SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
Confidential and Proprietary
What is BYOD?

Source : YouTube – “BYOD in the 21st Century” by Marc-Anre Lalande
Confidential and Proprietary
BYOD in Commercial World




Gartner report (May 2013) “By 2017, Half employers will require
Employee to supply their own device for work purpose”
In US market, BYOD is growing strongly …

Sources : 1Gartner report May 2013 and 2ReadWrite Survey

Confidential and Proprietary
BYOD Drivers


No Just Cost Saving




Productivity Gain
Employee Satisfaction

Sources : 3www.quest.com and 4 Intel Inc.

• These are also the main drivers for eLearning.
• Same tool students use for social interaction with peers and
using it as educational tool.
• BYOD makes 1:1 Computing more financially sustainable.
Confidential and Proprietary
Some Concerns in eLearning




Equity of
Access

Classroom
Managemt

Support &
Servicing

Security &
Privacy

Inevitable trend, create
challenges for schools
In 2011, Forsyth County, Georgia,
became the 1st school systems in
US to introduce BYOD policy.

Damage,
Loss &
Theft

Network
Loading &
Filtering

Confidential and Proprietary
Equity of Access




Equity of
Access

Classroom
Managemt

Support &
Servicing

Security &
Privacy

Not all students have devices, thus
limits learning
Some devices may NOT have the
ability to run necessary applications
•

Loan devices for class and/or home use

Damage,
Loss &
Theft

Network
Loading &
Filtering

Confidential and Proprietary
Security and Privacy


Data and Network Breaches
•



Equity of
Access

Security policy on device itself
•

Security &
Privacy



Support &
Servicing

Damaage,
Loss &
Theft



Anti-virus / Anti-malware software

eSafety Awareness
•

Classroom
Managemt

Separate networks for students

No sharing of personal information

Cyber-bullying policies

Network
Loading &
Filtering

Confidential and Proprietary
Damage, Loss & Theft


Student safety
•



Equity of
Access

Classroom
Managemt

Support &
Servicing

Security &
Privacy

Remind student to take special precaution

Device theft and breakage
•
•

Purchase insurance to protect investment
Extend device warranty

Damage,
Loss &
Theft

Network
Loading &
Filtering

Confidential and Proprietary
Network Issues


Increasing no. of devices and traffic
•

Equity of
Access

•
•

Security &
Privacy


Classroom
Managemt

Support &
Servicing

Damage,
Loss &
Theft

Invest in sufficiently robust and high speed
network infrastructure
Good WiFi coverage, minimal interference
Provision enough Internet bandwidth

Access to only appropriate resources
•

Caching and Content Filtering

Network
Loading &
Filtering

Confidential and Proprietary
Support & Servicing


The onus of responsibility and care
lies with each student
•

Equity of
Access



Security &
Privacy

Support &
Servicing

Teachers are NOT IT support
• Encourage student to consult more
tech-savvy classmates



Classroom
Managemt

Acceptable-use / Responsible-use Policy

Breakage,
Loss &
Theft

Baseline standardization to easy out
device compatibility issues

Network
Loading &
Filtering

Confidential and Proprietary
Classroom Management


Equity of
Access

Classroom
Managemt

Support &
Servicing

For example, Lamp On and
Off, device face up …

Security &
Privacy

Breakage,
Loss &
Theft

Network
Loading &
Filtering

Confidential and Proprietary
Classroom Management

Source : YouTube – “BYOT for Parents” by Amy May, Huntsville ISD
Distraction?

Source : Til Death, TV series by Fox

Confidential and Proprietary
Really a Distraction?




Digital technology shortening students attention spans; and
Hampering their ability to preserve in the face of challenging tasks *
“Wikipedia syndrome”
• Students so accustomed to getting quick answers with a few keystrokes that
they are more likely to give up when easy answer eludes them.



Kristen Purcell, Associate Director at Pew, “… What we’re labeling as
‘Distraction’, some see as a failure of adults to see how these kids process
information. They’re NOT saying ‘Distraction’ is good but that the label of
‘Distraction’ is a judgment of this generation.”
Education system MUST adjust to better accommodate the way
students learn

* Studies by “Pew Internet Project” Pew Research Center and Common Sense Media

Confidential and Proprietary
Digital Content




BYOD shift traditional Desktop software to
applications based on web technology
(browser) and cloud services
Pedagogical practice change
• Impact on teaching approach
• May require a digital curriculum




Standardized device hardware means easy of training for teachers/students
Accessibility
• eBook content require reasonable Screen size and Screen magnification
• Device may have limitation in supporting certain formats e.g. Flash, HTML5 …



Licenses
•

In past education license meant content can only be access within school. BYOD change
this model significantly as access is now anytime and anywhere.

Confidential and Proprietary
BYOD Spectrum
Limited Access

Access based on
teacher permission
or planned events.
May be
supplemented with
school-owned
devices.

Basic

Enhanced

Advanced

Full Internet
Can only access to
access.
restricted Internet.
Differentiated
Culture change and
Little school
access to school
innovation begins.
resources support.
resources. Multiple Students begin to
Device may be
devices may be
develop and create
used during free
brought to school.
applications on
time such as lunch.
Onboarding with
devices.
Certified device
security
types only.
onsite/offsite.
Student Centric

Teacher Centric

Confidential and Proprietary
Final Thoughts
Parents
Buy-in

Safety

Professional
Development

Network
Infrastructure

BYOD
Funding

Learning
Content &
Applications

Technical
Support

Policy

Confidential and Proprietary
allen.yc.wong@netvigator.com
Confidential and Proprietary

Mais conteúdo relacionado

Mais procurados

Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product BriefSecurly
 
Next Steps with Technology Enhanced Learning
Next Steps with Technology Enhanced LearningNext Steps with Technology Enhanced Learning
Next Steps with Technology Enhanced LearningJisc Scotland
 
Moving on With Mobile - Introduction & context setting
Moving on With Mobile - Introduction & context settingMoving on With Mobile - Introduction & context setting
Moving on With Mobile - Introduction & context settingJisc Scotland
 
The Pros and Cons of Open Educational Resources
The Pros and Cons of Open Educational ResourcesThe Pros and Cons of Open Educational Resources
The Pros and Cons of Open Educational ResourcesMuffin1927
 
15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility RefreshPatrick Loftus
 
EDU708 Manifesto Presentation
EDU708 Manifesto PresentationEDU708 Manifesto Presentation
EDU708 Manifesto Presentationwhitt1m
 
Information Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentInformation Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentArnoldBail
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyJulie Evans
 
The Anatomy of an IT Accessibility Coordinator
The Anatomy of an IT Accessibility CoordinatorThe Anatomy of an IT Accessibility Coordinator
The Anatomy of an IT Accessibility Coordinator3Play Media
 
Using Technology in the Higher Education Classroom
Using Technology in the Higher Education ClassroomUsing Technology in the Higher Education Classroom
Using Technology in the Higher Education ClassroomDerrick Mears
 
OER benefits and disadvantages
OER benefits and disadvantagesOER benefits and disadvantages
OER benefits and disadvantagesjiannone
 
The reality of technology infused learning
The reality of technology infused learningThe reality of technology infused learning
The reality of technology infused learninghortonp
 
Higher Education and Technology Leadership
Higher Education and Technology LeadershipHigher Education and Technology Leadership
Higher Education and Technology LeadershipColleen Carmean
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community SchoolsSecurly
 
An Architect of the ADA on Its Application to Modern Technology
An Architect of the ADA on Its Application to Modern TechnologyAn Architect of the ADA on Its Application to Modern Technology
An Architect of the ADA on Its Application to Modern Technology3Play Media
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD PlanSam Gliksman
 

Mais procurados (20)

Securly Product Brief
Securly Product BriefSecurly Product Brief
Securly Product Brief
 
Next Steps with Technology Enhanced Learning
Next Steps with Technology Enhanced LearningNext Steps with Technology Enhanced Learning
Next Steps with Technology Enhanced Learning
 
Moving on With Mobile - Introduction & context setting
Moving on With Mobile - Introduction & context settingMoving on With Mobile - Introduction & context setting
Moving on With Mobile - Introduction & context setting
 
The Pros and Cons of Open Educational Resources
The Pros and Cons of Open Educational ResourcesThe Pros and Cons of Open Educational Resources
The Pros and Cons of Open Educational Resources
 
Cloud Learning
Cloud LearningCloud Learning
Cloud Learning
 
15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh15 Years After an OCR Suit: NC State’s Accessibility Refresh
15 Years After an OCR Suit: NC State’s Accessibility Refresh
 
EDU708 Manifesto Presentation
EDU708 Manifesto PresentationEDU708 Manifesto Presentation
EDU708 Manifesto Presentation
 
e learning
e learninge learning
e learning
 
Information Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI StudentInformation Technology Accessibility and Training of the Blind/VI Student
Information Technology Accessibility and Training of the Blind/VI Student
 
Boston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 JourneyBoston Public Schools Share their COVID-19 Journey
Boston Public Schools Share their COVID-19 Journey
 
LifelongLearning_EmergentTech
LifelongLearning_EmergentTechLifelongLearning_EmergentTech
LifelongLearning_EmergentTech
 
The Anatomy of an IT Accessibility Coordinator
The Anatomy of an IT Accessibility CoordinatorThe Anatomy of an IT Accessibility Coordinator
The Anatomy of an IT Accessibility Coordinator
 
Using Technology in the Higher Education Classroom
Using Technology in the Higher Education ClassroomUsing Technology in the Higher Education Classroom
Using Technology in the Higher Education Classroom
 
OER benefits and disadvantages
OER benefits and disadvantagesOER benefits and disadvantages
OER benefits and disadvantages
 
The reality of technology infused learning
The reality of technology infused learningThe reality of technology infused learning
The reality of technology infused learning
 
Higher Education and Technology Leadership
Higher Education and Technology LeadershipHigher Education and Technology Leadership
Higher Education and Technology Leadership
 
Baugo Community Schools
Baugo Community SchoolsBaugo Community Schools
Baugo Community Schools
 
Chapter 21 Technology
Chapter 21 TechnologyChapter 21 Technology
Chapter 21 Technology
 
An Architect of the ADA on Its Application to Modern Technology
An Architect of the ADA on Its Application to Modern TechnologyAn Architect of the ADA on Its Application to Modern Technology
An Architect of the ADA on Its Application to Modern Technology
 
Building an Effective School BYOD Plan
Building an Effective School BYOD PlanBuilding an Effective School BYOD Plan
Building an Effective School BYOD Plan
 

Semelhante a BYOD in e-Learning - Some Considerations

Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Diana Benner
 
Frog 13 - Microsoft - Innovative teaching and learning with BYOD
Frog 13 - Microsoft - Innovative teaching and learning with BYODFrog 13 - Microsoft - Innovative teaching and learning with BYOD
Frog 13 - Microsoft - Innovative teaching and learning with BYODFrogEducation
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Diana Benner
 
Assistive technology presentation 1
Assistive technology presentation 1Assistive technology presentation 1
Assistive technology presentation 1God1love
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation God1love
 
1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spacesMark Richardson
 
Assistive technology presentation 1
Assistive technology presentation 1Assistive technology presentation 1
Assistive technology presentation 1God1love
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
BYOD@MLP12C VITTA 2012
BYOD@MLP12C VITTA 2012BYOD@MLP12C VITTA 2012
BYOD@MLP12C VITTA 2012Corrie Barclay
 
What the learners say: FE learners' expectations and experiences of technolog...
What the learners say: FE learners' expectations and experiences of technolog...What the learners say: FE learners' expectations and experiences of technolog...
What the learners say: FE learners' expectations and experiences of technolog...Jisc
 
10.3.14 draft presentation saces
10.3.14 draft presentation saces10.3.14 draft presentation saces
10.3.14 draft presentation sacescmholmes1
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...
Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...
Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...Jacqueline L. Frank
 
SAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docx
SAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docxSAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docx
SAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docxjeffsrosalyn
 
Current trends in Assistive Technology for Education
Current trends in Assistive Technology for EducationCurrent trends in Assistive Technology for Education
Current trends in Assistive Technology for EducationKBehnke
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect
 
Access Quality And Affordability How Technology Can Transform Education In ...
Access Quality And Affordability   How Technology Can Transform Education In ...Access Quality And Affordability   How Technology Can Transform Education In ...
Access Quality And Affordability How Technology Can Transform Education In ...Stephen Murgatroyd, PhD FBPsS FRSA
 

Semelhante a BYOD in e-Learning - Some Considerations (20)

Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016Surviving a BYOD Implementation - TxDLA 2016
Surviving a BYOD Implementation - TxDLA 2016
 
Frog 13 - Microsoft - Innovative teaching and learning with BYOD
Frog 13 - Microsoft - Innovative teaching and learning with BYODFrog 13 - Microsoft - Innovative teaching and learning with BYOD
Frog 13 - Microsoft - Innovative teaching and learning with BYOD
 
Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016Surviving a BYOD Implementation - TCEA 2016
Surviving a BYOD Implementation - TCEA 2016
 
Assistive technology presentation 1
Assistive technology presentation 1Assistive technology presentation 1
Assistive technology presentation 1
 
Assistive technology presentation
Assistive technology presentation Assistive technology presentation
Assistive technology presentation
 
1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces1 to 1 pedagogy stakeholders learning spaces
1 to 1 pedagogy stakeholders learning spaces
 
Assistive technology presentation 1
Assistive technology presentation 1Assistive technology presentation 1
Assistive technology presentation 1
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
BYOD@MLP12C VITTA 2012
BYOD@MLP12C VITTA 2012BYOD@MLP12C VITTA 2012
BYOD@MLP12C VITTA 2012
 
What the learners say: FE learners' expectations and experiences of technolog...
What the learners say: FE learners' expectations and experiences of technolog...What the learners say: FE learners' expectations and experiences of technolog...
What the learners say: FE learners' expectations and experiences of technolog...
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Cognitive Tools-qais
Cognitive Tools-qaisCognitive Tools-qais
Cognitive Tools-qais
 
『BYOD的機遇與挑戰』
『BYOD的機遇與挑戰』『BYOD的機遇與挑戰』
『BYOD的機遇與挑戰』
 
10.3.14 draft presentation saces
10.3.14 draft presentation saces10.3.14 draft presentation saces
10.3.14 draft presentation saces
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...
Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...
Re-Bridging the Digital Divide: Academic Libraries as a Source for Digital Eq...
 
SAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docx
SAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docxSAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docx
SAFEASSIGNedu 522 assignment 1.docxAssignment 1 E-LearningT.docx
 
Current trends in Assistive Technology for Education
Current trends in Assistive Technology for EducationCurrent trends in Assistive Technology for Education
Current trends in Assistive Technology for Education
 
Point2Protect - keeping children safe
Point2Protect - keeping children safePoint2Protect - keeping children safe
Point2Protect - keeping children safe
 
Access Quality And Affordability How Technology Can Transform Education In ...
Access Quality And Affordability   How Technology Can Transform Education In ...Access Quality And Affordability   How Technology Can Transform Education In ...
Access Quality And Affordability How Technology Can Transform Education In ...
 

Mais de eLearning Consortium 電子學習聯盟

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位eLearning Consortium 電子學習聯盟
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?eLearning Consortium 電子學習聯盟
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and PrinterseLearning Consortium 電子學習聯盟
 

Mais de eLearning Consortium 電子學習聯盟 (20)

AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
AI生成工具的新衝擊 - MS Bing & Google Bard 能否挑戰ChatGPT-4領導地位
 
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
ChatGPT 顛覆傳統的科技創新 - 不僅文字工作者會被AI取代?
 
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
2. How Data Analytics Transforming Digital Marketing - Ralph Szeto.pdf
 
1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung1. How Data Analytics Transforming Digital Marketing - Saron Leung
1. How Data Analytics Transforming Digital Marketing - Saron Leung
 
HKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce IndustryHKTVMall: Leading Technology Evolution for eCommerce Industry
HKTVMall: Leading Technology Evolution for eCommerce Industry
 
How Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdfHow Blockchain affecting us - Dr Sin.pdf
How Blockchain affecting us - Dr Sin.pdf
 
5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf5-Hot-Chain Bento.pdf
5-Hot-Chain Bento.pdf
 
4-Herbal ID.pdf
4-Herbal ID.pdf4-Herbal ID.pdf
4-Herbal ID.pdf
 
3-VisualSonic.pdf
3-VisualSonic.pdf3-VisualSonic.pdf
3-VisualSonic.pdf
 
2-kNOw Touch.pdf
2-kNOw Touch.pdf2-kNOw Touch.pdf
2-kNOw Touch.pdf
 
1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf1-C-POLAR Air Filter.pdf
1-C-POLAR Air Filter.pdf
 
3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf3 - Interaction between Cyber Security and School IT Policy .pdf
3 - Interaction between Cyber Security and School IT Policy .pdf
 
2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf2 - ELC學校網絡安全與防護.pdf
2 - ELC學校網絡安全與防護.pdf
 
1 - HKT Reporting.pdf
1 - HKT Reporting.pdf1 - HKT Reporting.pdf
1 - HKT Reporting.pdf
 
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
02 學校網絡安全漏洞的評估分享, 管理挑戰及趨勢。
 
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
08 Transform Endpoint Security with the World’s Most Secure PCs and Printers
 
07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士07 2020 網絡安全趨勢和安全小貼士
07 2020 網絡安全趨勢和安全小貼士
 
06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛06 網絡安全挑戰與防衛
06 網絡安全挑戰與防衛
 
04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件04 提升網絡安全 - 為電子學習打造先決條件
04 提升網絡安全 - 為電子學習打造先決條件
 
03 學校網絡安全與防衛
03 學校網絡安全與防衛03 學校網絡安全與防衛
03 學校網絡安全與防衛
 

Último

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Último (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

BYOD in e-Learning - Some Considerations

  • 2. What is BYOD? Source : YouTube – “BYOD in the 21st Century” by Marc-Anre Lalande Confidential and Proprietary
  • 3. BYOD in Commercial World   Gartner report (May 2013) “By 2017, Half employers will require Employee to supply their own device for work purpose” In US market, BYOD is growing strongly … Sources : 1Gartner report May 2013 and 2ReadWrite Survey Confidential and Proprietary
  • 4. BYOD Drivers  No Just Cost Saving   Productivity Gain Employee Satisfaction Sources : 3www.quest.com and 4 Intel Inc. • These are also the main drivers for eLearning. • Same tool students use for social interaction with peers and using it as educational tool. • BYOD makes 1:1 Computing more financially sustainable. Confidential and Proprietary
  • 5. Some Concerns in eLearning   Equity of Access Classroom Managemt Support & Servicing Security & Privacy Inevitable trend, create challenges for schools In 2011, Forsyth County, Georgia, became the 1st school systems in US to introduce BYOD policy. Damage, Loss & Theft Network Loading & Filtering Confidential and Proprietary
  • 6. Equity of Access   Equity of Access Classroom Managemt Support & Servicing Security & Privacy Not all students have devices, thus limits learning Some devices may NOT have the ability to run necessary applications • Loan devices for class and/or home use Damage, Loss & Theft Network Loading & Filtering Confidential and Proprietary
  • 7. Security and Privacy  Data and Network Breaches •  Equity of Access Security policy on device itself • Security & Privacy  Support & Servicing Damaage, Loss & Theft  Anti-virus / Anti-malware software eSafety Awareness • Classroom Managemt Separate networks for students No sharing of personal information Cyber-bullying policies Network Loading & Filtering Confidential and Proprietary
  • 8. Damage, Loss & Theft  Student safety •  Equity of Access Classroom Managemt Support & Servicing Security & Privacy Remind student to take special precaution Device theft and breakage • • Purchase insurance to protect investment Extend device warranty Damage, Loss & Theft Network Loading & Filtering Confidential and Proprietary
  • 9. Network Issues  Increasing no. of devices and traffic • Equity of Access • • Security & Privacy  Classroom Managemt Support & Servicing Damage, Loss & Theft Invest in sufficiently robust and high speed network infrastructure Good WiFi coverage, minimal interference Provision enough Internet bandwidth Access to only appropriate resources • Caching and Content Filtering Network Loading & Filtering Confidential and Proprietary
  • 10. Support & Servicing  The onus of responsibility and care lies with each student • Equity of Access  Security & Privacy Support & Servicing Teachers are NOT IT support • Encourage student to consult more tech-savvy classmates  Classroom Managemt Acceptable-use / Responsible-use Policy Breakage, Loss & Theft Baseline standardization to easy out device compatibility issues Network Loading & Filtering Confidential and Proprietary
  • 11. Classroom Management  Equity of Access Classroom Managemt Support & Servicing For example, Lamp On and Off, device face up … Security & Privacy Breakage, Loss & Theft Network Loading & Filtering Confidential and Proprietary
  • 12. Classroom Management Source : YouTube – “BYOT for Parents” by Amy May, Huntsville ISD
  • 13. Distraction? Source : Til Death, TV series by Fox Confidential and Proprietary
  • 14. Really a Distraction?    Digital technology shortening students attention spans; and Hampering their ability to preserve in the face of challenging tasks * “Wikipedia syndrome” • Students so accustomed to getting quick answers with a few keystrokes that they are more likely to give up when easy answer eludes them.  Kristen Purcell, Associate Director at Pew, “… What we’re labeling as ‘Distraction’, some see as a failure of adults to see how these kids process information. They’re NOT saying ‘Distraction’ is good but that the label of ‘Distraction’ is a judgment of this generation.” Education system MUST adjust to better accommodate the way students learn * Studies by “Pew Internet Project” Pew Research Center and Common Sense Media Confidential and Proprietary
  • 15. Digital Content   BYOD shift traditional Desktop software to applications based on web technology (browser) and cloud services Pedagogical practice change • Impact on teaching approach • May require a digital curriculum   Standardized device hardware means easy of training for teachers/students Accessibility • eBook content require reasonable Screen size and Screen magnification • Device may have limitation in supporting certain formats e.g. Flash, HTML5 …  Licenses • In past education license meant content can only be access within school. BYOD change this model significantly as access is now anytime and anywhere. Confidential and Proprietary
  • 16. BYOD Spectrum Limited Access Access based on teacher permission or planned events. May be supplemented with school-owned devices. Basic Enhanced Advanced Full Internet Can only access to access. restricted Internet. Differentiated Culture change and Little school access to school innovation begins. resources support. resources. Multiple Students begin to Device may be devices may be develop and create used during free brought to school. applications on time such as lunch. Onboarding with devices. Certified device security types only. onsite/offsite. Student Centric Teacher Centric Confidential and Proprietary