. Religion and the
Public Schools, 85-94.
Oldendorf, S. B., & Green, C. R. (2005). Listening to Teacher Voices: Religion in Schools in
the Rural South. Religion and Education, 32(2), 65-84.
Passe, J., & Willox, L. (2009). Teaching religion in Americas public schools: A necessary
disruption. The Social Studies, 100(3), 102-106.
Prothero, S. (2007). Religious literacy: What every American needs to know and doesnt.
San Francisco: Harper Press.
RibakRosenthal, N., & Kane, C. M. (1999). Minority religious practices: The need for
awareness and knowledge. Counseling and Values, 43(2), 142-152
Risinger, C. F. (1993). Religion in the social studies curriculum. ERIC Clearinghouse. ED 363553.
Rock, T., Heafner, T., OConnor, K., Passe, J., Oldendorf, S., Good, A., & Byrd, S. (2006). One
state closer to a national crisis: A report on elementary social studies in North
Carolina schools. Theory and Research in Social Education, 34(4), 455-483.
Rogers, M. (2011). Teaching About Religion in Public Schools: Where Do We Go From Here?
Religion & Education, 38(1), 38-47.
Saldaa, J. (2009). The coding manual for qualitative researchers. London: Sage.
Schaeffer, J. E., & Mincberg, E. M. (2000). The good book taught wrong: Bible History
classes in Floridas public schools. People for the American Way Foundation.
Stake, R. E. (1995). The art of case study research. Thousand Oaks, CA: Sage Publications.
Subedi, B. (2006). Preservice teachers' beliefs and practices: Religion and religious
diversity. Equity & Excellence in Education, 39(3), 227-238.
Tienda, M. (2013). Diversity Inclusion Promoting Integration in Higher Education.
Educational Researcher, 42(9), 467-475.
Waggoner, M. D. (Ed.). (2013). Religion in the Public Schools. Lanham, MD: Rowman &
Littlefield.
Wexler, J. D. (2002). Preparing for the Clothed Public Square: Teaching About Religion, Civic
Education, and the Constitution. William & Mary Law. Review, 43, 1159-1166.
Wills, J. S. (2007). Putting the squeeze on the social studies: Managing teaching dilemmas in
subject areas excluded from state testing. Teachers College Record, 109(8), 1980-2046.
Wright, E. A. (1999). Religion in American Education: A Historical View. Phi Delta Kappan,
81(1), 17-20.
Yin, R. K. (1994). Case study research: Design and methods. Thousand Oaks, CA: Sage
Publications.
Zam, G. A., & Stone, G. E. (2006). Social studies teacher educators: A survey of attitudes
toward religion in the curriculum. Religion and Education, 33(1), 90-105.
Appendix 1
Antecedents of Norwegians
Student Teachers' Campus Time on Task
Knut-Andreas Christophersen
Department of Political Science,
University of Oslo, Norway
Eyvind Elstad
Department of Teacher Education and School Research,
University of Oslo, Norway
Trond Solhaug
Norwegian University of Science and Technology,
Trondheim, Norway
Are Turmo
Norwegian Centre for Science Education,
University of Oslo, Norway
lack of relevance in the campus-based part of the course and a lack of continuity
and connection between the campus-based course and practicum (Lid, 2013).
Time on task in this article denotes the sum of the students' activities devoted to
their studies in the campus-based part of the teacher-education programme:
lectures, student-led colloquiums, teacher-led seminars and individual studies.
Thus, educational authorities put pressure on teacher education (Ministry of
Education and Research, 2014). Within the upper-level education course and
practical-pedagogic training, students typically rank the practicum significantly
higher than campus-based teaching (Finne, Mordal & Stene, 2014). The criticism
is directed especially towards the education course entitled Pedagogy and Pupil
Understanding.1 Many students believe that the integration between campus
teaching and practicum is weak. Lid (2013) also finds the same patterns.
Students following the primary and secondary-school teacher education also
value the practicum elements more highly than the campus-based education; in
comparison with earlier measurements, the Pedagogy and Pupil
Understanding subject is less favoured than the teacher-education subject
formerly known as Pedagogy (Finne, Mordal & Stene, 2014). We thus cannot
isolate the question of a low degree of time on task from that of relevance.
How much student teachers learn from their own studies depends, amongst
other things, both on how much time is actually spent on studying and how
much effort student teachers put into their studies. The relationship between
time on task and performance is complex (Rosenshine & Berliner, 1978; Brophy,
1986), but there is a widespread acknowledgement that it is not a linear
relationship (Gettinger, 1986). If the student teacher does not work in an
effective and efficient manner, there will not necessarily be a clear relationship
between time on task and performance. But it is difficult to envisage progress in
learning without the student in question spending sufficient time studying. Time
on task is a prerequisite for learning in campus-based teaching. For this reason,
1 Bronkhorst et al. (2014) have identified similar resistance to pedagogy courses in many
countries.
we argue that a reasonably high time on task in the campus-based part of the
teacher-education course and learning intentions is an important prerequisite for
the proper functioning of a campus-based course. In other words, it should: (1)
equip the student teacher with skills and tools to teach academic subjects and to
lead pupil learning and (2) contribute to future adaptability, so students will be
able to relate to changes in the mandate for professional teaching activities
(Darling-Hammond, 2006).
Society will expect that student teachers during their time on campus will work
on their studies to an extent that more or less equates to a normal work week for
a full-time employee. In general, Norwegian students spend less time on their
studies than students from other Nordic countries (Statistics Norway, 2014).
What studies of teacher-education programmes are silent about explains the
student teachers' time on task. Conversely, there are isolated accounts of time on
task amongst students in a large number of courses, including different kinds of
teacher education courses.
The purpose of the present study is to explore the impact of selected factors on
student teachers' time on task.
Table 1 shows the average total time use on studies reported by students
attending different types of full-time programmes in Norway, according to the
Norwegian quality assurance agency for education (Lid, 2014). The survey was
conducted in the autumn of 2013 and sent out to all bachelors and masters
students in Norway. The table shows a large variation between the different
categories of study programmes. Architecture and medicine are found at the top,
while teacher programmes are found below the average. However, the survey
also shows a large variation among the different teacher education programmes.
The highest value for a teacher programme is approximately at the level of
medicine in Table 1. Therefore, it is of much interest to study antecedents of
student teachers time on task. The normal full-time work week in Norway is
37.5 hours; i.e. only a few of the reported averages in Table 1 are at or above this
number.
Table 1: Total time use (hours/week) for study programmes in Norway. Source: Lid
(2014).
Study programme Time used
Architecture 43.1
Medicine 37.0
Civil engineering 35.6
Arts, design, music 33.7
Engineering 33.1
Science and math 32.6
Law 31.5
Nursing 29.8
Psychology 29.2
5-year teacher programmes 28.0
Economics/business 27.3
Political science 25.9
Humanities 25.4
Kindergarten teaching 25.3
Primary teacher 25.2
Languages 23.7
General education 23.1
All programmes 29.0
The raison dtre of teacher education is that student teachers should qualify for
the work life of teachers (Darling-Hammond & Lieberman, 2012). To a large
extent, the quality of the education will depend on the quality of the student
intake and on the progress made by the student teachers during the course of
their studies. Learning progress induced by the education programme (value
added) is dependent on the quality of the campus-based courses, the personal
talent of the student teachers for carrying out the tasks associated with the
teaching profession, the quality of the supervision received by students in their
school-based practicum and not least their own learning activities. It is
difficult to isolate the significance of any one individual factor in a way that will
significant for his or her ability to complete the course of study. Our third
hypothesis is: the actual personality feature of self-discipline predicts time on
task in on-campus teacher-education studies.
So far, the factors that we have taken into consideration can be regarded as
qualities of an individual student: motivation and self-discipline. Time on task
on the part of student teachers can, however, also be understood as a response to
the demands and tasks imposed by the course on student teachers as a part of
the study programme (Darling-Hammond & Lieberman, 2012). For instance,
some sections of the teaching programme can consist of submitted activities that
will be marked and assessed by the academic staff of the university or college.
The lecturers can specify their demands regarding effort by means of comments
on student performance and compulsory submissions. These demands represent
the institution's expectations expressed through the curriculum, requirements
and tasks to be completed. To identify aspects of the teacher programme that
generate effort in the form of time on task, we investigate how this is seen in the
teaching course's self-determined activities (private study) and activities that are
laid down by the university/college as compulsory activities. Our fourth
hypothesis is: external academic pressure will predict study effort and, thus,
time on task.
Previous evaluations have indicated that there are certain differences in quality
between the teacher-education variants offered by the universities and the
university colleges (Roness & Smith, 2009). These evaluations form the basis to
explore whether there are significant differences between universities and
university colleges regarding student time on task.
The survey was carried out during spring and autumn 2013. Data collection was
carried out in the following two ways:
(2) The other part of the sampling procedure was based on an electronic
survey. Students at four Norwegian university colleges with
primary/secondary/general teacher programmes took part in an electronic
questionnaire run by the firm Advicia. The researchers were given the e-mail
addresses of the student teachers by the teacher-education institutions, and
Advicia sent the electronic questionnaire to these email addresses.
It is not possible to estimate the exact response rate within this sample
because many students were not users of the institutionally allocated e-mail
addresses at two schools. A comparison of gender and age shows that this
sample is well aligned with the characteristics of the general population of
student teachers at the university colleges. A further validation was done via
the comparison of measures of time on task in our investigation. A similar
investigation of time on task was undertaken by the Norwegian Agency for
Quality Assurance in Education in the survey previously mentioned (Lid,
2014). The average measures are quite similar. These validation efforts
indicate that some characteristics of our sample from the electronic
questionnaire are well aligned with similar characteristics of the reference
population among Norwegian student teachers. In total, 635 students
responded. The analysis is based on 432 responses (311 women and 121 men)
after the removal of missing values. University college students contributed
270 responses, while 162 responses were from university students.
Measurement instruments
A questionnaire was constructed based on measurement instruments previously
reported in the literature, as well as new developments (table 2). In the survey,
student teachers responded to items on a seven-point Likert scale in which the
middle numeral four represented a neutral midpoint. The concepts were
measured with two to three single items. The analysis reported in the following
is based on five measurement instruments. The internal consistency (Cronbachs
alpha) for each of the concepts is satisfactory; Cronbachs alpha is between .71
and .82. In addition, the mean inter-item correlations indicate the measurement
error (the reliability) of one single item for each concept. The indicators,
Cronbachs alpha (c) and the item reliability for each concept, are as follows:
It is important to me:
Even though I allocate time for studying, I dont manage to get it done. 2)
I often put off the things I have to do until the last minute. 2)
Compared with high school, I have to use more time to keep up with my
teaching classes.
Institution category, w1
Time on task, TT
Lectures
Student-led colloquiums
Teacher-led seminars
Individual studies
Analysis
Structural equation modelling (SEM) was used to analyse the relationships
between the variables. SEM is suitable for confirmatory factor and path analyses.
Assessments of fit between model and data are based on the following indices:
root mean square error of approximation (RMSEA), normed fit index (NFI),
goodness-of-fit index (GFI) and comparative fit index (CFI). An RMSEA of <.05
and NFI, GFI and CFI of >.95 indicate a good fit; an RMSEA of <.08 and NFI, GFI
and CFI of >.90 indicate an acceptable fit (Kline, 2005).
The measurement and structural models were estimated with IBM SPSS Amos
21. The values of the RMSEA, NFI, GFI and CFI indicate that the structural
models in figures 1 through 4 have an acceptable fit.
Empirical results
Figure 1 shows the distribution of total time on task (tt) at the student level. The
figure shows that the average time use in the sample is close to the average for
student teachers in the previously mentioned Norwegian Agency for Quality
Assurance in Education student barometer survey (See Table 1). This means that
the average is rather low, with a value of only 26.1 hours per week. As
previously mentioned, the normal full-time work week in Norway is 37.5 hours
per week.
Figure 3: Antecedents of student teachers' total time use regarding lectures and
teacher-led seminars: im=intrinsic motivation, pm=achievement goal motivation,
sd=self-discipline, he=external academic pressure, tt2 =time on task on lectures and
teacher-led seminars, w1=institution; 0=university and 1=university college.
Significant path coefficients and correlations are in bold italics, N=432.
Figure 4: Antecedents of student teachers' total time use regarding individual studies
and student-led colloquiums: im=intrinsic motivation, pm=achievement goal
motivation, sd=self-discipline, he=external academic pressure, tt3=time on task on
individual studies and student-led colloquiums, w1=institution; 0=university and
1=university college. Significant path coefficients and correlations are in bold italics,
N=432.
As indicated before, a normal work week in Norway consists of 37.5 hours. The
estimated measurements of time on task for the various teacher programmes are
lower than those that society should expect. Our study suggests that teacher-
education institutions ought to place an emphasis on more external academic
pressure on the students, make more demands in terms of coursework and
provide feedback to assignments so poor achievement will not be tolerated.
Student teachers, in fact, receive better grades than nursing students and
engineering students but have lower time on task (The Panel for Teacher
Education Reform, 2014). The possibility of failure may be a necessity to ensure
that students take their studies sufficiently seriously. Such a conclusion,
however, is controversial and runs counter to some core results in motivational
research. We need more research in this respect to arrive at a conclusion
regarding this question on a better qualified basis than we are able to do here.
Raising demands in a way that can lead to failure (or drop-out) is, however, a
strategy that, within the Norwegian educational financing system, would
potentially punish teacher-education institutions in the short term (Only
successfully completed student exams generate variable income for teacher-
education institutions).
Conclusion
Despite its shortcomings, this study may contribute to our understanding of
antecedents of student teachers time on task. If the associations represent causal
relationships, the conclusion regarding this question must be that both the
campus-based teaching and the teaching-practice element within the schools
face challenges respecting the ambition to professionalise teaching (table 4). In
our opinion, one of the requirements must be to increase the external academic
pressure with the purpose of increasing time on task. Study input will, in any
event, be an important prerequisite for legitimising society's use of resources in
teacher-education programmes. One implication of this study is that, if a low
level of time on task is regarded as a problem, a tightening of the work
requirements in the campus-based elements of teacher education would be a
possible remedy. The self-discipline of student teachers is the personality factor
that is most strongly associated with time on task, whilst the motivation of
student teachers is relatively weakly associated with time on task. Self-discipline
appears to be of considerable significance to student teachers self-managed
study. An unanswered question is whether teaching self-discipline strategies or
other institutional arrangements would sustain time on task.
Table 4
Overview of results related to the hypotheses and the exploratory question (T=total time-o-
task; L=lectures and teacher led seminars; I=individual studies and student led
colloquiums)
Wording Supported?
References
Ashton, P. (1984). Teacher efficacy: A motivational paradigm for effective teacher
education. Journal of Teacher Education, 35(5), 28-32.
Ball, D., & Forzani, F. (2009). The work of teaching and the challenge for teaching
education. Journal of Teacher Education, 60(5), 497511.
Barbogen, H.. (2011). Slaughtering the part-time study of teacher training. Universitas.
Retrieved 10/14/2014 from http://universitas.no/nett/55790/slakter-
deltidsstudiet-pa-ppu/hl:l%E6rerutdanning.
Baumeister, R., & Tierney, J. (2011). Willpower: Rediscovering the greatest human strength.
New York: Penguin.
Bronkhorst, L. H., Koster, B., Meijer, P. C., Woldman, N. & Vermunt, J. D. (2014).
Exploring student teachers' resistance to teacher education pedagogies. Teaching
and Teacher Education, 40, 73-82.
Brown, J. S., Collins, A. & Duguid, P. (1989). Situated cognition and the culture of
learning. Educational Researcher, 18(1), 32-42.
Calderhead, J. (1991). The nature and growth of knowledge in student teaching. Teaching
and Teacher Education, 7(5-6), 531-536.
Consuegra, E., Engels, N. & Struyven, K. (2014). Beginning teachers' experience of the
workplace learning environment in alternative teacher certification programs: A
mixed methods approach. Teaching and Teacher Education, 42, 7988.
Darling-Hammond, L., & Lieberman, A. (2012). Teacher education around the world:
Changing policies and practices. New York: Routledge.
Edwards, A., & Protherhoe, L. (2003). Learning to see in classrooms: What are student
teachers learning about teaching and learning while learning to teach in schools?
British Educational Research Journal, 29(2), 227242.
Finne, H., Mordal, S. & Stene, T. (2014). Beliefs of study quality at teacher education programs
2013. Trondheim: SINTEF Technology and Society.
Gettinger, M. (1986). Issues and trends in academic engaged time of students, Special
Services in the Schools, 2(4), 1-17.
Haug, P. (2008). Teacher education in a state of change. Norsk Pedagogisk Tidsskrift, 92(2),
100110.
Jahreie, C. F., & Ludvigsen, S. (2007). Portfolios as boundary object: Learning and change
in teacher education. Research and Practice of Technology-Enhanced Learning, 2(3),
299218.
Kline, R. B. (2005). Principle and practice of structural equation modeling. New York: The
Guildford Press.
Lid, S. E. (2014). Study effort. Analysis of data from study barometer 2013. Oslo: The
Norwegian Agency for Quality Assurance in Education.
Lund, A., Bakken, J. & Engelien, K. (2014). Teacher education as design: Technology-rich
learning trajectories and environments. Seminar.net - International Journal of Media,
Technology and Lifelong Learning, 10(2), 89-97.
Lunenberg, M., & Korthagen, F. (2009). Experience, theory, and practical wisdom in
teaching and teacher education. Teachers and Teaching: Theory and Practice, 15(2),
225240.
Martinussen, G., & Smestad, B. (2011). The efforts of student teachers at the general
teaching programme: better than its reputation? In: T. L. Hoel, T. M. Guldal, C. F.
Dons, S. Sagberg, T. Solhaug & K. Wge (eds.), Research and Development (R&D)
in practice 2010. Report from a conference on practice-oriented R&D in teacher
education. Trondheim, 10th og 11th mai 2010. (pp. 331-340). Trondheim: Tapir.
Nesje, K. (2014). Teach First Norway. New models of teacher education. In Elstad, E., &
Helstad, K. (eds.) Profesjonsutvikling i Skolen, Oslo: Universitetsforlaget.
Paulsen, G. E. (2014). The subject named pedagogy: Beyond time. Lektorbladet, 4, 5-6.
Rasmussen, I., & Ludvigsen, S. (2009). The hedgehog and the fox: A discussion of the
approaches to the analysis of ICT reforms in the teacher education of Larry Cuban
and Yrj Engestrm. Mind, Culture, and Activity, 16(1), 83-104.
Rosenshine, B., & Berliner, D. C. (1978). Academic engaged time. British Journal of Teacher
Education, 4(1), 3-16.
Roness, D., & Smith, K. (2009). Postgraduate Certificate in Education (PGCE) and
student motivation, European Journal of Teacher Education, 32(2), 111-134.
Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of
intrinsic motivation, social development, and well-being. American Psychologist,
55(1), 68-78.
Senko, C., Hulleman, C. S. & Harackiewicz, J. M. (2011). Achievement goal theory at the
crossroads: Old controversies, current challenges, and new directions. Educational
Psychologist, 46(1), 26-47.
Statistics Norway (2014). Norwegian students spend the least time on their studies.
Retrieved 10/14/2014 from www.ssb.no.
The Norwegian Agency for Quality Assurance in Education (2006). Evaluation of the
general teacher education in Norway 2006. Part 1: Main report. Oslo: Norwegian
Agency for Quality Assurance in Education.
The Norwegian Association of Local and Regional Authorities (2013). The Norwegian
Association of Local and Regional Authorities owner strategy for kindergarten and school
2013-2016. Oslo: KS.
http://www.regjeringen.no/nb/dep/kd/aktuelt/nyheter/2024/KD-og-KS-
inngar-ny-kvalitetsavtale.html?id=774114.
The Panel for Teacher Education Reform (2014). Teacher education and change. Inner
development outer contextual and structural constraints. Stavanger: University of
Stavanger/The Panel for Teacher Education Reform.
Vassli, O. (2010). Vigorous debate about theory and practice. Retrieved 5/29/2014 from
http://plinius.wordpress.com/2011/11/14/p-16811/.
John K. Lee, Hiller Spires, Eric Wiebe, Karen Hollebrands and Carl Young
North Carolina State University
Raleigh, North Carolina
Introduction
"The digital age is creating an information and communications renaissance. But
it is not serving all Americans and their local communities equally. It is not yet
serving democracy fully. How we react, individually and collectively, to this
democratic shortfall will affect the quality of our lives and the very nature of our
communities."
-- Knight Commission, 2009
the most important contexts for educational innovation (Lei, Conway, & Zhao,
2007), with several states within the United States (i.e., Indiana, Maine, North
Carolina, South Dakota, Texas, and Virginia) having implemented large-scale
one-to-one computing initiatives. Research points to the impact of one-to-one
learning environments and their potential learning benefits (Bebell, Clarkson,
Burraston, 2014; Donovan, Green, & Hartley, 2010; Grimes & Warschauer, 2008;
Mouza, 2008), technology literacy and writing (Penuel, 2006), and the advantag-
es of cognitive tools (Weston & Bain, 2010). A recent study by Zheng, Arada,
Nilya, & Warschauer (2014) provided the much needed perspective of student
voices relative to personal computing in K-12 schools. Despite an abundance of
activity, we still know very little about how the introduction of one-to-one stu-
dent laptop computing impacts the classroom and the overall ecology of learn-
ing in schools, especially in terms of whether the initiative is affecting communi-
ties evenly as the Knight Commission warns.
Spires et al. (2012) defined a new learning ecology (Figure 1) as a new concept
prompted by personal computing and learning environments. In a one-to-one
ecology that has constant and immediate access to information, many influences
are present in a partially chaotic (i.e., unpredictable) wayamong complex inte-
ractions, new ways of teaching and learning may emerge. The new learning
ecology provides new learning opportunities for students; greater understand-
ing is possible as technologies are leveraged for ongoing learning actions. This
view of situated learning (Lave & Wenger, 1991) is different from a scientific
model in which every effect has a cause preceding it. The new learning ecology
as we have defined it in relation to one-to-one computing environments is one
such application, that includes four phases (Spires, et al, 2012, ).
one laptop initiatives have been implemented at the statewide level in Maine
and at a more regional level in New Hampshire (Bebell, 2005) and Virginia
(HCPSTLI, 2008). Individual school districts in Texas, as well as states such as
South Dakota, Massachusetts, and Florida, established programs ranging in size
from 5 to 47 schools (Bebell & Kay, 2010; Cavanaugh, Dawson, & Ritzhaupt,
2008; Gorder, 2007). North Carolina also has an extensive and statewide one-to-
one laptop computing program (NC1LC, 2008). Not surprisingly, schools in oth-
er countries are also establishing one-to-one programsboth industrialized na-
tions such as Australia and emerging nations through the One Laptop per Child
program (Derndorfer, 2011; Muir et al., 2006; OLPC, 2010).
Drawing from the theoretical and conceptual underpinnings of the new learning
ecology and the literature highlighting the impact and support of one-to-one in-
itiatives in the classroom, we conducted case studies of four one-to-one class-
rooms. With this understanding of the theoretical and conceptual underpinnings
of the new learning ecology and research on one-to-one computing, our focus
shifts to our own research initiative.
Yin (2012) also suggested that case selection is often theory-driven; therefore, we
selected the cases based on the theoretical ideas featured in our early work on
the new learning ecology (Spires et al., 2012). We were interested in determining
the extent to which the teachers, who had all received previous training in one-
to-one instruction, were facilitating a new learning ecology in their classrooms.
The research project was situated in a southern Atlantic coast state in the US in a
rural high school with 1,044 students and 59 classroom teachers. Fifty-two per-
cent of the students were African American, 46% were Caucasian, and 2% were
Hispanic. Forty-five percent of the students enrolled were on free or reduced
priced lunch, placing the school about 10% higher than the state average in
terms of the number of students enrolled in the free or reduced lunch program.
Students were each given a laptop computer. Faculty had completed two profes-
sional development sessions for one-to-one computing in the classroom. To get a
fuller picture of one-to-one computing in the school, we chose a teacher in each
of the four main content areasEnglish, social studies, math, and scienceto
observe and interview.
We coded the data using a priori coding categories consisting of the four condi-
tions of the new learning ecology. The general condition of student dispositions
was comprised of four elements and the general condition of teacher capacities
was comprised of five elements as noted below (Spires et al., 2012):
Immediate and constant access to information and a global community
Intensity, relevance and personalization of learning
Self-directed, self-regulated, curious, and creative learners
Teacher as content expert, facilitator, consultant, mentor, and improvisa-
tionist
From the coded data, Yins (2012) method of pattern matching was used to de-
termine the extent to which the new learning ecology was present in the four
classrooms represented in the multiple cases. Additionally, a cross-case analysis
was conducted in an effort to, as Yin (2012) describes, apply a replication logic
in interpreting the findings across the cases in a multiple case study (p. 17).
This analysis sought to determine the factors influencing the existence of a new
learning ecology in the classrooms. After compiling a full list of these factors, we
collapsed them into five assertions, which are presented following the four cas-
es.
The Cases
This section presents cases of four teachers: Mrs. Perry, Mr. Thomas, Mr. Wat-
son, and Ms. Austin. Each case describes how the teachers constructed learning
experiences given the (a) one-to-one laptop computing activities present in the
classrooms, and (b) potential of the new learning ecology as a theoretical frame-
work for describing the interactions between teachers and students and their
uses of laptops and information to achieve educational goals in the classroom.
In general, Mrs. Perry was very receptive to the schools one-to-one laptop pro-
gram. She viewed the initiative as providing students with a unique opportunity
to develop skills they would need for college and career. She valued the fact that
the one-to-one laptop program gave her students access to information and saw
that access as a way to encourage and motivate her students. In an interview,
Mrs. Perry talked about access to information online as something that will
spark them a little bit because some of [it] might be a bit dry too. Some of them
might find an interest and relate to it. However, Mrs. Perry also observed a dif-
ference in the way different students interacted with online information. In the
same interview, Mrs. Perry described the unevenness of student experiences:
The good students like self-direction and are willing to take that extra step. The
weaker students, I dont see doing anything better from using the computers.
In another lesson, some students were having difficulty creating graphs with
Excel so Mrs. Perry thought an online program would assist students with
graphing. She quickly discovered that students were not able to adjust the scales
on the axes in the program, and thus the online program was not helpful after
all. Mrs. Perrys use of the online tool to replace Excel, which had been used to
replace a paper and pencil graphing exercise, ended up being more of a distrac-
tion than an instructional benefit.
Despite the limitation, Mrs. Perry was often optimistic in her talk about using
technology. In one interview, Mrs. Perry described an advantage of the comput-
ers is that they allow students to collect information about science-related topics
on their own and provide a more efficient means to access resources:
Can we do this without computers? Yes, we can go to the library
to look up the information. If they did find something that was
interesting and they wanted to research further, it is much easier
to do it on the computer. I like the computers. I think it is a great
thing for the kids.
In his teaching, Mr. Thomas regularly used wikis and a classroom management
system called Schoolview to monitor what students were doing on their laptops
during class. Mr. Thomas felt like his classes were, in some ways, positively af-
fected by the introduction and integration of one-to-one laptop computing in his
classroom. He pointed out that, after receiving their laptops, students appeared
to be more engaged during class. He also noted that some students were taking
the initiative to do research as well as looking online to find different methods
for solving problems and to learn more about the mathematical ideas they were
studying. However, Mr. Thomas mostly talked about access to online informa-
tion in the classroom as an ancillary type of experience. Having constant avail-
able Internet access does kind of help them out. There have been random days
where I think okay. Mr. Thomas was not convinced that the one-to-one initia-
tive was fundamentally altering his instruction given the content he taught. He
described this in an interview: I was so excited about doing all the WebQuests
with them. But then again its a math class, theres only so much you can do
with it. Mr. Thomas saw himself as guiding students toward knowledge. He
described this approach as such:
When I teach my kids Im not like 2+2 is Some teachers Ive had
in the past just talk like that at you. So, I think I kind of coach
them through the problem, and a good example of that is when
Thomas described himself as a techie and noted that he was using a tablet PC
during his first year of teaching even before the school implemented one-to-one
laptops in the classrooms. With the implementation of one-to-one laptops, he
was beginning to seek creative ways to use technology to motivate and teach
students. The most prominent shift for Mr. Thomas regarded the manner in
which he supported students as they worked individually on math problems.
Mr. Thomas said the biggest benefit of one-to-one computing was his ability to
walk around the classroom where he could focus on students one-on-one.
During one class, he created a review game for students using his own Microsoft
Xbox gaming system. During another class, Mr. Thomas created a Geometers
Sketchpad sketch that contained different polygons and a sequence of questions
for students to answer related to finding the length of a side, the perimeter, and
area of different polygons. Even with these in-class experiences, Mr. Thomas
most often talked about the use of laptops outside of his classroom. Some of
them have taken the initiative [with laptops] when they go home or if they have
a little free time they will go and find other ways of doing a math problem or
research something.
Mr. Thomas had a direct pedagogical stance that was not enabling of the sort of
self-directed learning featured in the new learning ecology. He described the
limitations of self-directed learning on laptops in terms of time and student
knowledge. In algebra I cant afford to lose five minutes. Im not going to lie
and Im not trying to talk bad about students but you have to spoon feed them.
He also saw limitations to technology integration in his discipline. The quadrat-
ic formula is a long process. Thats just pencil and paper. Grind it out.
Mr. Thomas high comfort level with technology in his classroom helped em-
power him to investigate some new ways to use laptops, but he generally
avoided the laptops in favor of more traditional paper and pencil or didactic pe-
dagogies. While the mathematics content covered in the classroom stayed, out of
necessity, close to the state-mandated course of study, his implementation of
As a one-to-one teacher, Mr. Watson was more expansive and inventive about
his role in the one-to-one classroom. Mr. Watson described his teaching style as
fluid, saying that he likes to move around [to] make sure that Im looking at
every kids computer so that I see theyre progressing and theyre not getting
stuck, staying on one thing too long. Evidence of this facilitative stance
emerged in the classroom as well. In an activity where students were research-
ing various protest techniques used in the United States over the last century,
Mr. Watson carved out 50 minutes from a 60-minute lesson for students to work
in groups to locate and analyze relevant information online and then construct a
product representing what they learned. Mr. Watson supported this work in two
ways: he rotated among the groups using informal and formative assessment
strategies to encourage students progress, and he provided students with subs-
tantive content or clarifications about content.
network connections. He noted several times during the year when the network
had been down or slow and how the resulting lack of access to information had
limited the progress of students work.
Even when the Internet connections were good, Mr. Watson was concerned
about the quality of information his students accessed online. He attempted to
manage his students work by setting expectations about what resources they
could use in research activities. For example, he only allowed students to use
Wikipedia if they coupled the Wikipedia reference with a second reference that
corroborated the original information. Mr. Watson did not seek to limit access
just manage the critical quality of the information used. As Mr. Watson put it,
Theres no resource they cant access. Everything and anything they dont
know is on the Internet somewhere, and they can find it as long as they search
for it correctly. They now can find whatever it is were working on and be much
more creative.
Although Mr. Watson had a high level of acceptance for one-to-one laptop com-
puting in his classes, some pedagogical conflicts emerged as a result of the
school-wide shift to one-to-one computing. For one thing, Mr. Watson struggled
with how to deliver lectures to students. He made use of a centralized system to
control students laptops, so as to keep them from browsing the Web while he
delivered a lecture. He also was struggling to find a way for students to take
notes while he lectured. His approach was to give students outline notes with
blanks that they would fill in as he talked. Mr. Watsons use of one-to-one laptop
computing to manage note-taking was at odds with his other more student-
centered pedagogies. For example, Mr. Watson implemented an activity on the
Cold War where students created video-based examples of propaganda. In the
activity, he took the position of a facilitator, and in some ways, ceded content
expertise to outside resources. Mr. Watson talked about how the one-to-one lap-
top environment had changed his responsibilities as a teacher. He saw the tech-
nology as enabling and expanding opportunities for students to be creative and
inventive. [One-to-one computing] definitely changed project-based learning.
You give them a computer and its easier to get materials together. Theres no
resource they cant access.
As with Mrs. Perry, Mr. Watson was able to use online information access to
transform research projects that were previously completed in the library with
limited resources. However, Mr. Watson struggled with both managing and
empowering students online research activitiesboth in terms of helping them
to assess what constitutes appropriate, high-quality material to utilize and
prompting them to stay on task. Mr. Watsons concern for management also ex-
tended to his use of the classroom management software, especially when he
returned to a more teacher-centric lecturing approach. While the introduction of
one-to-one computing forced a change in classroom pedagogy from a more
teacher-centric lecture style to a more student-centric group project approach, it
was unclear how much of this change was an existing desire by Mr. Watson faci-
litated by the technology or change imposed on him by the introduction of one-
to-one computing. Mr. Watson made minor adjustments to existing activities
Ms. Austin went on to describe how she had worked to overcome barriers to so-
cial networking in her school: That was something that I had to explain to the
tech people, because a month into this you created this great social networking
site, and I get on it one morning trying to get some stuff added on, and its
blocked.
At the same time, Ms. Austin was often cautious and quick to point out potential
pitfalls or limitations to using one-to-one laptop computing in her classes. She
described immediate and constant access to information a double-edged sword:
Its good because we can use it for classroom instruction. Its negative in some
ways because theres still some people around here that maybe arent being mo-
nitored the way they should, that are using it for not the correct purposes and
theyre slowing down and bogging down the whole system. However, on bal-
ance, Ms. Austin seemed to value the access to information that one-to-one com-
puting affords. Before, we were very limited as to what we could do because
we have very few resources that we all shared with two or three people, so now
thats all right there. Also we can find out things that are very current. And
thats important for the kids because they can find it out right then.
Ms. Austin sought out a middle ground between the transformative nature of
one-to-one computing and the centrality of the teacher in the classroom. Ms.
Austin was reluctant to argue that the laptop computer would alter the relation-
ship between teacher and student. From day one, my kids walked in the door
and because they knew me, it didnt matter that that computer was in their
hand. They knew that they werent going to touch that business until I said.
Mr. Austin insisted that she would be in control of students use of technology,
both in terms of their physical access to the technology and in terms of how stu-
dents used online information and technology tools. In talking about how her
teaching had changed with the introduction of one-to-one computing, Ms. Aus-
tin said, So that stayed the samethe structure has stayed the same. I think
that what has changed was that we have a lot more information at our finger-
tips.
Ms. Austin struggled with the changes that immediate and constant access to
information through the one-to-one laptop environment brought to the class-
room. Her concerns were related in part to classroom management, but more
than some of the other teachers, she also struggled with how to leverage these
new capabilities and tools into way that reflected less of a teacher-centered dy-
namic. This was reflected in her optimistic hope for social networking tools to
help transform her classroom practice. However, this embracing of new technol-
ogies often came in conflict with deeply held beliefs about what constitutes ap-
propriate instructional strategies in the classroom. In many ways, Ms. Austins
response to one-to-one computing centered more on ubiquitous access to infor-
mation and the potential for students to develop their capacities with new tools,
than on transforming her teaching.
Discussion
The cases reported here suggest that teachers engaged a range of negotiated ac-
tions as they searched for ways to situate one-to-one computing in their teach-
ing. Although these teachers used computers differently in their classes, from
the computer as a tool to support existing practice to using the computer as a
hub for learning activities, there were important consistencies regarding the na-
ture of the learning ecology that emerged in these classrooms. In this section, we
highlight prominent themes from the new learning ecology framework that
were represented in the data. Our analysis suggested that across the four class-
rooms, immediate and constant access to information was the most prevalent
condition. The students and teachers had immediate and constant access to in-
formation since they all had Internet access and laptops; however, the four
teachers leveraged that access in very different ways. The teachers in this
studyMrs. Austin (English), Mr. Thomas (math), Mr. Watson (social studies)
and Mrs. Perry (science) demonstrated their capacities as content experts, faci-
litators, consultants, mentors and improvisationists in different ways and in an
uneven manner. The other two conditions, intensity, relevance, and personaliza-
tion of learning as well as highly developed student dispositions (students as
self-directed, self-regulated, curious, and creative) were less evident across the
four teachers classrooms, but important in unique ways. The following four
assertions describe in more detail these findings as culled from data across the
four cases.
In contrast, the math teacher, Mr. Thomas and Ms. Austin, who taught English,
were less likely to incorporate immediate and constant access to information in
their classrooms. They tended to view online information as protean and a po-
tential source of distraction from the fixed knowledge featured in their instruc-
tion. Both teachers saw Internet access as a way to extend the learning expe-
rience outside the classroom as opposed to inside the class. Mr. Thomas and Ms.
Austin both developed class wikis and presented content online to facilitate
homework assignments, but rarely incorporated such technology in class. Mr.
Mr. Watsons use of questions signaled his epistemological beliefs. In one activi-
ty he used questions to open the door for students to develop knowledge about
Soviet propaganda. Youve seen propaganda in photographs, and now youve
just seen Soviet propaganda [films] about the Soviets and the Cold War. What
did you notice about the film? What do you notice about the claims? Mr. Wat-
son did not answer his questions. Instead, he had students conduct research,
viewing additional propaganda films and conducting analysis, and then produc-
ing their own propaganda films while applying what they had learned. Mrs.
Perry took a similar approach toward knowledge. When working with students
in online research projects, Mrs. Perry also posed questions and consistently
emphasized the importance of students creating their own meaning and learn-
ing from these experiences. As she put it when talking about an activity focused
on disease; get them to figure out which [diseases] would be more likely to af-
fect them in their lifetime and how they might change their lifestyle right now to
prevent them from having problems later.
Mr. Thomas and Ms. Austin were not as willing to take the open epistemological
stances that Mrs. Perry and Mr. Watson took. Mr. Thomas, who taught mathe-
matics, had a direct pedagogical approach that was predicated on a more tradi-
tional epistemological stance. In his description of the differences between stu-
dents self-directed learning in mathematics and his guidance of student learn-
ing, Mr. Thomas argued, when my kids go home and do homework they say
this was tough, but when I go over it, it seems so easy because you just go over
and explain it. Mr. Thomas saw himself as in possession of knowledge and his
Of the five conditions for highly effective teaching theorized in the new learning
ecology (content expert, facilitator, consultant, mentor, and improvisationist),
none stood out as a prevalent method. Instead, specific dispositions were preva-
lent given specific conditions of the one-to-one computing environment in the
classroom. Teacher dispositions were conceptualized in this research as holistic
belief systems that would emerge in tandem with other conditions in the new
learning ecology, and, in fact, we found evidence that these beliefs and disposi-
tions took form unevenly among all four teachers. These dispositions were con-
text driven, with teachers shifting very quickly along a range of dispositional
attitudes. For example, Ms. Austin talked about being a facilitator, or as she put
it a coach, and an improvisationist.
I still think my time in here is still divided 50/50 and with the computer time
Im a coach and Im helping and Ill get on the same play or page, and then on
the other side of it Im an improvisational artist because Im always dancing and
singing and being on stage up here.
Ms. Austin wanted her dispositions to emerge in contexts. In the one-to-one con-
text, she viewed herself as a helper and a motivator. In this context, the central
classroom focus was on individual students, and Ms. Austin provided support
or facilitation to get students to the same learning goal, or as she put it the same
page or play. In whole class settings, where Ms. Austin was the focus of atten-
tion, she saw her role shift to an improvisationist who was drawing on a wide
range of personal skills to maintain students focus. But, when she played the
part of an improvisationist, Ms. Austin was less reliant on technology.
Mr. Thomas expressed similar shifting dispositions given the context. For exam-
ple, his approach to teaching with Geometers Sketchpad highlighted the way in
which he moved back and forth across these dispositions. With Sketchpad,
every kid can work at their own pace. A lot of them say I talk a lot and I do. I
want to do it like they do in college and in college they give lecture. With Sket-
chpad I can walk around and help every student, which I havent been able to
do a lot of in the past.
As with the personalization of learning, the teachers in this study sought to bal-
ance their role by maintaining some control over the instructional processes.
Mrs. Perry and Mr. Watson tended to enable students independent learning
more through motivation, while also providing examples and direction toward
attainable learning goals. The ubiquitous, constant access to information and a
greatly expanded array of software tools enabled Mrs. Perry and Mr. Watson to
carry on a parallel expansion of facets of instruction they could engage in. For
example, Mrs. Perry faced challenges in supporting students on the use of so-
phisticated software tools, but found better luck in supporting more transparent
software tools and information sources, where she could focus on supporting
knowledge building around core science concepts. In sum, all four teachers stra-
tegically shifted their pedagogies between direct or teacher-centered approaches
and student-centered approaches.
All four teachers expressed strategic tensions between the potential of the tech-
nology to individualize student instruction, while also keeping them on track.
In contrast to relevance and intensity, which the teachers and learners were able
to realize as a whole group, personalization required a distinction in individual
learning that was difficult to attain. The teachers actually used technology tools
to control individual departures from class norms. Teachers were interested in
helping students, as Mrs. Perry put it, find an interest and relate to it, but spe-
cific adaptations at the individual level were rare.
Teachers tended to address issues and conditions at the class level as opposed to
the personal level. For example, the uneven availability of computers caused
teachers to differentiated instruction based on whether a student had a laptop to
use. At other times, teachers developed alternative lesson plans based on wheth-
er the Internet would be working. The teachers also modified activities based on
computing skills or the availability of specific resources online. In these in-
stances, the teachers were presented with the challenge of flexible instruction as
something to contend with rather than something they voluntarily embraced.
Consequently, the teachers in this study were performing a sort of triage where
student learning conditions that served as impediments to learning were as-
sessed and teachers actions were meted out based on the teachers perceived
priority of needs. Classroom management software provided by the district was
one tool deployed by these teachers, as was the low-tech solution of walking
around the room and observing what was on the students screens. When teach-
ers identified students either off-task or in need, they provide personal assis-
tance, but rarely enable personalized learning opportunities. Some of the teach-
ers also realized that formative assessment would be a key tool to gauge the out-
comes of these more individualized approaches to assignments, but instead used
formative assessment in this process of triage and conditional pedagogical re-
sponse.
The teachers in this study incorporated a variety of strategies when dealing with
problems and opportunities that emerged from their constant and immediate
access to information and the changing conditions for learning. Two of the
teachers, Mrs. Perry and Mr. Watson, provided students opportunities to access
information online during class, but used different strategies to manage stu-
dents uses of that information. Mrs. Perry saw her efforts to provide students
access to information as replacing existing analog approaches to using informa-
tion in science classes. However, she struggled to provide students consistent
experiences both as a result of students limited technology skills and due to
hardware and technology infrastructure limitations. Mr. Watson took a more
ambitious position. He created new learning experiences with online informa-
tion for his students that were no possible offline and then tried to develop new
instructional strategies for managing his students uses of online information.
Mr. Watson created rules about what types of information could and could not
be used (e.g. Wikipedia) and created research activities that necessitated stu-
Mr. Thomas and Ms. Austin did not regularly provide their students with op-
portunities to access online information in class. Both teachers thought that stu-
dents accessing information during class would be a distraction, but for different
reasons. Mr. Thomas saw student access to online information as disrupting his
ability to maintain instructional control over the delivery of content. Ms. Austin
was concerned about limited academic value of the information students would
access, being mainly social constructed information. However, they both saw
value in supporting students uses of online information out of class. Mr. Tho-
mas appropriated and adapted wikis to support his didactic teaching style,
while Mrs. Austin used network tools to encourage traditional literacy skills.
The uniqueness of the teachers experiences given that the original notion of the
new learning ecology emphasized personalization in learning points to the need
for some clarification in the original ideas, specifically with regard to highly de-
veloped teacher capacities. Additional work should seek to determine how
teachers personalize their pedagogies when the teaching and learning ecology
shifts in order to gauge a variety of paths to transformational teaching and learn-
ing.
This study made use of data collected within a small number of classrooms over
a relatively short period of time. Future work will need to scale this investiga-
tion in both time and spacefollowing a similar group of teachers longitudinal-
ly over a year or longer to see how their instructional practice and student beha-
viors continue to evolve (or not) and to expand the investigation to more schools
and districts. Such work would help to generalize the findings of this multi-case
study and further refine both the commonalities and differences in challenges
faced by different disciplines as they grapple with the new learning ecology.
This study emerged from an ambitious idea that teaching and learning in the
new learning ecology will enable constant and immediate access to information;
personalized learning; advanced learner dispositions; and highly developed
teacher capacities. This research responded to the need for establishing theoreti-
cally grounded practices within school-based one-to-one programs. Given the
amount of resources (both time and money) that are being invested across the
nation, as well as the hopes that are raised in terms of potential educational ben-
efits of one-to-one environments, it is essential that we think deeply and strateg-
ically about one-to-one teaching and learning, including thoughtful considera-
tions for theoretical grounding. The cases presented here suggest that although
conditions of a new learning ecology are evident within one-to-one learning en-
vironments, they may be more nuanced and contextualized than we understood
when theorizing our original idea (Spires et al., 2012). The Knight Commission
(2009) report highlighted the dramatic changes in ways we use and share infor-
mation in the current digital age. As school systems respond to these changes
with one-to-one laptop computing initiatives, educators will need to carefully
evaluate the contexts of these educational innovations. This research is one such
effort toward better understanding of how one-to-one laptop computing can en-
hance teaching and learning in the 21st century.
References
ciety for Information Technology and Teacher Education International Conference 2008
(pp. 1956-1963). Chesapeake, VA: AACE.
Christensen, C. M., Horn, M. B., & Johnson, C. W. (2008). Disrupting class: How disruptive
innovation will change the way the world learns. New York, NY: McGraw-Hill.
Clotfelter, C.C., Ladd, H.F., & Vigdor, J.L. (2009). The academic achievement gap in
grades 3 through 8. Review of Economics and Statistics, 91(2), 398-419.
Cuban, L. (2001). Oversold and underused: Reforming schools through technology, 1980-2000.
Cambridge, MA: Harvard University Press.
Dede, C. (2009). Determining, developing and assessing the capabilities of future-ready stu-
dents. Cambridge, MA: Harvard University.
Dede, C., & Rockman, S. (2007). Lessons learned from studying how innovations can
achieve scale. Threshold: Exploring the Future of Education, 5(Spring), 4-10.
Derndorfer, C. (2011). All 1-to-1 ICT4E programs around the world and evaluation metrics for
them. Retrieved from: https://edutechdebate.org/olpc-in-peru/all-1-to-1-ict4e-
programs-around-the-world-and-evaluation-metrics-for-
them/#IDComment335754995
Donovan, L., Green, T., & Hartley, K. (2010). An examination of one-to-one computing in
the middle school: Does increased access bring about increased student en-
gagement? Journal of Educational Computing Research, 42(4), 423-441.
Ertmer, P. A., Bai, H., Dong, C., Khalil, M., Park, S. H., & Wang, L. (2002). Online profes-
sional development: Building administrators capacity for technology leader-
ship. Journal of Computing in Teacher Education, 19(1), 511.
Eteokleous, N. (2008). Evaluating computer technology integration in a centralized
school system. Computers & Education, 51, 669-686.
Gerard, L. F., Bowyer, J. B., & Linn, M. C. (2008). Principal leadership for technology-
enhanced learning in science. Journal of Science Education and Technology, 17(1), 1-
18.
Gilbert, M. Kesler. (2013) "Cultivating Civic Ecotones for Community Partnerships."
Diversity and Democracy 16(4). AAC&U. Retrieved from
http://www.aacu.org/diversitydemocracy/2013/fall/gilbert
Gorder, L. M. (2007). Creating classrooms of the future: Connecting classrooms with one-
to-one computing. [Article]. Delta Kappa Gamma Bulletin, 73(4), 19-38.
Grimes, D., & Warschauer, M. (2008). Learning with laptops: A multi-method case study.
Journal of Educational Computing Research, 38(3), 305-332.
Gulek, J., & Demirtas, H. (2005). Learning with technology: The impact of laptop use on
student achievement. ERS Spectrum, 23(4), 4-20.
HCPSTLI, Henrico County Public Schools Teaching and Learning Initiative. (2008). He-
nrico County Public Schools Teaching and Learning Initiative Homepage. Re-
trieved from
http://www.henrico.k12.va.us/administration/instruction/technology/technol
ogy.html
Hew, K. F., & Brush, T. (2007). Integrating technology into K-12 teaching and learning:
current knowledge gaps and recommendations for future research. Educational
Technology Research and Development, 55(3), 223-252.
Ito, M., Horst, H., Bittanti, M., Boyd, D., Herr-Stephenson, B., Lange, P. Pascoe, C. & Ro-
binson, L. (2009). Living and learning with new media: Summary of findings from the
digital youth project (Project Summary). New York, NY: John D. and Catherine T.
MacArthur Foundation.
Johnson, L., Levine, A., Scott, C., Smith, R., & Stone, S. (2009) The Horizon Report: 2009
Economic Development Edition. Austin, Texas: The New Media Consortium.
Knight Commission. (2009). Informing Communities: Sustaining Democracy in the Digi-
tal Age. Retrieved from http://www.knightcomm.org/read-the-report-and-
comment/
Lave, J. & Wenger, E. (1991). Situated learning: Legitimate peripheral participation. Cam-
bridge: Cambridge University Press.
Lei, J., Conway, P. F., & Zhao, Y. (2007). The digital pencil: One-to-one computing for child-
ren. New York: Lawrence Erlbaum.
Lier, L. (2004). The ecology and semiotics of language learning: A sociocultural perspective.
Norwell, MA: Kluwer Academic Publishers.
Mendicino, M., Razzaq, L., & Heffernan, N. T. (2009). Comparison of traditional home-
work with computer supported homework. Journal of Research on Technology in
Education, 41(3), 331-359.
Mouza, C. (2008). Learning with laptops: Implementation and outcomes in an urban,
under-privileged school. Journal of Research on Technology in Education, 40(4), 447-
472.
Muir, M., Owen, A., Christensen, R., Knezek, G., Gibson, I., Albion, P., Norris, C.
(2006). Lessons learned from 1-to-1 laptop initiatives: Reflections on critical
components. In Anonymous (Ed.), Proceedings of the Society for Information Tech-
nology and Teacher Education 16th Annual Conference, Orlando. (pp. 4366-4371).
Chesapeake, VA: AACE.
NC One-To-One Learning Collaborative (NC1LC). (2008). Welcome to the NC one-to-
one learning collaborative. Retrieved from http://www.fi.ncsu.edu/1to1/
National Research Council. (1999). How people learn: Bridging research and practice. Wash-
ington, DC: National Academies Press.
National Research Council. (2008). Research on future skill demands: A workshop summary.
Washington, DC: Center for Education, Division of Behavioral and Social
Sciences and Education.
National Research Council. (2010). Preparing teachers: Building evidence for sound policy.
Washington, DC: National Academies Press.
One Laptop per Child (OLPC). (2010). One laptop per child. Retrieved from
http://laptop.org/en/.
Penuel, W. R. (2006). Implementation and effects of one-to-one computing initiatives: A
research synthesis. Journal of Research on Technology in Education, 38(3), 329-348.
Piburn, M., & Sawada, D. (n.d.). Reformed teaching observation protocol (RTOP) refer-
ence manual (ACEPT Tech. Rep. IN00-3). Phoenix: Arizona State University,
Arizona Collaborative for Excellence in the Preparation of Teachers.
Richardson, J., Mcleod, S., Flora, K., Sauers, N., Kannan, S., & Sincar, M. (2013). Large-
Scale 1:1 Computing Initiatives: An Open Access Database. International Journal
of Education and Development using ICT [Online], 9(1). Availa-
ble: http://ijedict.dec.uwi.edu/viewarticle.php?id=1584.
Roderick, M., Easton, J., & Sebring, P. 2009. The Consortium on Chicago School Re-
search: A new model for the role of research in urban school reform. Chicago, IL:
CCSR.
Sclater, J., Sicoly, F., Abrami, P. C., & Wade, C. A. (2006). Ubiquitous technology integra-
tion in Canadian public schools: year one study. Canadian Journal of Learning and
Technology, 32(1). Retrieved from,
http://www.cjlt.ca/index.php/cjlt/article/view/80/75.
Shapley, K., Sheehan, D., Maloney, C., & Caranikas-Walker, F. (2009). Evaluation of the
Texas Technology Immersion Pilot: Final outcomes for a four-year study (200405 to
200708). Austin, TX: Texas Center for Educational Research.
Spires, H., Wiebe, E., Young, C., Hollebrands, K., & Lee, J. (2012). Toward a new learning
ecology: Professional development in 1:1 learning environments. CITE Journal,
12(2), 232-254.
Strauss, A., & Corbin, J. (1990). Basics of qualitative research: Grounded theory procedures and
techniques. Newbury Park, CA: Sage Publications.
Warschauer, M. (2006). Laptops and literacy: Learning in the wireless classroom. New York,
NY: Teachers College Press.
Weston, M. E., & Bain, A. (2010). The end of techno-critique: The naked truth about one-
to-one laptop initiatives and educational change. Journal of Technology, Learning,
and Assessment, 9(6). Retrieved from
https://ejournals.bc.edu/ojs/index.php/jtla/article/view/1611
Yin, R. K. (2012). Applications of case study research (3rd ed.). Thousand Oaks, CA: Sage
Publications.
Zheng, B., Arada, K., Nilya, M. & Warschauer, M. (2014). One-to-one laptops in K-12
classrooms: Voices of students. Pedagogies: An International Journal 9(4), 279-299.
Zucker, A. A. (2004). Developing a research agenda for ubiquitous computing in schools.
Journal for Educational Computing Research. 30(4), 371-386. Retrieved from
http://www.ubiqcomputing.org/
Zucker, A., & Light, D. (2009). Laptop programs for students. Science, 323(5910), 82-85.
Rogerio L. Roth
Ca' Foscari University of Venice
Venice, Italy
Looking to the future: Breaking the links with the recent past
This is not a clich, or even the Back to the Future trilogy of science fiction
adventure films written by Bob Gale and Robert Zemeckis, but to rethink
education in terms of current and future technological possibilities involves
experimentation, practice and feeling. Where to go?
Given the diversity of scenarios and options free or paid, open or proprietary,
local or cloud, domestic or foreign the decision-making process should take
into account something more than just the omnipresent costs. Items such as
security and privacy of information should be considered essential.
Many prominent people are recognized more for their eventual errors and
failures than by their great achievements. It is not easy to predict the future with
100 percent certainty. What to say when the bets are related to the future of the
education area, so resilient, tough, conservative and averse to changes...
The recent past has brought us a virtual massification of academy, often without
any quality or even interaction that should be mandatory in times of Web 2.0.
This paper is part of the results from the research Building an Immersive
Distance Learning Experience beyond Massive Open Online Courses with Web
Conferencing, Socratic Method, Problem-Based Learning and Social Networks
funded by the CAPES foundation, Ministry of Education, Brazil.
Security, privacy, and responsibility are themes that consistently and recurringly
are brought to the forefront reported here to the different Internet uses.
Several universities and students do not see limits, to expose themselves
(oversharing) on social networks. Likewise, it seems to lack common sense in
adopting different service models offered in the cloud computing, as well as
Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a
service (SaaS) solutions such as Google Apps. Some services apparently are free
of charge, but there is always a price to pay for everything.
For many decades now, Microsoft has been criticized for its predatory
monopolistic practices. Google is currently under the spotlight as well.
On the April 1, 2014 the Gmail email service (Google Mail) completed 10 years
(Gmail, 2004), (Gmail, 2014). The date always refers to the celebration of
April Fools' Day, sometimes called All Fools' Day especially in Australia,
Brazil, Canada, United States and Europe (April Fools' Day, 2013).
For Brazilians, the April 1 has several interpretations, it also reminds the military
revolution that occurred on this day in 1964 and the harsh years that followed.
Interventions such as this are typical of the technique of a coup d'tat, that the
CIA has developed and applied in Brazil, artificially radicalizing the social
struggles to the point of causing the imbalance in the political and destabilize
governments (spooling actions), who did not submit to the strategic guidelines
of the United States who deny responsibility and complicity with the coup
(plausible denial), standard by which American governments was characterized
many times their intervention policies in other countries (Bandeira, 2004).
Friday, April 3, 1964 12:06 p.m. Thomas Mann: I hope you're as happy about
Brazil as I am. Lyndon B. Johnson: I am. I think thats the most important thing
that's happened in the hemisphere in three years. Lyndon B. Johnson: I hope
they give us some credit, instead of hell. (Beschloss, 1997).
Interpretations and historical events aside, we all (Gmail users) can be victims of
this stigma.
Are we fools to use the Gmail and its associated tools from Google?
What is the price we pay for the use of these free of charge offers?
Ribble (2014) states that, Gmail was not the first of its kind. In fact, it was a
relative latecomer to the webmail party. Gmail's objective was not to create a
totally new way of communicating, but to make radical improvements to the
existing webmail model. And the last ten years leave little doubt that they've
succeeded.
The document came to light at a time when Google and other technology
companies (AOL, Apple, Facebook, Microsoft, Paltalk, Skype, Yahoo and
YouTube) try to explain the role they play in mass surveillance practiced by the
National Security Agency (NSA) over citizens of the United States and
foreigners (governments, authorities and citizens) of several friendly countries,
including France, Germany, Spain and Brazil.
Snowden (2014) said (00:03:46,445 00:03:59,131): Every time you pick up the
phone, dial a number, write an email, make a purchase, travel on the bus
carrying a cell phone, swipe a card somewhere, you leave a trace and the
government has decided that it's a good idea to collect it all, everything, even if
you've never been suspected of any crime. (Snowden Interview, 2014).
No new information. Snowden just proved what we all, in some way, already
knew that the control and manipulation of information have been used (by all
parties) not only in times of declared war to change public opinion, to support
certain actions of the rulers or even to contain the resilient and politically
incorrect through the eyes of the dominant power.
This kind of control that not just Google does seems to be meaningless for
those who already transformed their life (personal/institutional) in an open
book, updated and exposed 24 hours a day (Twitter/Facebook) in a sort of Big
Brother (reality show). Probably, in search of their fifteen minutes of fame
(Warhol, 1967)...
Google or any other service provider paid or free of charge cannot be our
PlexPad, not now; much less in the future (2149), (Terra Nova Marshall &
Gaviola, 2011).
The year 2014 was prodigal in examples of lack of privacy and security for both
users and institutions, including the lack of digital literacy. The incident of
August the biggest scandal of celebrity photo leaks already occurred exposed
a security hole of the Apple's iCloud service (2014 celebrity, 2014).
Our lives can not be fully exposed and/or dependent on a single supplier.
That way we will be allowing connections between the various services and
providing more information than necessary both for those hosts as well as for
our personal and professional contacts. Also, we are going to be hostages of a
particular company under a certain government or country and its policies,
economic interests and technological failures.
Eventually everything that goes to the cloud may be lost or even accessed by
other people. If certain information is sensitive, secret or even intimate, the
Internet and the vast majority of their gratis or paid services is certainly not the
best place to store them. After all, nothing is forever. Google also taught us this.
On Tuesday, September 30, 2014, the chronicle of a death foretold finally came
true: Orkut is over (Orkut, 2014), (Orkut Archive, 2014).
critics of NSA surveillance do not appear to be calling for an end to Google and
Facebook.
This business model searches not only the destruction of privacy but also the
end of anonymity and the end of freedom of opinion without reprisals.
Who should not, does not fear? Who should not, should fear yes, and with good
reason...
WikiLeaks founder, Julian Assange, himself is the victim of the system, in the
same way as all those who try to challenge the constructed and manipulated
truths, that subsequently have become definitive and unquestionable evidences
(WikiLeaks, 2011).
But what options are available? Fance (2013) recognizes that Gmail can be one of
the most popular services, but there are many people who feel that it is far from
being the best. She cites some problems and points out how the most important
justification is the fact of the Google scans each email message that is sent and
received. This is done so that advertisers can better target users and display ads
that are more relevant to them although from a Gmail users standpoint, this is
considered an invasion of privacy.
If, for these reasons or any other someone wishes to stay away from
Gmail/Google or simply wants to try something new, she lists ten major
alternatives: Hushmail, Zoho, Mail.com, Outlook.com (replaced Hotmail), GMX,
Facebook, Inbox.com, Yandex, Shortmail and Yahoo Mail.
There are many other options in almost every country the Internet is a sea of
possibilities and the major players seem to have servers located in the United
States, China and Russia. On Wikipedia, for example, there is an extensive
compilation and comparison of providers (webmail providers, 2014).
Some people or institutions may want to not rely on Russian or Chinese services
for several reasons. But what is the difference among staying under the
surveillance of a Big Brother (Orwellian) American, Chinese, Russian, or any
other controller?
This text does not intend or even has the pretense of showing anti-Russian, anti-
American or anti any other country. Nothing is intended against or in favor of
any party. It only reflects the absurdities to which all were thrown, implicitly or
explicitly, after Second World War, during the Cold War and the ideological-
political bipolarization. What we thought we had stayed in the past seems more
alive than ever.
Impossible not to relate the current ubiquitous and pervasive practices to the
dystopian novel 1984 (Nineteen Eighty-Four, 2010) written in 1949 by Eric
Arthur Blair, or rather by his pseudonym George Orwell. The pseudonym has
always been one of the forms of anonymity.
Wilde (1891) through an assay and using a Socratic dialogue, stated that: Life
imitates art far more than art imitates life. The Orwellian nightmare comes true.
How can we distinguish current practices to those verified in the middle ages?
In a way, we live in a new holy inquisition, and witch hunts... Any difference
even among the contemporary practices of the Gestapo, Kempeitai, NKVD,
Stasi, SAVAK, KGB, MSE, FSB, OSS, DOPS, CIA, Mossad and similars?
The new heretics accused of heresy, piracy or terrorism remain being all who
are contrary to the established dogmas, those who question certain truths,
considered as indisputable created without evidence, logic or moral use or
even those who oppose to the opinions determined by certain dominant groups.
No one is discordant in itself, and any founder or participant in any practice or
behaviour that may be considered divergent in a given historical period and
social reality nothing more is than someone who, from his own point of view,
believed that he was moving in the correct path. The heterodox is classified this
way just because someone invested with some sort of institutional power, rated
its practice or its ideas as dissonant and contrary to an official orthodoxy that if
self considers as the correct path (Barros, 2008, p. 125).
There are no eternal facts, as there are no absolute truths (Nietzsche, 1908, p. 22).
Both science, law and history are made of transitional truths. There are no
thorough truths in every area of human knowledge, in constantly evolving,
much less in our official story, the manipulated version of the facts that goes
to the books.
After all, the paper accepts everything and who writes, defines, govern or even
judges do it according to his own bias of life, including his own prejudices as
well as the maintenance and commitment to the current situation.
Galileo Galilei (2007) would have certainly divergent opinion about inquisitorial
courts. The reality that prevails corrupts and marginalizes those who oppose the
established truth, through the fear of rejection or ridicule, which makes many
thinkers to remain hidden.
Many actions of certain groups which, without options, try to survive the
extermination what is imposed on them and the occupation of their territories
real or virtual are erroneously classified as terrorists. This never can be
compared with the widespread raids against civilian populations that began in
Second World War and culminated with the attack with nuclear bombs on
Hiroshima and Nagasaki (August 6 and 9, 1945). We have lost the moral.
The true terror remains the actions of powerful states, primitive, warlike and
pre-historic imperialisms; that have not learned lessons from the mistakes of the
past and insist through a path unilaterally imagined in denying the right to
self-determination of peoples, as well as impose their vision of the world to
other cultures, most of the time ignoring the cultural diversity and ethnic
minorities.
On the Internet we can see that the attacks are not limited to strategic targets.
In the case of Google actions, they are generalized. Beyond the control of the
email contents we can realize an insistent and resilient way to induce and/or
require the identification that matches completely to the policies adopted by this
company which, often, is not shy to request additional information another e-
mail, cell phone to connect the dots. Consequently, it became a common
practice, including banks, sending codes via SMS to confirm operations, as if cell
phones could not be stolen. On the contrary, mobile phones can identify the
exact location of the user or anyone who uses his phone.
Remoaldo (1998) points out that anonymity has always been an important
feature of society. The need for its existence has been demonstrated over the
years. It has been of great value to dissidents in countries with little or no
freedom of expression, for the victims of violation and for people who might
want to share their experiences without revealing their true identity. Without
anonymity, these actions could result in the silencing of these people through
censorship, physical aggression, loss of job, legal processes or even through
murder.
Many countries allow citizens to hide their identity as part of the right to
privacy, since the acts are not considered illegal. Yet even this concept of legality
varies according to a particular era or social situation (Anonymity, 2011).
Wikipedia, for example, is written collaboratively mainly by authors who use
unidentifiable pseudonyms or use only their IP address, some might even use
identifiable pseudonyms or their real name (Wikipedia: Anonymity, 2014).
The actions of Big Brother (Orwellian) can reach everyone and the current
distrust of solutions providers on the Internet entails further the desire to remain
anonymous. The full anonymity on the Internet is possible but not always
Identity masking services such as Deep Web (Tor, Freenet, I2P and others like
Morphmix/Tarzan, Mixminion/Mixmaster, JAP, MUTE/AntsP2P and
Haystack) hinder tracing, by using technologies of distributed computing and
encryption (Deep Web, 2008), (Tor Project, 2002), (Freenet Project, 2000),
(I2P, 2003). Another possibility is the use of a Virtual Private Network
(VPN, 2013).
Hoffman (2012) says that: All the major search engines track your search
history and build profiles on you, serving different results based on your search
history. He suggests five alternative search engines for those who are tired of
being tracked: DuckDuckGo, Ixquick's Startpage, Ixquick, Blekko and
Ask.com/AskEraser. He also reminds us that, to surf anonymously everywhere
with slower browsing speed the best option is the Tor browser.
The SlashGeek (Anonymous, 2012) recommends that not be used only the Tor
(previously an acronym for The Onion Router). It indicates as the best choice to
associate Tor with VPN: You-Tor-VPN or even You-VPN-Tor. Gives tips about
VPNs, points out that the Google search engine should not be used and indicates
the Firefox as the best browser (with the extensions Ghostery, NoScript and
Adblock Plus).
Proxy servers can also be used (Proxy, 2010). There are different levels of
proxy (web, caching, reverse, transparent, etc.) with different levels of protection
and anonymity enough to bypass the restrictions of websites even in countries
where the Internet is censored or wars occur, to report the latest developments.
These technologies allow the traffic to pass through another computer before
communicating with the recipient, a different user's IP address.
The Lizard Squad, group that presented itself as responsible for Christmas
attacks (2014) to PlayStation Network and Xbox Live above all did so to
demonstrate the incompetence of Sony and Microsoft to avoid these attacks
(Pilkington, 2014).
With the attack on the Tor, anonymous Internet service, the Lizard Squad
(@LizardMafia) attracted even the wrath of Anonymous (@YourAnonNews)
whose only concern is the privacy made possible by the Tor, which is used by
people around the world to navigate and communicate without having anyone
else lurking their private activities (Smith, 2014), (Arce, 2014).
The Tor project is one of the most effective sites for encrypted communication,
becoming one of the most important Internet services in the world.
Whistleblowers like Edward Snowden has used the service as well as many
dissident movements and users who are under the control of information
from countries such as China, North Korea, Cuba, Egypt, Iran, Russia and
Venezuela. Without wishing to create an axis of evil, where we are free?
The Americans and not only them should seriously consider its use.
Trojan Horse
In October 2006, Google allowed educational institutions to use the Google Apps
service, which is now called Google Apps for Education (Google for
Education, 2015), formerly Google Apps Education Edition. Google Apps for
Education (Apps for Education, 2015) is free of charge and offers the same
storage space that Google Apps for Work (Apps for Work, 2006), formerly
Google Apps for Business. Seems to be an offer they could not refuse. But, even
the success stories multiply; there has not been unanimity among the
universities, even among the Americans (Whittaker, 2010).
In the European Union (currently, 2015) checks are in progress to legally allow
access to users' privacy and the right to be forgotten a process that began in
2010 in Spain as well as Google's business separation. All try curb the
company's dominance in the Internet search market (Fioretti, 2014), (European
Commission, 2014). Recurring issues of (lack of) privacy comes at a time when
the company Google is also fighting for four years against an antitrust
investigation (European Commission, 2010).
Starting in the academic year 2008/09, Ca' Foscari (UNIVE) began using Google
services, starting with Gmail by shifting the MX record of domain unive.it:
This initiative is initially observed in Ca' Foscari (2008, 26) (translated): email
@stud.unive.it Starting from the academic year 2008/09 for all students has
been prepared a mail box identified by registration@stud.unive.it. The mailbox,
hosted by Google, has more than 7 GB of disk space. The initiative aims to
improve the quality of communications to students, and from these to the
University. Later in Ca' Foscari (2012, 55) there is a reference (translated): It is
also expected that the migration to Google Apps for Education can encounter
Both Google, Moodle and Apple do not charge (directly) the use of their
platforms by universities. But one day the invoice may arrive.
Currently (academic year 2014/15), all Google Apps for Education services are
available to faculty, staff, researchers (username@unive.it) and to students
(registration@stud.unive.it). The authentication system of the University
(translated): To professors, employees, and researchers the email
username@unive.it associated with the services Google Apps for Education; to
students the email registration@stud.unive.it associated with the services Google
Apps for Education; (autenticazione di Ateneo, 2015): Warning: although
the new mail box is hosted by the Google operator is accessible exclusively by
web address http://mail.stud.unive.it and not via www.gmail.com
(translated), (account di posta studenti, 2015).
However the emails are explicitly exposed on the UNIVE website, ignoring the
risks involved and abstaining from using, for example, JavaScript or images.
Piotto (2014) said: Use image instead since text email is forbidden by Italian law
(legge Stanca 17/01/2004 about public administration sites accessibility). Use
text like [dot] [it] or _AT_ help spammers (see http://techie-
buzz.com/featured/tips-to-tackle-email-harvesting-spam.html). Use complex
system like captcha, JavaScript, etc... help us to prevent spam but block Google
indexing and reduce site's usability. We are a public service, @unive.it isn't a
personal email (if you want a personal email use @gmail.com), our first goal is
help students and users to find us (Google indexing is necessity, not a problem),
no matter if we receive spam.
This position is simply absurd, and the same can be said with respect to all the
arguments offered as a reason to not protect the emails. Currently all @unive.it
accounts receive a reasonable amount of spams, higher than the verified in
normal Gmail accounts already included in lists of spammers. This is due
mainly for sewing the email lists to people from academic institutions (internal
and external clients) that are made through offers sent to all account holders.
I'm not referring to the absurd mailing lists (CIdE) that are created internally
and, as always, shoot first, ask questions later (Mailing List CIdE, 2015).
The UNIVE, on the flip side, provides a proxy server (Proxy Settings, 2015),
proxy.unive.it (157.138.1.34:3128) that allows access to internal services as if we
are within the internal network, which includes email and thus omit the
location.
The security issue also calls for proper attention and information from
professors to students at all levels in exposing and demonstrating the risks as
well as suggest alternatives not only with regard to the overexposure.
Diversifying the options we will be collaborating to create a society digitally a
little more safe and just.
The Russia's foreign minister, Sergei Lavrov, said at the UN that no one has a
monopoly on truth and no one is now capable of tailoring global and regional
processes to their own needs. (Lavrov, 2014). This is a correct and consistent
statement albeit absurd, coming from Russia, who practices the opposite of
speech, and recurrently, in the cases of Ukraine, Georgia and Moldova.
Angela Merkel (Germany) and Dilma Rousseff (Brazil) would have been only
two, of the 35 world leaders monitored by the NSA (Rawlinson, 2013), (Global
surveillance, 2013). According to Aymone (2014), provided that the complaints
have been proven many Brazilian federal public universities have adopted
various new safety standards, among them the use of own email servers,
something that the majority of them had already made.
The information leaks are not something inherent to the Internet or use of
computers. It has always existed. And were not just spies of the enemy
photographing secret documents. Most of the time it's friendly fire and the
problem is at home the leaks mostly originate from within the institutions. We
slept with the enemy or heroes, depending on the observer's point of view...
Scanning only made things easier and faster. And the Internet allowed for
greater disclosure, that is, more people have access to information.
Secret information must, as its name implies, be kept secret. In the case of emails,
the biggest problem is what we write and for whom. Unlike spoken words (that
can be recorded) emails are written and identify (digitally) the origin and
destination. They can and are used as evidence, even after our own death (e.g.
Steve Jobs), (Ames, 2014).
A given message will be stored at least in two places: on the sender and on the
receiver. Where both sides keep copies of sent and received messages on their
personal equipment as well as on their servers (cloud) the same message will be,
at least, in four places. That is, it is sufficient to invade or have access to only one
of the options to take ownership of all content, something that not just the NSA
makes with perfection.
There are several technologies to improve the security level of messages sent as
the encryption and the use of certificates. But nothing is perfect. Just a password
that is easy to break in order for this data to be accessed by anyone. The main
thing is to use common sense in the contents and, even with respect to private
messages, keep in mind that eventually the text will be accessed by others, even
unauthorized, which may make different use of the information, including
against us.
The issue of security, for universities, should not be restricted to emails and own
servers. To Roth (2014), should be assessed what options are available free of
charge at this time and it would be both technically and pedagogically usable.
The focus would not be to fall into the discussion paid vs. free, but to speak out
on issues such as security and privacy. Given the current quality of free options
(such as Google's package), it is an irresistible appeal to institutions, public
and/or private, in lean times.
The end of anonymity, for example, does not mean any guarantee of the end of
inappropriate content publication (Blum, 2014).
The Brazilian Civil Rights Framework for the Internet officially Law No 12.965,
of April 23, 2014 also guarantees the freedom of expression, but registers the
possibility of compensation when there is a violation of the intimacy and private
life (Civil Rights Framework, 2014). Moody (2011) described the regulatory
Framework as a law anti-ACTA, in reference to the Anti-Counterfeiting Trade
Agreement, widely criticized for restricting the freedom on the Internet and that
was rejected by the European Union. Tim Berners-Lee, inventor of the World
Wide Web, called it a fantastic example of how governments can play a positive
role in advancing web rights and keeping the web open and called for other
countries to follow suit of Brazil (McCarthy, 2014).
The Internet is a reflection of the imperfect world in which we live and it has its
good and bad points depending on how we use it. We can observe practices that
may be, at the same time, considered right or wrong, depending on who the
judges (status quo). Countries such as China, North Korea and Cuba, among
others, are criticized by the second largest democracy in the world (USA) with
regard to the control what they do about Internet access.
Which country does not do the same (and not just on the Internet)?
Wong (2013) compares the Chinese appropriation of western culture and the
construction in the western imaginary of a China that represents the
quintessential mimicry. She reveals that, the copy as learning method, common
in arts academies worldwide, is part of Chinese culture and its pedagogy, linked
to the thought of Confucius, to whom the copy is an exercise in humility. In
2004, responding to allegations of copyright violations, China's government
argued that, thanks to the imitation skills of artists from Dafen (Shenzhen),
consumers around the planet could have access to the world of great art.
This point of view can be extrapolated to music and books. But why not apply
this also to education, so that more people have access?
After all there are several other ways to share content, with greater or lesser
exposure as well as the commitment of those who intend to do.
The cases of Napster, Megaupload and The Pirate Bay are exemplary. After
these services have been withdrawn from the air, the options clones or similar
ones have multiplied exponentially. In times of shared economy the solution to
the problem does not pass by this way: prohibit, prosecute and punish...
The history has shown us that certain actions and/or positionings have different
interpretations over time. We should learn more from our mistakes than from
our accidental successes. There are notorious examples proving the opposite, full
of discrimination of the most varied types: social class, belief, skin color, creed,
disability, ethnicity, age, education, nationality, sexual orientation, political
opinion, national origin, race, religion, sex or any other type. In the past, and
occasionally nowadays, the discrimination was something explicit. In these
politically correct times discrimination follows other models. Many people have
already been barred or even lost jobs for them being exposed in social networks:
their opinions, their preferences, their friends, their followers.
The new generation are born under the illusion that there's freedom at least on
the Internet and there is no dominant feeling in them, of doing something
wrong, with respect to the information and data sharing, whether simple
personal photos as well as music, movies and books of third parties.
Considering that they are the future and who controls the world is always a
dated issue we all have a life limit this difficulty will soon be outdated.
The copy path as learning method can not be restricted to art schools
(worldwide) nor be seen in a discriminatory manner as happens currently
against the Chinese, in the same way as happened with the Japanese after the
Second World War. Both gave us lessons that the copy process always has a cost
and there always occurs some appropriation of content by who performs...
Does not fit here discuss the rights of the author or copy, but if a particular work
is displayed to the public, that is, was exposed, published, rented or even sold
there is no way to prevent, in practice, that people to do records (photos, audio,
video, paper copies, etc.) and then display them and/or share. It is impossible
and there is no Big Brother (Orwellian) that can contain this tsunami due to the
omnipresence of photo and video cameras in mobile phones.
One can only try, but this is and will always be a losing battle.
Streisand effect
On November 21, 2014 a self-titled group Guardians of Peace or GOP would
have hacked the servers of Sony Pictures, blocking all computers, blacking out
the company's website, besides stealing files and leaking unpublished movies
(Sony hack, 2014).
Could have been the North Koreans? Yes, in the same way that, could be the
Chinese, Russians, Iranians, Japanese, Europeans, Americans (northern, central
or southern), or Sony's own staff. The pseudo-defenders of freedom of
expression and privacy exist everywhere.
The stronger evidence of the authorship of the attack would be the fact for
North Korea to have a reason to attack the Sony Pictures: the movie The
Interview, a bad taste comedy from Sony about the fictional assassination of the
North Korean Supreme Leader, Kim Jong-un (Roger & Goldberg, 2014).
If Sony was again the victim of the enemy hidden (or declared) maybe we never
have all the answers. Could have been a marketing action (internal) or the work
of friendly fire (Lena), after all the repeated attacks to the Sony's structure has
gotten a seemingly easy success.
All that the Guardians of Peace obtained in relation to threats to suspend the
release of the movie was to make the even much more commented than would
normally be, that is, the Streisand effect. It is an Internet phenomenon where an
attempt to censor or remove any kind of information turns against the censor,
resulting in the vast replication (Streisand effect, 2007).
It is very likely that the movie The Interview would have been unnoticed, were
it not for all the controversy that surrounded it. According Chedin (2014) and
Spargo (2014), there are reasons to suspect this story which points the
involvement of North Korea, or even exemption from Sony.
cinema, notably the IMDb, and rated a perfect 10 to the movie, even before
watching it (IMDb, 2014), (Savov, 2014).
They even went as far (Barack Obama) as to suggest the movie be nominated for
an Oscar! (Maddocks, 2014).
The same movie that is featured in the race for the Golden Raspberry Awards
(Kreps, 2015), which honors the worst productions of the year (2014) of
American cinema.
If the movie is good or not, depends on the personal taste of each one of us.
With much good will, protest and everything else, Chedin (2014) asserts that the
movie does not deserve even half of it. It is possible, but better not to rely on
critics in the same way that we should not trust politicians, researchers and
exempt historians.
The Sony's profits are probably being larger than normally would have been
under standard conditions for temperature and pressure. Only at the premiere
weekend were about $18 million, of which $15 million would be from online
sales (Baker & Milliken, 2014) the film was released simultaneously in several
streaming services such as YouTube, Google Play, Xbox Videos and Kernel.
According to Sony, just in this period the movie had been purchased or rented
online more than 2 million times (Baker, 2014), becomes the largest Sony
Pictures online movie of all time.
Between December 24 and January 4, this number rose to more than 4.3 million
times, having raised more than $31 million from online, cable and telecoms sales.
In addition, the film has earned $5 million at the theatrical box office, with 580
independent theaters showing the movie in North America (Sinha-Roy, 2015).
To what extent has Sony learned from the mistakes of the past and can be held
harmless in the process? That is, put sensitive information on a server which
can be accessed via the Internet does not refer to the rereading of an antecedent
trap, in Pearl Harbor-style (Japan Questions, 2008) when all the Americans
aircraft carriers of the Pacific fleet had already abandoned the port, leaving only
the battleships, almost all old and outdated to achieve our true purposes?
The results, after the release of the film, has been so significant that, probably,
the ports of Sony's servers will be open to the future invasions.
It costs much less to promote the new releases and profits online are immediate.
In the past the U.S. also accused China of cyber spying, without evidence, and a
U.S. official said the attack on Sony could have used Chinese servers to mask
its origin (Wroughton & Rajagopalan, 2014).
Could have used is an inaccurate, partial and biased statement. Suspicion and
investigate evidence is something normal. Disclose this information before to
prove something is irresponsible. Call a spade a spade, with impartiality and
without compromise, is another story.
This recurrent modus-operandi always refers to the argument used, for example,
with respect to the alleged large hidden reserves of mass destruction weapons in
Iraq...
The American agencies of intelligence CIA (Iraq) and the FBI (Sony) are so
discredited that their information should always be interpreted to the contrary.
Something like the weather forecast: we would make fewer mistakes
Since the early years of the twentieth century we witness tampering, denial,
creation or even the imposition of versions considered historical episodes as
Holodomor, Katyn massacre, attack on Pearl Harbor, Holocaust, murder of John
F. Kennedy, September 11 attacks, weapons of mass destruction of Saddam
Hussein, Guantnamo Bay Detention Camp, etc. The list is not intended to be
exhaustive nor exclusive of any country.
Conspiracy theories? Perhaps they could be considered that, but this does not
mean that the huge list of evidence and proof of unofficial versions are lies
(American False Flag Operations, 2015), (Sutton, 2001), (Sutton, 2000).
The official story hardly reflects the real history what really happened it is
always distorted by the bias of one who tells or is obliged to narrate.
We can not change the past, but we should at least try to correct our mistakes
including the official versions of the history and, as far as possible, not
repeat them.
If the year 2014 brought hope to Cuba, it also proved that this country and not
only remains limiting and chasing the freedom of opinion.
Faced with an inert United Nations due to the limits of power and facing a
security council that does not allow the positioning of the majority, we see the
resurgence of conflicts in all continents and we are witnessing the rebirth of a
new cold war in Europe.
This security council whose five permanent members (who have veto power)
are the same as, currently, they practice the worst atrocities and crimes against
humanity without any punishment, because they consider themselves above
the law that they have created for others: China (Tibet), France (Libya), Russia
(Ukraine), United Kingdom (Argentina) and United States (Iraq).
In addition, we watched transfixed, the eternal victim of the Second World War
(Israel) does not shirk from applying these days (with evidence) against
Palestine the same crimes and persecutions which alleged that they had been
victims in the past (without proof).
The truths created (lies) against Ukraine and its heroes (1942-1956) are repeated
nowadays (2013-2015), (Stopfake, 2014), distorting the historical role of
nationalists as Stepan Andriyovych Bandera (Stepan Bandera, 2010) and his
current followers, as well as the Ukrainian Insurgent Army (UPA, 2007) and
all tragic events that followed the Euromaidan (Euromaidan, 2013), which
began on the night of 21 November 2013 with public protests in Maidan
Nezalezhnosti (Independence Square) in Kiev, demanding closer European
integration. All in the hope of creating an independent Ukrainian state, and now
fully integrated into the European Union.
And as in any military conflict, gives rise to the propaganda war. Given the
manipulation of the news by Russian or pro-Russian agencies many reversing
totally the sense of what happens we highlight the blog Ukraine in Africa
(Ucrnia em frica, 2015), one of the best exempt sources of information about
the absurdities that happen in this European country.
Conclusion
The episodes cited bring lessons in all senses of interpretation.
The year 2015 will be just another in that world powers will show their inability
to resolve many major crises. The next president of the United States will have to
work out if there is a middle way between the imprudences of George W. Bush
and the retraction of Barack Obama. The European Union will have to decide if
it wants to stick at its current borders or whether it will allow the entry of
Ukraine and Turkey. The upsurge of tensions will be considered by the West as
Russia's fault. Vladimir Putin, in turn, will blame the West, while encouraging
Russians to turn inwards, away from the malign influence of foreigners. China
should use its new leverage to push harder for a stake in global internet
governance. The Big Brother (Orwellian) may become the whole world (Ahmed,
Doucet, Gracie, Kendall & Mardell, 2015).
The attack occurred in France (Charlie Hebdo) on January 7, 2015 in the event
of confirming evidence that the murderers are Muslim terrorists indirectly may
introduce more difficulties for Turkey, besides favoring the current racist
offensive in Europe (Schofield, 2015). Probably on the day that all the much-
vaunted freedoms (expression, opinion, religion and manifestation) keep
distances and ethical boundaries between themselves politically correct, and
contemporary be possible to obtain a suitable solution to all issues involving
not only the complex religious world, without running the risk of messing with
existing passions when it comes to faith, whatever it may be.
The history of Europe was a long blood-filled drama full of wars, conflicts,
revolutions, plagues, discriminations, enforced migrations, coups and
catastrophes the majority of these events related to religion or to different
visions and religious options. In name of god we remain watching the most
resilient and regrettable episodes.
It's not time to repeat history. It's time to make history (#McLaren Honda).
In the same way that movie studios can get better financial results through
secure online operations lowest-cost and value to the end consumer than in
movie theaters, should universities ask themselves about the dominant model of
knowledge's sale and bet on innovative online solutions (different from this e-
learning low-quality model that turned massive) and with a new model of
sustainability, without charging customers directly.
The OpenCourseWare have evolved into the Massive Open Online Course and
the irreversible trend is to move towards full university courses, via Internet, in
a safe environment and with guaranteed privacy, with certification and totally
free of charge. It would not be ultimately a way unlike everyone else a
redesign to achieve the beautiful revolutionary, democratic and constitutional
standard of universal, compulsory and free education at all levels, to all
people and without any distinction or discrimination? (Neves, 2003).
The use of free resources available on the Internet is a great asset to all
universities, whether public or private, because theoretically and probably its
use demand less financial resources than would be needed to develop and/or
maintain services and its own structure. However, it is necessary to moderate
the enthusiasm of early adopters and dampen the skepticism with regard to
novelties as well as pass on these benefits in some way to the users and
ensure that they will have security and privacy preserved.
The destruction of privacy widens the existing power imbalance between the
ruling factions and everyone else, leaving the outlook for subject peoples and
oppressed classes, as Orwell wrote, still more hopeless (Assange, 2014).
In the movie Iron Man 3 (Feige & Black, 2013), Tony Stark (Robert Downey Jr.)
quotes a phrase at the beginning and end of the film: We create our own
demons...
The context is different from this paper and much closer to the Europe's strategic
relationship with Russia after the end of the Cold War, but can be applied and
generalized to the extent that, when we bet all our chips on a given market
solution product and/or service, proprietary technology and/or provided by a
single vendor; and hosted in a single country we became hostages of our own
options, or even worse, of the third-party options to whom we entrust our
information on the Internet.
References
2014 celebrity photo hack (2014, September 1). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/2014_celebrity_photo_leaks
Ahmed, K., Doucet, L., Gracie, C., Kendall, B. & Mardell, M. (2015, January 2). What will
the big stories be in 2015? BBC News. Retrieved Jan 3, 2015, from
http://www.bbc.com/news/world-30648444
Ames, M. (2014, March 25). Newly unsealed documents show Steve Jobs brutal
response after getting a Google employee fired. PandoDaily. Retrieved Jan 22,
2015, from http://pando.com/2014/03/25/newly-unsealed-documents-show-
steve-jobs-brutally-callous-response-after-getting-a-google-employee-fired/
Anonabox (2012, January). Retrieved Jan 22, 2015, from https://anonabox.com/
Anonabox: the Tor hardware router (2015, January 7). Retrieved Jan 22, 2015, from
https://www.indiegogo.com/projects/anonabox-the-tor-hardware-router
Anonymity (2011, March 24). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Anonymity
April Fools' Day. (2013, April 4). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/April_Fools%27_Day
Arce, N. (2014, December 27). Anonymous to Lizard Squad: Keep Your Hands off Tor.
Tech Times. Retrieved Jan 22, 2015, from
http://www.techtimes.com/articles/23248/20141227/anonymous-to-lizard-
squad-keep-your-hands-off-tor.htm
Assange, J. (2014, December 4). Who Should Own the Internet? Julian Assange on Living
in a Surveillance Society. The New York Times. Retrieved Dec 16, 2014, from
http://www.nytimes.com/2014/12/04/opinion/julian-assange-on-living-in-a-
surveillance-society.html?_r=0
FBI: North Korea responsible for Sony hack (2014, December 19). NBC2 News. Retrieved
Jan 22, 2015, from http://www.nbc-2.com/story/27671344/fbi-north-korea-
responsible-for-sony-hack#.VKGrZsBA
Feige, K. (Producer), & Black, S. (Director). (2013). Iron Man 3 [Motion Picture]. Burbank,
CA, United States: Marvel Studios & DMG Entertainment
Fioretti, J. (2014, July 24). Google under fire from regulators on EU privacy ruling.
Reuters. Retrieved Dec 10, 2014, from
http://www.reuters.com/article/2014/07/24/us-google-eu-privacy-
idUSKBN0FT1AZ20140724
Galileo Galilei (2007, August 9). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Galileo_Galilei
Gellman, B. & Poitra, L. (2013, June 7). U.S., British intelligence mining data from nine
U.S. Internet companies in broad secret program. The Washington Post.
Retrieved Dec 21, 2014, from
http://www.washingtonpost.com/investigations/us-intelligence-mining-data-
from-nine-us-Internet-companies-in-broad-secret-
program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story.html
Get started with Google Apps for Education (2015). Retrieved Jan 22, 2015, from
https://support.google.com/a/answer/2856827
Global surveillance disclosures (2013present) (2013, August 16). Retrieved Jan 22, 2015,
from
http://en.wikipedia.org/wiki/Global_surveillance_disclosures_(2013%E2%80%
93present)
Google Apps for Work (2006, March 6). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Google_Apps_for_Work
Google for Education: Save time and stay connected (2015). Retrieved Jan 22, 2015, from
https://www.google.com/edu/products/productivity-tools/
Google Launches Gmail, Free Email Service. (2004, March 30). Retrieved Jan 22, 2015,
from http://searchenginewatch.com/sew/news/2065293/google-launches-
gmail-free-email-service
Greenwald, G. (2013, June 6). NSA collecting phone records of millions of Verizon
customers daily. The Guardian. Retrieved Dec 21, 2014, from
http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-
verizon-court-order
Guia de boas prticas em contratao de solues de tecnologia da informao (2012).
Retrieved Jan 22, 2015, from
http://portal2.tcu.gov.br/portal/pls/portal/docs/2511467.PDF
History of American False Flag Operations (2015). 9-11 Review. Retrieved Jan 22, 2015,
from http://www.911review.com/articles/anon/false_flag_perations.html
History of Gmail. (2014, December 3). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/History_of_Gmail
Hoffman, C. (2012, May 9). 5 Alternative Search Engines That Respect Your Privacy.
How-To Geek. Retrieved Jan 4, 2015, from
http://www.howtogeek.com/113513/5-alternative-search-engines-that-respect-
your-privacy/
Holodomor (2010, November 6). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Holodomor
How to be completely Anonymous online (2012, June 15). Retrieved Jan 22, 2015, from
http://www.slashgeek.net/2012/06/15/how-to-be-completely-anonymous-
online
I2P Anonymous Network (2003). Retrieved Jan 22, 2015, from https://geti2p.net/en/
Il sistema di autenticazione di Ateneo (2015). Retrieved Jan 22, 2015, from
http://www.unive.it/nqcontent.cfm?a_id=156283
Informazioni account di posta studenti (2015). Retrieved Jan 22, 2015, from
http://www.unive.it/nqcontent.cfm?a_id=55452
Iraq War (2003, March 20). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Iraq_War
Japan Questions 9/11 and the Global War on Terror (2008, February 2). The Straight
Dope - Fighting Ignorance Since 1973. Retrieved Jan 22, 2015, from
http://boards.straightdope.com/sdmb/showthread.php?t=490675
Katyn massacre (2004, December 16). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Katyn_massacre
Keats, S. & Koshy, E. (2008). The Webs Most Dangerous Search Terms. McAfee, Inc.
Retrieved Jan 22, 2015, from http://promos.mcafee.com/en-
US/PDF/most_dangerous_searchterm_us.pdf
Kremlin security agency to buy typewriters 'to avoid leaks' (2013, July 12). BBC News.
Retrieved Jan 22, 2015, from http://www.bbc.com/news/world-europe-
23282308
Kreps, D. (2015, January 5). 'The Interview,' 'Sex Tape' Lead Razzies' Worst Film
Shortlist. Rolling Stone. Retrieved Jan 22, 2015, from
http://www.rollingstone.com/movies/news/interview-sex-tape-razzies-worst-
film-shortlist-20150105
Lavrov, S. (2014, October 15). No One Has A Monopoly On Truth. Sergey Lavrovs U.N.
Address. Retrieved Jan 22, 2015, from
http://www.informationclearinghouse.info/article39972.htm
Maddocks, P. (2014, December 26). Obama says 'The Interview' should be in Oscar
conversation. Seacoast Online. Retrieved Jan 22, 2015, from
http://www.seacoastonline.com/article/20141226/News/141229425
Mailing List CIdE (2015). Retrieved Jan 22, 2015, from
http://virgo.unive.it/cide/?page_id=1728
Marshall, B. (Writer), & Gaviola, K. (Director). (2011, December 12). Within [Television
series episode]. In Spielberg, S., Braga, B., & Ovitz, M. (Producers), Terra Nova.
Los Angeles, CA: 20th Century Fox Television. Retrieved Oct 20, 2014, from
http://www.springfieldspringfield.co.uk/view_episode_scripts.php?tv-
show=terra-nova&episode=s01e11
McCarthy, K. (2014, April 23). Brazilian president signs Internet civil rights law. The
Register. Retrieved Dec 30, 2014, from
http://www.theregister.co.uk/2014/04/23/new_bill_signed_in_brazil_guarant
eeing_civil_rights_on_internet/
McDougall, P. (2010). Exclusive: Gmail Ditched By Major University. Dark Reading:
Connecting the Information Security Community, May 5. Retrieved Oct 17, 2014,
from http://www.darkreading.com/risk-management/exclusive-gmail-
ditched-by-major-university/d/d-id/1088833?
Moody, G. (2011, October 4). Brazil Drafts An 'Anti-ACTA': A Civil Rights-Based
Framework For The Internet. Techdirt. Retrieved Dec 30, 2014, from
https://www.techdirt.com/articles/20111004/04402516196/brazil-drafts-anti-
acta-civil-rights-based-framework-Internet.shtml
Neves, F. S. (2003, November 29). Propinas, ensino superior pblico, a razo dos
estudantes e a falta dela. Retrieved Nov 30, 2011, from
http://a_verdade_da_mentira.weblog.com.pt/arquivo/040197.html
Nietzsche, F. (1908). Human, all too human; a book for free spirits. Chicago: C. H. Kerr.
Retrieved Dec 20, 2014, from http://hdl.handle.net/2027/mdp.39015003747733
Nineteen Eighty-Four (2010, March 25). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Nineteen_Eighty-Four
Orkut (2014, september 30). Retrieved Sep 30, 2014, from https://www.orkut.com/
Orkut Community Archive (2014, October 1). Retrieved Jan 22, 2015, from
http://orkut.google.com/
Pilkington, E. (2014, December 25). PlayStation and Xbox facing issues after Christmas
Day attack. The Guardian. Retrieved Jan 22, 2015, from
http://www.theguardian.com/technology/2014/dec/25/playstation-xbox-
down-lizard-squad-hack-christmas
Piotto, A. (2014). Internet publication [personal communication]. Message received from
<piotto@unive.it> in April 23.
PRISM (2013, July 4). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29
PROTECT IP Act (2011, May 12). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/PROTECT_IP_Act
Proxy server (2010, August 14). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Proxy_server
Proxy Settings Instructions (2015). Retrieved Jan 22, 2015, from
http://www.unive.it/nqcontent.cfm?a_id=164714
Rajagopalan, M. & Holland, S. (2014, December 22). China condemns cyberattacks, but
says no proof North Korea hacked Sony. Reuters. Retrieved Dec 30, 2014, from
http://www.reuters.com/article/2014/12/22/us-sony-cybersecurity-
idUSKBN0K006U20141222
Rawlinson, K. (2013, October 26). NSA surveillance: Merkel's phone may have been
monitored 'for over 10 years'. The Guardian. Retrieved Jan 22, 2015, from
http://www.theguardian.com/world/2013/oct/26/nsa-surveillance-brazil-
germany-un-resolution
Receiving an SMS from Google (2015). Retrieved Jan 22, 2015, from
https://support.google.com/accounts/answer/3367674?hl=en
Remoaldo, L. (1998). O anonimato na Internet: um direito ou uma ameaa? UP.
Retrieved Dec 23, 2014, from http://paginas.fe.up.pt/~mgi97018/is/anoni.html
Ribble, J. (2014, March 31). Happy 10th Birthday, Gmail! Marketing Cloud. Retrieved
Dec 20, 2014, from http://www.exacttarget.com/blog/happy-10th-birthday-
gmail/
Rogen, S. (Producer), & Goldberg, E. (Director). (2014). The Interview [Motion Picture].
Culver City, CA, United States: Columbia Pictures
Roth, R. (2014). Technology Integration at a Crossroads: Dead End Street or New
Horizons? TOJDEL, 2 (4), 112-140. ISSN 2147-6454. Retrieved Oct 17, 2014, from
http://www.tojdel.net/volume.php?volume=2&issue=4
Rushe, D. (2013, August 15). Google: don't expect privacy when sending to Gmail. The
Guardian. Retrieved Dec 19, 2014, from
http://www.theguardian.com/technology/2013/aug/14/google-gmail-users-
privacy-email-lawsuit
Savov, V. (2014, December 22). The internet decides that The Interview is a perfect
movie. The Verge. Retrieved Jan 22, 2015, from
http://www.theverge.com/2014/12/22/7433229/the-internet-decides-that-the-
interview-is-a-perfect-movie
Schofield, H. (2015, January 7). Charlie Hebdo: Gun attack on French magazine kills 12.
BBC News. Retrieved Jan 22, 2015, from http://www.bbc.com/news/world-
europe-30710883
Sinha-Roy, P. (2015, January 6). Sony's 'The Interview' earns $31 million online, $5
million at theaters. Reuters. Retrieved Jan 22, 2015, from
http://www.reuters.com/article/2015/01/06/us-northkorea-cyberattack-sony-
idUSKBN0KF23L20150106
Smith, D. (2014, December 26). Anonymous To 'Lizard Squad': Stop Attacking Tor.
Business Insider. Retrieved Jan 22, 2015, from
http://www.businessinsider.com/anonymous-to-lizard-squad-stop-attacking-
tor-2014-12
Snowden Interview NDR English (2014, January 26). Retrieved Jan 22, 2015, from
https://archive.org/details/SnowdenInterviewNDREnglish
Snowden, E. (2014, January 26). Interview by H. Seipel. Edward Snowden exklusiv Das
Interview [Television broadcast]. Moscow: Norddeutscher Rundfunk. Retrieved
Dec 21, 2014, from http://www.liveleak.com/view?i=f1d_1390839693
Sony Pictures Entertainment hack (2014, November 21). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Sony_Pictures_Entertainment_hack
Spargo, C. (2014, December 25). North Korea was NOT behind the Sony hack according
to multiple security experts who discredit FBI findings and reveal that a studio
insider named 'Lena' may be responsible. Daily Mail. Retrieved Dec 30, 2014,
from http://www.dailymail.co.uk/news/article-2887081/North-Korea-NOT-
Sony-hack-according-multiple-security-experts-discredit-FBI-findings-reveal-
insider-named-Lena-responsible.html
Stepan Andriyovych Bandera (2010, January 22). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Stepan_Bandera
Stop Online Piracy Act (2011, October 26). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Stop_Online_Piracy_Act
Stopfake.org (2014, March 2). Retrieved Jan 22, 2015, from
http://www.stopfake.org/en/news
Streisand effect (2007, June 15). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Streisand_effect
Sutton, A. C. (2000). Wall Street and the Rise of Hitler. Studies in Reformed Theology.
Retrieved Jan 22, 2015, from http://reformed-
theology.org/html/books/wall_street/index.html
Sutton, A. C. (2001). Wall Street and the Bolshevik Revolution. Studies in Reformed
Theology. Retrieved Jan 22, 2015, from http://reformed-
theology.org/html/books/bolshevik_revolution/index.html
The Freenet Project (2000, March). Retrieved Jan 22, 2015, from
https://freenetproject.org/
The Interview (2014). The Internet Movie Database (IMDb). Retrieved Jan 22, 2015, from
http://www.imdb.com/title/tt2788710/
Tor Project: Anonymity Online (2002, September 20). Retrieved Jan 22, 2015, from
https://www.torproject.org/
Ucrnia em frica (2015). Retrieved Jan 22, 2015, from http://ucrania-
mozambique.blogspot.com/
Ukrainian Insurgent Army (2007, December 18). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Ukrainian_Insurgent_Army
Virtual private network (2013, February 2). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Virtual_private_network
Warhol, A. (1967, October 13). Sculpture: Master of the Monumentalists. Time, 90, 80-86.
Retrieved Dec 24, 2014, from
http://content.time.com/time/magazine/article/0,9171,837402,00.html
Whittaker, Z. (2010, May 7). UC Davis scraps Gmail pilot: Privacy levels unacceptable.
ZDNet, iGeneration. ZDNet. Retrieved Dec 23, 2014, from
http://www.zdnet.com/article/uc-davis-scraps-gmail-pilot-privacy-levels-
unacceptable/
WikiLeaks (2006, December). Retrieved Jan 22, 2015, from https://wikileaks.org/
WikiLeaks: Secrets and Lies. (2011, November 30). Retrieved Jan 22, 2015, from
https://wikileaks.org/Guardian-s-WikiLeaks-Secrets-and.html
Wikipedia: Anonymity (2014, December 11). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/Wikipedia:Anonymity
Wilde, O. (1891). The Decay of Lying: An Observation. London: Oneworld Classics.
Retrieved Dec 20, 2014, from http://www.online-literature.com/wilde/1307/
Williams, P. (2014, December 18). North Korea Behind Sony Hack: U.S. Officials. NBC
News. Retrieved Jan 22, 2015, from http://www.nbcnews.com/storyline/sony-
hack/north-korea-behind-sony-hack-u-s-officials-n270451
Wong W. (2013). Van Gogh on Demand: China and the Readymade. Chicago: University
of Chicago Press. 320 p. ISBN: 0-226-02489-X
Wroughton, L. & Rajagopalan M. (2014, December 23). Internet outage seen in N. Korea
amid U.S. hacking dispute. Reuters. Retrieved Jan 22, 2015, from
http://in.reuters.com/article/2014/12/22/china-usa-cybersecurity-
idINKBN0K004G20141222
XKeyscore (2013, July 31). Retrieved Jan 22, 2015, from
http://en.wikipedia.org/wiki/XKeyscore
Introduction
Today social Webs emergence has come to play an important role in education.
It is in a core position in the development of students as the paradigmatic
laboratory supporting the learning processes where the students are
immersed. The socio-constructivist theories laid by Dewey, Piaget, Vygotsky
and Bruner (Bruner, 1966, 1977; Dewey, 1916; Piaget, 1971; Vygotsky, 1978)
support the contemporary e-social constructivism (Salmons, 2009), the
collaborative e-learning principles and the co-construction of knowledge when
social software mediates the learners interaction. Currently educational
practices with social software supporting teaching and learning activities are
increasing (Zhu, 2013). In Cuba, the demand for the use of social software for
Method
Design of the study
This research involves an intervention study of using OTDs among 4th year
bachelor students in Information Sciences during the 2010-2011 academic year at
UCLV in Cuba. Before the start of the intervention, a survey was administered,
including three measurement scales: students current social network
relationships, preferred social network relationships and views on collaborative
learning. These quantitative data were analysed through descriptive statistics
and SNA (Butts, 2008). The students were involved in OTD learning activities for
the course of Programming Technologies during one semester. After the
intervention of one semester, a questionnaire was administered to measure
students views of the OTD and perceived effectiveness of OTD. The OTD
activities were analysed with SNA and content analysis.
Participants
Participants of this study were 21 students who attended the course of
Programming Technologies in Information Sciences (IS) at the Faculty of
Information and Educational Sciences (FCIE). This was the population of a
whole class. All of them were between 22 and 24 years old. Among them, there
were twenty female students and one male student.
Instruments
At the start of the study, a questionnaire was administered to the students to
gather data about their peer relationships and preferred peers for study, and
their views about collaborative learning. The students were asked to answer
questions regarding (1) their current peer relationships for study (the number
and names of peers that a student frequently studied with), (2) their preferred
peer relationships for study (the number and names of peers that a student
preferred to study with), and (3) views about collaborative learning.
Table 1. Self-efficacy scales and student perceptions of Threaded Discussion for learning
Reliability
Scale Items Type (Cronbachs
alpha)
1. Self-efficacy in
Programming Technologies 34
(SE)
a)Self-efficacy in
Programming Languages 12 6-point Likert Scale
(SE.PL) ranging from Not
=0.96
b) Self-efficacy in Confident to Strongly
Programming Tools 12 Confident
(SE.PT)
c) Self-efficacy in Current
Web Programming 10
Technologies (SE.NT)
2. Importance of Threaded 6-point Likert Scale
8 =0.69
Discussion for learning ranging from Not
Intervention
The intervention of this research took place during a full semester. Two
communication tools were used to support student online threaded discussions:
OTD and Feedreader (a RSS news aggregator). The students were required to
participate in four online learning activities supported by OTD. The OTDs were
hosted on the intranet of the university. The teacher and students also used
emails for communication, especially when there were problems with OTDs.
The teacher used the Feedreader for monitoring students participation in the
OTD throughout the RSS channels. A worksheet was designed for archiving
students learning activities and performance during the course. It consisted of a
sheet per activity for facilitating the tracking of student participation in OTDs.
The teacher used it to record student activities and performance per activity. The
worksheet also contained the observation guide that the teacher used to assess
student online learning activities.
At the end of the intervention, both qualitative data and quantitative data were
gathered. Qualitative data were collected through student actual participation of
discussions online. The students online discussions and comments in the OTD
were used for content analysis. Quantitative data were gathered through a
questionnaire, which was introduced in the above Instruments section. The
questionnaire was administered during the last workshop session of the
intervention course.
Data Analysis
Regarding the quantitative data, reliability analysis and descriptive analysis
were conducted for all measured scales. As for the qualitative data, we focused
on student actual participation in OTD and their peer relationships online. With
regard to online discussions, content analysis was applied to analyse students
actual participation while using OTD during the learning process. Regarding the
peer relationships, the software tool Gephi was used for conducting the Social
Network Analysis, modelling and monitoring the interactions of the students
while learning online. The Gephi tool includes plug-ins for gathering live data
about social interactions within virtual learning environments. This software
combines the graphs theory with a strong visualization engine facilitating the
social networks presentation. Student desired peer relationship, prior peer
relationship and actual peer relationship during the OTD were analyzed and
compared.
Results
The results of this study focus on three aspects: first, student interactions and
peer relationships in OTD as analysed by SNA; secondly, content analysis of
Secondly, a graph concerning the desired peer relationships of the students was
modelled. It included the colleagues the students would like to study with. This
graph was constructed by using the same analogy of the previous one. It was
denoted as D (N, Ed) (D refers the desired network for learning), whose nodes
are the same N- and the edges are represented as Ed (Figure 2). This graph
depicts the students desired peer relationships for studying this course.
Figure 1. Composition of the network for studying PT [B (N, E)] before the study
began.
Figure 2: Composition of the desired, ideal network for studying PT [D (N, Ed)]
Thirdly, the state of peer relationship network that was shaped during the
interaction while using the OTD was examined. The graph T (Nt, Et) (T refers to
threaded discussions) denotes the relationships the students established through
interacting and commenting within the OTD (Figure 3). Next to the actual peer
relationships among the students, this graph included the participation and
interaction of other two members: the teacher of this course (Teacher) and the
students of other academic years of IS who were involved in the discussions
these were denoted by Others. Thus the following formula was used:
1. Nt = N (Teacher, Others)
The teacher and the other members (senior students of the same program) had
an added value in this social network, as they had the possibility of monitoring
students online activities in OTD. It also gave the teacher an effective way to
assess the students learning progress. Moreover, it allowed the students of
preceding academic years to enhance their knowledge about the topics that were
discussed in OTD.
Another two auxiliary graphs were shaped to analyse the composition of the
network states formed during online learning activities. The other, auxiliary
graph represents the result of unifying the graph B with the graph T. This union
(B T = Ir) surpassed the supposed ideal state of the network (D), taking into
account the cardinality of the new set of edges obtained. The following
equations show the foundations of this finding:
2. B (N, E) T (Nt, Et) = Ir (N Nt, E Et)
3. |N Nt| > Nt 23 > 21
4. |E Et| > |Ed| 85 > 78
cardinality of the nodes (|N Nt|) increased. It refers to the quantity of nodes
interacting in the social network. The same occurred in the case of the edges.
Both were beneficial for students learning relationships. A comparison between
Ir and D is presented in the Table 2, where the shaded columns show the metrics
of these two networks states. The main improvement of Ir consists on the
augment of the cardinality of the set of nodes, by including the teacher and other
students (Equation 3). Moreover, there is an augment in the cardinality of the set
of edges (Equation 4), but it is not significant if considered the incorporation of
the teacher and other students. The results show that there was a meaningful
improvement of the network in terms of the relationships established through
the OTD, taking into account that the state denoted as D shows an ideal state of
this social network. A comparison between the metrics of the initial networks
state shown in the first column of the Table 2- with the metrics of the final state,
illustrates the improvement on the final networks state, taking into account that
the students never abandoned their study habits before using the OTD. They just
combined the use of OTD with their learning habits.
Density
The density measures how close the network was to complete every possible
edge among all pairs of nodes. A full-connected graph/network has a density
value equal to 1. The higher the density of a network, the better is the
connectivity among its nodes.
The Irs density increased with respect to the initial state of the network (B).
When these states are interpreted as directed graphs the density values
increased from 0.136 to 0.168. Otherwise, considering the network as an
undirected graph, the density increased from 0.229 to 0.273. These values are not
considered significant, even when a little improvement of the network is
perceived, because the students were in their fourth university year; so they
previously had established almost all the learning relationships they would
want. It is also the cause of the absence of isolated students within Ir and B.
Once the students have been in touch during three academic years they have
had the possibility to choose the peers they consider suitable to study with.
Figure 4: Union of the network for studying PT (B) and the relationships established
through the OTD (B T = Ir)
Shortest paths
In the graphs theory, the shortest path from a to b (a, b N) in a given graph G
(N, E), is the path with the minimum number of intermediate nodes c1, c2, , cn
between a and b; where the path length is equal to n+1.
A meaningful augment was found in the quantity of shortest paths of B with
respect to Ir (from 229 to 442). It can mean an improvement in terms of time and
effort spent by the students for finding information through the interaction with
their classmates. Moreover, the number of weakly connected components did
not change across the study; which confirms the absence of isolated nodes in the
network. Besides, the number of full-connected triads (triangles) in the network
varied from 34 to 80, being better than the 56 triangles of D. A triangle in a given
graph G (N, E) is constituted by a triad of nodes a, b, c N, such that (a, b), (a, c),
(b, a), (b, c), (c, a), (c, b) E.
Closeness centrality
One of the best improvements of Ir concerns the centrality metrics. The closeness
centrality metric (Brandes, 2001) indicates how often a node is found in the
shortest paths between each pair of nodes of the network. This metric, whose
average is 0.407, is significantly better than the initial average of the state B
(0.491). Hence, it is very close to the average closeness centrality of D (0.392).
Contextualized to this study, it indicates how long it would take for the
information from a given node to reach the other nodes in the network,
supposing that the time taking for the information to reach the node b from the
node a is equal to one unit when exists an edge from a to b within the network.
Metric B D T Ir = B T Ir D
Isolated nodes 0 0 5 0 0
Nodes 21 21 23 23 21
Directed edges (Edges
57 78 33 85 48
cardinality)
Graph Density (for
0.136- 0.186- 0.065- 0.168- 0.114-
Directed-Undirected
0.229 0.290 0.103 0.273 0.190
networks)
Shortest Paths 229 400 162 442 135
There is only one node of the network whose closeness centrality is null, which
means that its correspondent student does not have an effective way to share or
consult information with the others. The smaller the value of this metric, the
smaller will be the delay for sharing information among the students of the
network, which also improves the learning results.
The benefits of sharing information among the students are also confirmed by
the analysis of its average betweeness centrality (Brandes, 2001), whose value
varies from 0.047 to 0.070. This metric indicates how often a node is found on the
shortest paths of the network. In this study, it is understood as a measure of
knowledge sharing capabilities. Moreover, the average clustering coefficient
(Latapy, 2008) indicating how close the neighbourhood of a specific node is to a
complete subgraph- augmented from 0.273 to 0.313, which is even greater than
the ideal (desired) value of D. So, it means an enhancement of Ir when
comparing with B or D in terms of the probability of each student to access the
knowledge flowing in the network. Another analysis intersected the resultant
state of the network with the desired one (Ir D, Figure 5).
Figure 5: Coincidences of the union of social network for studying PT and the OTD
interactions' network, with the desired network for studying PT
% of the total of
Code Comments
comments
Task-oriented analysis
Task oriented 59 87%
Non-task oriented 52 76%
Irrelevant 5 7%
Technical 10 15%
Planning 29 43%
Social 22 32%
Levels of knowledge construction *
meaning, testing synthesis and agreement-application) are not included because there
were no comments concerning these levels of knowledge construction.
Table 4: Codes' intersection matrix and percentages of codes with two or more
scripts coded
Sharing-comparing
Peer-assessment
Task oriented
Assessment
Irrelevant
Technical
Planning
Social
Codes
Task-oriented analysis
Task 59 1 10 25 15 20 14 6
oriented (100%) (2%) (17%) (42%) (25%) (34%) (24%) (10%)
Non-task oriented
5
1 2
Irrelevant (100% 0 0 0 0 0
(20%) (40%)
)
10
10 4 2 5
Technical (100% 0 0 0
(100%) (40%) (20%) (50%)
)
25 4 29 6 13
Planning 0 0 0
(86%) (14%) (100%) (21%) (45%)
15 6 22 6
Social 2 (9%) 2 (9%) 0 1 (5%)
(68%) (27%) (100%) (27%)
Levels of knowledge construction*
Sharing- 20 21
0 0 0 0 0 0
comparing (95%) (100%)
Assessment analysis
14 5 13 15
Assessment 0/0 1 (7%) 0 0
(93%) (33%) (87%) (100%)
6 6
Peer- 6
(100% 0 0 0 0 0 (100%
assessment (100%)
) )
In this table, the task oriented and planning comments represent the biggest
quantity of them containing scripts marked with a couple of codes, which is 25
in this case.
A further analysis shows high percentages for almost all of the comments
containing scripts marked with the task-oriented code, medium percentages
for almost all of the planning-coded scripts and a considerable portion for the
social-coded scripts. It confirms that the students have mainly focused on the
online learning tasks. Moreover, this table shows that 100% of the comments
containing technical and/or peer- assessment scripts are also task-oriented
comments. Considering that the peer-assessment implies a level of socialization
with other peers, all the peer-assessment-coded comments (100%) are also
marked as social ones.
The most participative OTD was the task in which the students posted their
personal information. This way they shared some of their skills, likings and
careers records so they could motivate the others to discuss about those topics.
It was also the most social online learning activity (21 of 22 social-coded
comments) due to the nature of the discussions, on which they evaluate their
classmates performance in the university. The whole of the peer-assessment-
coded comments were detected within this activity.
The content analysis of the OTD gave the teacher the possibility of rapidly
analysing the students comments, like a parallel task. The teacher could
perform better by assessing them immediately they posted their comments.
Likewise, the peer-assessment of the students was improved by providing them
with an effective way to evaluate their classmates online learning. However, the
scaffolding for this kind of assessment can be improved by increasing the
activities following this instructional design during the courses.
The use of social software to promote critical thinking has been considered in
other studies (Jeong & Frazier, 2008; Lee, 2009; Rizopoulos & McCarthy, 2008).
This intervention study demonstrates that integrating analytical and social
software guarantees the teacher presence in the social space and gives him/her a
constant feedback about the students learning process, which provides more
evidences for assessment and enhances the knowledge construction by
improving critical thinking. The assessment practices reported by other authors
(Chan et al., 2009; Chrystal, 2009; Ioannou & Artino, 2009; Isotani et al., 2010;
Kang et al., 2010; Lee, 2009; Maurino et al., 2007; So & Brush, 2008; Wishart &
Guy, 2009) might be encouraged by combining with content analysis methods
(Gunawardena et al., 1997; Veerman & Veldhuis-Diermanse, 2001) in order to
improve the quality of assessment.
The present study has contributed to the using of Social network analysis (Scott
& Carrington, 2011) in analyzing online learning spaces and communities
(Rainie & Wellman, 2014). In this research, we have elaborated the importance of
social network analysis for analysing student peer relationships and interactions
in online discussions. Understanding the network of interaction between
students can help teachers monitor the interaction structure of students, and
have a clear view of the role of students in discussions and the patterns of peer
interaction behavior (Scott, 2013). For example, which students were taking the
lead and which students were peripheral. This is also important to measure the
effectiveness of students actual participation in online learning activities
(Borgatti & Everett, 2013).
Some limitations need to be noted in this study. First, the sample size of this
study was small, limited to the 21 students involved in a specific course under
this study. Secondly, the results of this study need to be considered with caution
as it applied to a specific setting. In addition, the results might be related to the
so-called Hawthorne effect as the participants were introduced to new methods
and got extra attention (Hansson & Wigblad, 2006).
Nevertheless, this study has a number of important implications for the use of
online learning activities in Cuban higher education. The analysis of threaded
discussions facilitates the scaffolding of the students learning and gives the
teacher more evidences for their assessment. The combination of social software
This learning approach, supported with online collaborative learning, has been
applied in other courses too in the Cuban setting. The present study provides
significant evidences regarding the effectiveness of computer-supported
collaborative learning in Cuban higher education.
References
Abbasi, A., & Altmann, J. (2011). On the Correlation between Research Performance and
Social Network Analysis Measures Applied to Research Collaboration Networks,
in Hawaii International Conference on System Sciences, (pp. 1-10). Proceedings of the
41st Annual. Waikoloa, HI: IEEE. doi:10.1109/HICSS.2011.325
Borges-Frias, J. L. (2009). Presupuestos pedaggicos para el uso de las Tecnologas de la
Informacin y las Comunicaciones en la Universalizacin de la Educacin Superior
cubana. Revista Pedagoga Universitaria, XIV(2), 38-50.
Borgatti, S. P., & Everett, M. G. (2013). Analyzing Social Networks. New York, NY: Sage
Publications.
Brandes, U. (2001). A faster algorithm for betweeness centrality. Journal of Mathematical
Sociology, 25(2), 163-177.
Bruner, J. (1966). Toward a theory of instruction (2nd ed.). New York, NY: W.W. Norton
& Company.
Bruner, J. (1977). The process of education (2nd ed.). Cambridge, UK: Harvard
University Press.
Butts, C. T. (2008). Social network analysis: A methodological introduction. Asian
Journal Of Social Psychology, 11(1), 13-41. doi:10.1111/j.1467-839X.2007.00241.x
Chan, J. C. C., Hew, K. F., & Cheung, W. S. (2009). Asynchronous online discussion
thread development: examining growth patterns and peer-facilitation techniques.
Journal of Computer Assisted Learning, 25(5), 438-452. doi:10.1111/j.1365-
2729.2009.00321.x
Chrystal, S. J. (2009). Technology leverages a community university collaboration. In J.
Salmons & L. Wilson (Eds.), Handbook of Research on Electronic Collaboration and
Organizational Synergy (pp. 130-141). Hershey, NY: Information Science Reference.
De Wever, B., Schellens, T., Valcke, M., & Van Keer, H. (2006). Content analysis schemes
to analyse transcripts of online asynchronous discussion groups: A review.
Computers & Education, 46, 6-28.
De Wever, B., Van Keer, H., Schellens, T. & Valcke, M. (2010). Roles as a structuring tool
in online discussion groups: the differential impact of different roles on social
knowledge construction, Computers In Human Behavior. 26(4). 516-523.
Dewey, J. (1916). Democracy and education. New York, NY: Macmillan Company.
Enriquez, J. G. (2008). Translating networked learning: un-tying relational ties. Journal
of Computer Assisted Learning, 24, 116-127. doi:10.1111/j.1365-2729.2007.00273.x
Garca-Garay, J. (2005). Diseo curricular de la disciplina Electricidad y Automatizacin
para la carrera de Ingeniera Mecnica. Instituto Superior Politcnico Jos Antonio
Echeverra Centro de Referencia para la Educacin de Avanzada (CREA), Ciudad
de la Habana, CU.
Gunawardena, C. N., Lowe, C. A., & Anderson, T. (1997). Analysis of a global online
debate and the development of an interaction analysis model for examining social
construction of knowledge in computer conferencing. Journal of Educational
Computing Research, 17, 397-431.
Hanneman, R. A. (1998). Introduction to Social Network Methods. Network.
Hansson, M., & Wigblad, R. (2006). Recontextualizing the Hawthorne effect.
Scandinavian Journal of Management, 22(2), 120-137.
doi:10.1016/j.scaman.2005.12.003
Hemphill, L. S., & Hemphill, H. H. (2007). Evaluating the impact of guest speaker
postings in online discussions. British Journal of Educational Technology, 38(2),
287-293. doi:10.1111/j.1467-8535.2006.00622.x
Ioannou, A., & Artino, Jr., A. R. (2009). Wiki and threaded discussion for online
collaborative activities: students perceptions and use. Journal of Emerging
Technologies in Web Intelligence, 1(1), 97-106. doi:10.4304/jetwi.1.1.97-106
Isotani, S., Mizoguchi, R., Inaba, A., & Ikeda, M. (2010). The foundations of a theory-
aware authoring tool for CSCL design. Computers & Education, 54(4), 809-834.
Elsevier Ltd. doi:10.1016/j.compedu.2009.09.010
Jeong, A., & Frazier, S. (2008). How day of posting affects level of critical discourse in
asynchronous discussions and computer-supported collaborative argumentation.
British Journal of Educational Technology, 39(5), 875-887. doi:10.1111/j.1467-
8535.2007.00789.x
Kang, J.-hyung, Kim, J., & Shaw, E. (2010). A network analysis of student groups in
threaded discussions, 359-361.
Laat, M. D., Lally, V., Lipponen, L., & Simons, R.-J. (2007). Investigating patterns of
interaction in networked learning and computer-supported collaborative learning:
A role for Social Network Analysis. Computer-Supported Collaborative Learning.
doi:10.1007/s11412-007-9006-4
Latapy, M. (2008). Main-memory triangle computations for very large (sparse (power-
law)) graphs. Theoretical Computer Science (TCS), 407(1-3), 458-473.
Lee, L. (2009). Scaffolding collaborative exchanges between expert and novice language
teachers in threaded discussions. Foreign Language Annals, 42(2), 212-228.
doi:10.1111/j.1944-9720.2009.01018.x
Maurino, P. S. M., Federman, F., & Greenwald, L. (2007). Online threaded discussions:
purposes, goals, and objectives. Journal of Educational Technology Systems, 36(2),
129-143. doi:10.2190/ET.36.2.b
Moreno, J. L. (1951). Sociometry, Experimental Method and the Science of Society. An
Approach to a New Political Orientation. Beacon House, Beacon, NY.
Ng, C. S. L., & Cheung, W. S. (2007). Comparing face to face, tutor led discussion and
online discussion in the classroom. Australasian Journal of Educational
Technology, 23(4).
Numela, K., Lehtinen, E., & Palonen, T. (1999). Evaluating CSCL log files by social
network analysis. Computer Supported Collaborative Learning.
Pena-Shaff, J. B., & Nicholls, C. (2004). Analyzing student interactions and meaning
construction in computer bulletin board discussions. Computers &Education, 42,
243-265.
Piaget, J. (1971). Biology and knowledge. Edinburgh: Edinburgh Press.
Rienties, B., Tempelaar, D., Van Den Bossche, P., Gijselaers, W., & Segers, M. (2009). The
role of academic motivation in Computer-Supported Collaborative Learning.
Computers in Human Behavior, 25(6), 1195-1206. Elsevier Ltd.
doi:10.1016/j.chb.2009.05.012
Rizopoulos, L. A., & McCarthy, P. (2008). Using online threaded discussions: best
practices for the digital learner. Journal of Educational Technology Systems, 37(4),
373-383. doi:10.2190/ET.39.4.c
Rodrguez-Torres, G. A., & Anta-Vega, J. M. (2006). El perfeccionamiento de la educacin
superior y su repercusin en la enseanza de las matemticas en las carreras
tcnicas. Ingeniera Mecnica, 2, 55-58.
Rainie, L., & Wellman, B. (2014). Networked: The New Social Operating System: The MIT
Press.
Salmons, J. (2009). E-social constructivism and collaborative e-learning. In J. Salmons &
L. Wilson (Eds.), Handbook of Research on Electronic Collaboration and
Organizational Synergy (pp. 280-294). New York, NY: Information Science
Reference.
Scott, J. (2013). Social Network Analysis. London, UK: SAGE Publications.
Scott, J., & Carrington, P. J. (Eds.). (2011). The SAGE handbook of social network analysis.
London, UK: SAGE Publications Ltd. doi:
http://dx.doi.org/10.4135/9781446294413
Silverman, I. (1977). Why social psychology fails. Canadian Psychological Review, 18,
353-8.
So, H., & Brush, T. (2008). Student perceptions of collaborative learning, social presence
and satisfaction in a blended learning environment: Relationships and critical
factors. Computers & Education, 51(1), 318-336. doi:10.1016/j.compedu.2007.05.009
So, H.-J., Seah, L. H., & Toh-Heng, H. L. (2010). Designing collaborative knowledge
building environments accessible to all learners: Impacts and design challenges.
Computers & Education, 54(2), 479-490. Elsevier Ltd.
doi:10.1016/j.compedu.2009.08.031
Stewart S. A., Abidi, S.S. (2012). Applying social network analysis to understand the
knowledge sharing behaviour of practitioners in a clinical online discussion forum.
Journal of Medical Internet Research. 4(6). doi: 10.2196/jmir.1982.
Suthers, D., & Medina, R. (2008). Tracing interaction in distributed collaborative
learning. In B. Wasson, S. Ludvigsen, & U. Hoppe (Eds.), Designing for Change in
Networked Learning Environments (pp. 24-28). Kluwer Academic Publishers.
Retrieved from http://metheny.ics.hawaii.edu/lilt/papers/2008/Suthers-Medina-
AERA-2008.pdf
Todd, Z., Nerlich, B., McKeown, S., & Clarke, D. (2004). Mixing methods in psychology
(pp. 3-16). Hove: Psychology Press.
Veerman, A., & Veldhuis-Diermanse, E. (2001). Collaborative learning through
computer-mediated communication in academic education. In P. Dillenbourg, A.
Eurelings, & K. Hakkarainen (Eds.), European Perspectives on Computer-
Supported Collaborative Learning. Proceedings of the First European Conference
on CSCL. Maastricht.
Vygotsky, L. S. (1978). Mind in society: The development of higher psychological
processes. Cambridge, MA: Harvard University Press.
Wasserman, S., & Faust, K. (1995). Social network analysis: methods and applications.
Wishart, C., & Guy, R. (2009). Analyzing responses, moves, and roles in online
discussions. Interdisciplinary Journal of E-learning and Learning Objects, 5.
Xia, H., Wang, R., & Hu, S. (2009). Social Networks Analysis of the Knowledge Diffusion
among University Students. 2009 Second International Symposium on Knowledge
Acquisition and Modeling, 343-346. IEEE. doi:10.1109/KAM.2009.240
Zhu, C., Valcke, M., & Schellens, T. (2009). Cultural differences in the perception of a
social constructivist e-learning environment. British Journal of Educational
Technology, 40(1), 164-168.
Zhu, C. (2012). Students' satisfaction, performance and knowledge construction in online
collaborative learning. Educational Technology & Society, 1(15), 127 - 136.
Zhu, C. (2013). The effect of cultural and school factors on the implementation of CSCL,
British Journal of Educational Technology, 44 (3), 484-501.