Does BYOD Mean Bring Your Own Device OR Bring Your Own Disaster? 2013 TBEA Conference, Murfreesboro, TN

 1  Does BYOD Mean Bring Your Own Device OR Bring Your Own Disaster? 10/2/2013 2013 TBEA Conference, Murfreesboro, TN Dr. Robert E. “Skip” Gr...
Author: Lawrence Owen
3 downloads 2 Views 2MB Size


1



Does BYOD Mean Bring Your Own Device OR Bring Your Own Disaster?

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

Dr. Robert E. “Skip” Grubb, Jr., COI Director Criminal Justice Program Cumberland University Memorial Hall, Room 210-D 1 Cumberland Square Lebanon, TN 3087-3408 [email protected] Dr. K. Virginia Hemby, COI Professor Business Communication & Entrepreneurship Department Middle Tennessee State University MTSU Box 40 Murfreesboro, TN 37132 [email protected] 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

2

 



BYOD/BYOT in Simple Terms Anecdotally, BYOD started with executives bringing Macs into the enterprise, drawn by the combination of coolness, simplicity, and quality that Apple perfected for a certain class of individuals who is willing to spend a bit more. TechTarget’s “Consumerization of IT State of the Industry Survey 2012 reported that 60% of companies said that their users connect to the corporate network with personal computers from outside the office, and more than 40$ of companies do the same from inside the office” (Rolls, 2013).

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

3

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

4

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

5



10/2/2013

6



2013 TBEA Conference, Murfreesboro, TN

        

Community Engagement Team Development Physical Infrastructure Management Tools Development Portal Development AUP (Acceptable Use Policy) Development Curriculum Forsyth County Schools (GA) has implemented a BYOT Device Considerations Equity Task Force to learn about issues related to students who do not have a device (Tim Clark, Usage (and monitoring) Coordinator of Instructional Technology for Forsyth County Schools, 2/15/2013, Webinar).

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

7

Parents  Students  Staff  Business Leaders  Board Members 

Oak Hills School District (Ohio) http://ohlsd.org Suburban school district on the west side of Cincinnati, OH. Enrollment of 8200 students; high school has 3000 in grades 912 10/2/2013



Key Points o Create and nurture a

culture where technologyembedded instruction is an integral part of the everyday learning in ALL classrooms o Explore the appropriate role and use of personal technology devices in and out of the school environment

2013 TBEA Conference, Murfreesboro, TN

8



Oak Hills School District team includes



o Director of eLearning o eLearning Coach and Course o o o o o o o

Developer EMIS Coordinator EMIS Secretary Assistant Principals eLcs eKids Principals Parents, Community, Board Members

Oak Hills School District (Ohio) http://ohlsd 10/2/2013



eLcs are teachers within the District who support eLearning ; they test new technologies, plan and run professional development, and advance district technology goals eKids are students in the District who participate in an eLearning educational track; they learn new technologies (often at a deep level), assist staff with technology needs, and develop additional eLearning opportunities

2013 TBEA Conference, Murfreesboro, TN

9

 

Any BYOD program requires a solid infrastructure that will support the demand of student devices Oak Hills uses o Cisco Dual-Radio wireless access points o Strategically positioned to minimize RF interference between each

other o Provides approximately 95% building coverage for wireless G standard devices o Current configuration consists of multiple SSIDs (networks) [currently being altered to consist of 2 networks—one for Staff and Students and a Guest network] o Configuration is secured via WEP and is available to any Student/Employee using District-Owned Equipment.

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

10



WEP is Wired Equivalent Privacy and was an early attempt at securing wireless networks. WEP has 3 settings: o Off (no security) o 64-bit (weak security) o 128-bit (a bit better security)



Better security is now available o VPN (Virtual Private Network) o DES (Data Encryption Standard) o WPA/WPA2 (Wi-Fi Protected Access)

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

11

 



 

The New Cold War—China’s alarming cyberattacks on the United States According to Defense Secretary Leon Panetta, “These cyberattacks could be the next ‘cyber-Pearl Harbor’” (The Week, 2/15/2013) The Pentagon announced it was hiring 4000 extra code crackers, online security experts, and hackers to boost its Cyber Command Division (2/15/2013) Mobile malware still small, but ‘malnets” to rise up (Armerding, 2/12/2013). “With 70% of employees across corporate networks using a personal smartphone or tablet, growing attack surface too big to ignore” (Armerding, 2013).

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

12





Mobile device operating systems are still more secure than desktop or laptop systems but today’s mobile malware spam and phishing attacks will increasingly be delivered via mobile malware networks (Armerding, 2013). Why? Users have a tougher time spotting classic mobile threats. o URLs are not fully displayed o Users are taught to expect mobile websites to look different than their

desktop versions o Mobile versions of websites are often developed and hosted by third parties o Android-devices are worse than iOS devices because of unregulated apps market and the diversity of Android-based devices (Armerding, 2013). 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

13



Hardware o Have students develop a strong password of at least four characters o o o o



for their devices Have students set up devices to automatically lock after five minutes of inactivity Have students configure devices to automatically wipe after 10 failed log-in attempts or if a device is lost or stolen Have students enable local encryption Make students aware that they must take care of their own devices

Software o Since students will present with a variety of devices, school districts

have the challenge of providing software tools that can be utilized by all students on ANY device. This challenge can be addressed through the use of a private and public cloud.

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

14



DIVIDE o A mobile application that allows you to access work data without

compromising privacy. Divide creates a separate, encrypted workspace on your iPhone or iPad, delivering secure access to your work email, contacts, and calendar, while keeping your personal life private from your employer. Syncs with Exchange ActiveSync, Google Apps, Lotus Notes, and more. Divide can also be remotely managed by IT professionals as a solution to BYOD - learn more at www.divide.com.

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

15

 





Adopt a Mobile Device Management (MDM) platform that can manage PCs and Macs as well as mobile devices Set up a private cloud for your district and utilize VMWare when possible (so that students can download VMWare View client and create a virtual desktop complete with district licenses software) (Oak Hills School District, 2013). Ensure that your MDM conforms to stringent security and privacy regulations—the Children’s Internet Protection Act [Pub. L. No. 106-554 and 47 USC Section 254(h)] If possible, implement an automated compliance management system that will detect and revoke access to district systems

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

16





Use the portal as a central location that collects resources for students, staff, and parents/guardians—a “one stop shop” for information Since the portal will be accessed via varying devices (smart phones, tablets, laptops, desktops), ensure that the design of your site is appropriate for both a tiny screen and a large screen

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

17

 

Be realistic with your policy and use positive terms for appropriate behavior Outline procedures for following or not following the AUP o “The use of technology to provide educational material is not a

necessity but a privilege. A student does not have the right to use his or her laptop, cellphone, or other electronic device while at school without the approval of school personnel. When abused, privileges will be revoked” (Forsyth County Schools, BYOT Policy/Agreement, BYOT Student Agreement para, 2013). o “Only the Internet gateway provided by the school may be accessed while on campus. Personal internet connective devices such as, but not limited to, cell phones/cell network adapters are not permitted to be used to access outside Internet sources at any time” (Forsyth County Schools, BYOT Policy/Agreement, Internet para., 2013). 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

18



Include a BYOT Student Agreement as part of your BYOT Policy/Agreement (Forsyth County Schools, 2012, excerpt): “Students and parents/guardians participating in BYOT must adhere to the Student Code of Conduct, as well as all Board policies, particularly Internet Acceptable Use (Policy IFBG) and Internet Safety (Policy IFBGE). Furthermore, the student must agree to the following conditions: o The student must take full responsibility for his or her technology

device. The school is not responsible for the security of student-owned technology. o The technology must be in silent mode while on school campuses and while riding school buses. o The technology may not be used to cheat on assignments or tests, or for non-instructional purposes” (www.forsyth.k12.ga.us/byotpolicy). See also, http://ohlsd.org/portfolio/byod-developing-an-acceptable-use-policy/ for the Oak Hills Local School District. 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

19



20



Bring Your Own Device/Technology to Facilitate Teaching and Learning

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

Think about your goals for BYOD/BYOT  Survey your students to determine what technologies they have available  Communicate your initiative to your parents and community 

Discuss classroom strategies and rules for using and caring for the technology  Have your students bring in their devices and test setup and connectivity  Have students describe their experiences with their own technology 

Forsyth County Schools (Georgia); www.forsyth.k12.ga.us 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

21

 

What are your goals? What are your expectations from BYOD/BYOT? o Foster creativity o Engage students o Improve access o Integrate technology o Promote higher-level thinking o Encourage collaboration o Raise achievement

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

22



iPods, iPads, iPhones o Many students have these devices but keep in mind, these devices

do NOT run Flash o Students will need to download apps for these devices at home 

Nintendo DSs and DSis o Nintendo DS does NOT connect to the Internet but students can still

use them to chat with one another in class o Students have to accept terms of use on the Nintendo DSi at home before they can use the Internet at school 

Laptops and netbooks o Parents may have set an administrator password that prohibits

students from being able to connect to the Internet

Oak Hills School District works with a local vendor to provide low-cost, refurbished devices to families (Todd Yohey, Superintendent, 2/15/2013 Webinar). 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

23



Is it difficult to make use of a variety of different devices and operating systems? o “I would not suggest requiring the same device. That is not the

world. Computing and eLearning has become a very personal activity. Some students prefer smaller devices, such as smart phones, some tablets, and some laptops. Our goal is anytime, anywhere, any device” (Todd Yohey, 2/15/2013, Webinar, “Making BYOD Work in Schools). o “We focus on the instruction in the classroom and not so much on the technology. We encourage the students to bring in their own devices to class and teachers and students work together to learn new ways to research and show what they’ve learned” (Tim Clark, 2/15/2013, Webinar, “Making BYOD Work in Schools). 10/2/2013

2013 TBEA Conference, Murfreesboro, TN

24





Students without their own technology should be able to use school devices (school districts should have a plan in place for this situation) If students have access to school- or district-provided laptops or netbooks, they could use these devices to participate in classroom activities that build on what other students are doing with iPads, iPhones, etc., by using mindmapping software or other programs.

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

25

   

Is your school community receptive to sending technology/ devices to school? You need a BYOD/BYOT Policy/Agreement that you can send home with students to obtain parental permission You could/should consider hosting an information session for parents to discuss your BYOD/BYOT initiative You should make sure that parents understand that their children (your students) are responsible for their own devices

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

26



Develop rules and procedures for how the devices will be used in the classroom o Will students be allowed to use one another’s devices? o How will students know when to shut down their devices?



You will need to ensure that classroom doors are always locked when leaving the room so that students’ devices are safeguarded

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

27

  

You will want to test the connectivity capabilities of the different devices first Then you could have students work in groups to explore the possibilities of their devices Teachers need to remember that your students will probably be experts for their own technology

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

28

 

  

Have students participate in a discussion about their use of technology at school Have students with iPads, iPods, iPhones . . . research free apps at home (with their parents’ permission) for use at school Encourage students to practice the technology rules of your class Assign a research project—a great way for students to practice their new skills Keep parents informed and excited about your BYOD/BYOT classroom initiative—send email home (or post to your web site) describing your first BYOD/BYOT day

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

29

 Audioboo

(audioboo.fm)—a great site with mobile apps for all platforms, for recording one’s voice and then embedding it into a site/blog

10/2/2013

 Cel.ly

(cel.ly)—instant mobile network for connecting people and tracking topics; also great for managing cell phones from a web environment

2013 TBEA Conference, Murfreesboro, TN

30

 ClassPager

(www.classpager.com)-takes the classroom “clicker” to the next level through the use of text messaging, polling, Q/A, and the ability to update students and parents at any time

10/2/2013

 gText

(www.gText.com) –a great site for free group texting; a user can send files, texts, photos, and more.

2013 TBEA Conference, Murfreesboro, TN

31

 SnappSchool

(www.snappschool.com) –great site to engage parents for free with SS messenger; a user can also send class-wide updates by text message or email straight from his/her phone

10/2/2013

 StudyBlue

(www.studyblue.com) – a great way to study online flashcards, quizzes, or study guides; also has a free mobile app for all platforms

2013 TBEA Conference, Murfreesboro, TN

32

 StudyBoost

(https://studyboost.com) –a great way to study on a cell phone through text messaging and SMS

10/2/2013

 TXTNLRN

(txtnlrn.wordpress.com) –an innovative site for teaching and learning through text messaging; everything associated with this site is done through the use of texting, including signing up for a class

2013 TBEA Conference, Murfreesboro, TN

33

 Wiffiti

(http://wiffiti.locamoda .com/) –a great site that allows users to send texts from a cell phone to a display or screen; a new version with more features is coming soon

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

34







With proper planning and the implementation of security measures, acceptable use policies, and the “buy-in” of parents/guardians and other appropriate personnel, students may bring their own technologies into the school and experience a world of discovery beyond the four walls of the classroom. In addition, with the proper curriculum in place (technology should not LEAD the teaching but should supplement), students can learn to use higher-order thinking skills for problem solving. The key, however, is the security of the system—have the appropriate steps been taken to secure students’ activities and data.

10/2/2013

2013 TBEA Conference, Murfreesboro, TN

35

Suggest Documents