Saturday, 16 June 2018

TML Wk 29: Professional Online Social Networks

My post this week relates to Professional Online Social Networks. In response to this I will be reflecting on my own experiences as an early adopter of social media and the opportunities this has created for me professionally. I will discuss this considering Jay and Johnson's (2002) reflective model to unpack it. This takes the form of a three step reflection process that is descriptive, comparative and critical.

Descriptive
I consider myself to be a connected educator and early adopter of social media for professional use.  I have documented this journey, as evidenced in several blog posts and in particular this early one from 2009 on my top 3 tips for getting connected online.  In this post I suggest using "new" web 2.0 tools such as opening an RSS reader account, using social book marking (Delicious) and starting connections using Twitter! I also refer to my developing Professional Learning Network (a PLN) which back then was a very new term and predominately spread throughout New Zealand.  Now, some 10 years later, my PLN is global and these digital connections I can call upon because of the on-going nurturing of interactions via social media, making the vast physical distance of global connection virtual and compact in the palm of your hand (on your device).

Comparative
My experiences parallel the video produced from Office of Ed Tech (2013), shared for our week 29 course work which discusses how being connected is one of the number one tools for being a 21st Century Educator, the isolation of the classroom (or school environment) is no more through the magnification of the transformative power of professional learning via technology (social media).  At the time of writing this post their was limited responses in our cohort survey tool to compare.  What I can say from my own observation of being connected over the last decade is that the use of Facebook for professional social networking has increased with the use of "groups" and of interest over this time the development of #hashtags and frequency of #twitterchats to share professional knowledge.

Critical
As an advocate for using professional online social networks, I reflect back on this 2013 Ignite presentation that I shared in which I spoke about being connected, disconnected and reconnected.  

It takes a lot to nurture your online social media profile and connections. The rewards of doing so open a world of professional growth that I would have never had opened if it weren't for social media/technology. I would recommend that anyone wanting to start being a more connected educator to follow the simple "Follow 5, Find 5, Take 5" method suggested by Whitaker et al., (2015) as a way nurturing a PLN.  As an employer, being a connected educator is an important factor in considering whether a candidate is suitable and I do review the online presence of applicants.  One of the key points of difference I have in my tool belt when going for leadership roles (I believe) is that my employer knows that it isn't just my skills, and knowledge that they are employing, but that of my wider collective and connective PLN too, which I can access readily!  

Opportunities afforded to be by being connected (& associated blog links/video):


Word count: 649

References

Emerging Leaders, (2013) Ignite Talk by J. Driver. [video file].  Retrieved from https://vimeo.com/69428288

Driver, J (n.d). Blog posts retrieved from http://digitallearningnz.blogspot.com/

Jay, J.K. and Johnson, K.L. (2002). Capturing complexity: a typology of reflective practice for teacher education. Teaching and Teacher Education, 18, 73-85.
Office of Ed Tech. (2013, Sep 18). Connected Educators. [video file]. Retrieved from https://www.youtube.com/watch?t=216&v=K4Vd4JP_DB8
Whitaker, T., Zoul, J., & Casas, J. (2015). What connected educators do differently. New York, NY: Routledge.

Wednesday, 13 June 2018

TML Wk 28: Influence of Law and Ethics in Practice

My post this week relates to the Influence of Law and Ethics in Practice.  In response to this I will be reflecting on a previous experience with a Provisionally Certified Teacher (PCT) breaching our school privacy guidelines.  I will discuss this considering what happened using Rolfe’s (2001) reflective model to unpack it.  This takes the form of three simple questions, “what”, “so what” and “now what”.

What?
At our school all students in Year 3-6 have their own school Google Suite for Education account.  The PCT of a Year 3 class was teaching them to use their account and had on display each child's class login and password.  A parent brought to my attention that her daughter's work had been tampered with as a result of the passwords being on display (another child had signed into the student's account and ruined their work because of the passwords being insecure due to teacher error).  

So What?
It is important that our staff uphold and model best practise with using digital technology and being a digital citizen.  A privacy guideline from our policy states "We have reasonable safeguards in place to protect personal information from loss, unauthorised access, use, or disclosure.  These safeguards include the use of individual logins for computers" (2018).  In this case, the young PCT had breached privacy by displaying the logins and passwords for all students in her class, causing a student to take advantage and destroy another child's work (digitally).  This made tracing the offender very difficult, as the document didn't have shared authorship; the offender used the child's login/password.  As a school leader I was able to use the history feature of the G. Suite to print evidence and timestamps of when specific changes had been made to the student's document and provide this as evidence for the parent.  

Now What?
The dilemma for myself and the PCT was how to do to use this as a learning opportunity for these young learners regarding sharing passwords, appease the parent that action had been taken, and support the PCT on how best to manage digital technologies in class with her learners. On reflection it would have been useful to have been able to use Ehrich et al. (2011) “model of ethical decision-making” as it would have not only given ourselves some clear directions but also may have been useful to show the parent how I thoroughly considered all aspects of the breach (the seriousness of the issue) and dealt accordingly. The strength of using a model like Ehrich et al. (2011) is the way in which it breaks down each of the components of the incident. Whether these are around legal issues, professional ethics or areas of public interest and relates these to the implications for us as individuals, organisations and communities.  In this case, I went into the classroom and took several lessons for the PCT/students around digital citizenship and strong passwords.  This satisfied the parent, the learners understood the seriousness of the issue and learnt how to protect their password, the PCT felt supported and as a leader I felt satisfied the dilemma had been resolved for all involved. I had acted with professionalism and integrity upholding our school Code of Conduct (2016) when interacting with the student/s, parent, and staff member with this dilemma.
Image result for Ethical Decision-Making Model Ehrich

Word count: 541 

References

Ehrich, L. C. , Kimber M., Millwater, J. & Cranston, N. (2011). Ethical dilemmas: a model to understand teacher practice, Teachers and Teaching: theory and practice, 17:2, 173-185, DOI: 10.1080/13540602.2011.539794

Rolfe, G., Freshwater, D., Jasper, M. (2001) Critical reflection in nursing and the helping professions: a user’s guide. Basingstoke: Palgrave Macmillan.

Sunnyhills School Board of Trustees, (2018). Privacy Guidelines.  School Docs retrieved from http://sunnyhills.schooldocs.co.nz/index.htm?toc.htm?18805.htm 

Sunnyhills School Board of Trustees, (2016). Code of Conduct.  Internal School Document.