This document discusses student cell phone usage and policies in schools. It notes that most high school and many junior high students have cell phones, which provide internet access outside of school filtering. While most schools prohibit cell phone use, students find ways to text discreetly. The document presents examples of teachers legitimately using cell phones for educational purposes. It advocates for revising restrictive policies to allow cell phone use during passing periods and lunches. Some schools and student groups are campaigning to change prohibitive policies.
Dial D for DistractionThe Making and Breaking of Cell Phone.docxmariona83
Dial D for Distraction:
The Making and Breaking of Cell Phone
Policies in the College Classroom
Michael J. Berry
University of Colorado
Aubrey Westfall
Virginia Wesleyan College
Cell phones are nearly ubiquitous in the college classroom. This study asks two primary
questions regarding the making and breaking of in-class cell phone policies. In what manner
are students using their phones and how can faculty members minimize the potential for
phone-related distractions? To answer these questions we analyze original survey data from
nearly 400 college students across multiple public and private universities to better
understand the students’ impulse to use their phones during class. Results from the survey
demonstrate that more than 80% of students use their phone at least once per class and that
students generally believe this to be an acceptable practice. These student data are
supplemented with survey data from close to 100 college faculty to evaluate a range of
policy options for dealing with this issue. From this analysis, it is clear that the policies most
frequently implemented by instructors are typically perceived by students as the least
effective.
Keywords: cell phones, classroom distractions, mobile technology
INTRODUCTION
Cell phones have become a ubiquitous feature in American
society. A 2014 survey by a communication industry orga-
nization estimated that the United States, with a population
of approximately 317 million, had nearly 336 million wire-
less subscriptions, meaning that wireless connection pene-
tration stood at an astonishing 104.3% (CITA 2014). This
number continues to climb. Studies from a broad array of
disciplines have examined the myriad ways that cell phones
have transformed society, business, communication, health,
and numerous other facets of daily life, including education
(Campbell 2006; Gilroy 2004; Jenaro et al. 2007; Katz
2005; Wei and Leung 1999).
As educators well know, cell phones have become per-
vasive in the classroom. While many scholars offer sug-
gestions about how to make cell phones a useful
pedagogical tool (Katz 2003; Kinsella 2009; Lindquist
et al. 2007; Prensky 2005; Schell, Lukoff and Mazur
2013; Scornavacca et al. 2009; Valk et al. 2010), others
bemoan the distracting nature of cell phones in the class-
room. One scholar has gone as far as likening cell phone
interruptions during class to a form of “technological
terror,” citing the multitude of ways that a single cell
phone can disrupt an entire class (Gilroy 2004, 56). While
this term is admittedly hyperbolic, nearly every educator
has had to deal with problems related to student cell phone
use and interruptions during class. The actual distractions
caused by cell phones can vary widely across campuses
and classrooms. This study contributes to a small but
growing literature on cell phone use in the classroom
(Baker et al. 2012; Campbell 2006; Campbell and Russo
2003; End et al. 2010; Gil.
Incorporating student technologies into the curriculum in order to expand the classroom beyond the school. Thanks to Liz Kolb for the bulk of the material.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
2. STUDENT CELL PHONE USAGE
The majority of high school students, and
increasing number of junior high school students
have cell phones &/or electronic music devices
such as I-Pods or MP3 players.
Many of these student cell phones have internet
access that is outside a public school’s filtered and
monitored internet service
3. STUDENT CELL PHONE POLICY
The majority of school districts have prohibitive
policy regarding student cell phone use during the
school day.
All school districts have students and parents sign
an Internet Usage Policy of some sort—which may
be limited to the district’s own internet service and
not applicable to student’s cell phone internet.
4. WHERE THERE IS A WILL THERE IS A WAY
Anecdotal evidence
suggests that students
find ways around
prohibitive cell phone
policies
Girls sit at desks with
their purses in their laps
to have their phones at
their fingertips
Boys put the phone in a
pants pocket for quick
texting.
5. LEGITIMATE CELL PHONE USE IN CLASS
Some teachers keep a web page that includes
online homework which students can complete
using their cell phones.
Students finish class work can use their cell phone to
complete an homework assignment!
Some teachers allow students to do quick internet
research on their cell phone needed to answer
questions or complete classwork.
Teachers report that this increases student engagement
and responsibility for learning!
6. LEGITIMATE CELL PHONE USE IN CLASS
One Biology teacher used a texting lesson to model
DNA translation and transcription.
Students texted a DNA set to each other
Errors were discussed from the perspective of genetic
mutations
The technology was not the lesson, simply a tool of the
lesson.
Students were observed to be on task and highly
engaged in the lesson.
7. LEAD YOUR SCHOOL (LYS)
Lead Your School (LYS)
is an educational
consulting organization
that is a proponent of
bootleg technology in the
classroom.
Their website can be
found at:
http://www.leadyourschoo
l.com/
Their blog can be found
at:
http://leadyourschool.blog
spot.com/
8. SCHOOLS BRAVE ENOUGH TO TRY
A few pioneer schools allow students to use cell
phones during passing periods and lunches, such
as Lewiston High School in Lewiston, Maine
(LeBlanc, 2010). Anecdotal results indicate student
discipline violations for electronic devices in
classrooms have fallen now that students have a
time of the school day where electronic devices are
allowed (LeBlanc, 2010).
LeBlanc, C. (2010, October 10). School
climate, technology, and discipline. Sun Journal.
Retrieved from http://www.sunjournal.com/family-
2010/story/918258
9. STUDENTS CAMPAIGN FOR CELL PHONES IN
SCHOOLS
Increasing student
organization, student
newspapers are trying
to raise the awareness
level of adults in
schools
(teachers, administrato
rs, etc.) in order to
have student cell http://lahstalon.org/Archived_Issues/
10_11/Issue5.pdf
phone policies revised.
10. WHAT CAN YOU DO TO MAKE A
DIFFERENCE?
Check your school’s cell phone usage policy
Speak to administrators at both the campus and
district levels with the goal of raising awareness at
the futility of a prohibitive policy
Be sure to stress that using a cell phone for
cheating or plagiarism is never an authorized or
educational use of a student cell phone—meet
them where their first concern is.
Be persistent! It may take a while for a change to
happen, but it really is only a matter of time as
schools must compete with virtual schools!