Site MapHelpFeedbackChapter Outline
Chapter Outline
(See related pages)

LECTURE OUTLINE: DISTANCE LEARNING AND INTERNET-RELATED ISSUES
  1. Distance Education and Distance Learning
    1. Distance education refers to the institutions or instructors delivering knowledge using telecommunication or remote capabilities.
    2. Distance learning means getting an education from a remote teaching site via TV or
    3. computer.
    4. Both terms are used interchangeably here.
  2. Distance Education--A Short History
    1. The first attempt at distance education was by correspondence in 1873, with students using self-study instructional materials. Correspondence is still used today but with limited interaction between teacher and student.
    2. Educating individuals by correspondence was acknowledged in 1883 by the Chatauqua College of Liberal Arts.
    3. The National University Extension Association (NUEA) was created in 1915 and widened the focus on distance education.
    4. The University of Chicago's 1933 study indicated that distance education should be done on an experimental basis.
  3. Distance Learning Technologies
    1. Different technologies are being used to enhance distance learning such as radio, television, telephone, computers, and desktop video conferencing.
      1. Radio reaches a large geographical area at a low cost, can provide the same message to a large audience, and is useful in such curriculum areas as music or language arts.
      2. Television grew out of experimentation with radio in the 1950s, but educational television grew at a slower pace until the 1960s and 1970s, because of teacher resistance and expense.
        1. The success of Britain's Open University fostered respect for learning that combines television broadcast, radio, correspondence work, and summer school work and led to a similar school in the United States.
        2. The first United States Open University began in 1971 in New York and made higher education available through such means as study guides, radio and television broadcasts, and correspondence materials.
      3. Microwave networks developed and costs improved in the late 1970s and early 1980s.
      4. Women's participation in distance education in the 1980s and 1990s led to increased demand.
      5. Audio conferencing uses telephones to permit interactions between individuals or groups at two or more locations, via a speakerphone, microphone, amplifiers, and speakers, and is an effective way to conduct a meeting, give simple instructions, or interview a person.
      6. Video can be delivered over distances using cable, television, satellite, microwave transmission, and closed circuit, with different levels such as one-way video, two-way video and audio, and one-way video with two-way audio. Television usually involves one-way transmission of information.
        1. Today, schools use programs developed by the Public Broadcasting System, and CNN's Newsroom and its local stations.
        2. This system reaches a mass audience, but has a dependence on time and lacks interaction between instructor and learner.
        3. A telephone connection or speakerphone between two locations adds talkback capacity.
        4. Two-way, interactive video with cameras, video monitors, and microphones simulates face-to-face instruction, with transmissions by cable, fiber optic, microwave, or digital-grade telephone lines.
        5. Two-way, interactive video can be difficult and expensive to operate.
      7. Computers can be used with the CD-ROM and instructional software to take a correspondence course, as the student can use still pictures and graphics along with audio conferencing for learning on the Internet, including making telephone calls over the Internet.
      8. The teacher can supplement distance learning with e-mail, computer conferencing, and chat functions on the Web.
        1. E-mail allows students to contact the teacher personally.
        2. Computer conferencing allows two or more individuals to talk to each other.
        3. A chat function allows students to type information back and forth on the Web.
      9. Desktop videoconferencing, which allows the user to participate in a conference without leaving a location physically, can be utilized if the user has the proper hardware and software.
        1. Hardware requirements are a network or modem connection, speakers, microphone, video camera, and computer.
        2. Software such as White Pine's CUSeeMe or Microsoft's Net Meeting require a large bandwidth, have slow and jumpy transmissions, and require high-speed connections to work effectively.
        3. Using the telephone lines and modem, the teacher and student can communicate with each other.
        4. Improvements in video compression have led to faster transmissions of images.
        5. The teacher can use a LCD projection panel connected to the computer to enlarge the group of people that can see the screen video.
        6. Teachers can use electronic blackboards known as whiteboards, for on-screen, static images.
    2. Different approaches to distance education include varying levels of computer and online use in courses.
      1. The best approach focuses on student needs, content requirements, and the constraints of the situation, such as the delivery system.
      2. The instructor can integrate reading materials into the distance learning.
      3. Video and audio conferencing can provide interaction with classmates, instructors, and experts.
      4. Students can receive videotapes of lessons.
      5. The fax machine can be used to distribute assignments or announcements.
  4. The Future of Distance Learning
    1. Distance learning is expanding, as more schools and universities are developing two-way audio and video capabilities.
      1. Learners are physically separated from each other and the instructor.
      2. Instructors use audio and video conferencing and computer communication to teach.
      3. Students can take classes from anywhere in the world, often with a flexible schedule.
      4. Distance learning is being used in medicine, law, education, and business.
      5. Distance learning reaches learners in remote, rural locations.
      6. Distance learning reaches learners who are homebound, physically disabled, or unable to travel.
      7. Distance learning can link two classrooms together, so that students can communicate with one another.
      8. Professors throughout the United States are engaging in electronic instruction to reach a diverse audience that is inaccessible through ordinary, traditional classroom instruction.
      9. Several universities and school districts offer distance learning and virtual degrees.
      10. The Virtual High School was started in Massachusetts in 1996 with 43 registered high schools and 13 states registered.
      11. Online learning is growing, in part due to expanded bandwidth, online instructional materials, and student growth in universities.
      12. Two major online companies providing software for distance learning are WebCT and Blackboard.
      13. Although American children are increasingly computer literate, they continue to score poorly on worldwide tests in science and mathematics.
      14. The concept of a dynamic educational cyberspace is being developed to motivate learners and provide important instructor-student communication through technology.
  5. Drawbacks of Distance Education
    1. Distance learning offers many benefits, but also has drawbacks.
      1. Distance learning can be difficult and expensive to implement.
      2. Distance learning is technically difficult to set up and requires experts.
      3. Distance learning requires much planning and scheduling of rooms and equipment.
      4. Distance learning requires redesign of lessons and activities to take advantage of the technology.
      5. Distance learning requires properly trained teachers, extra time, effort, and resources.
      6. Distance learning technology may be misused.
      7. Not all subjects or instructors are suited to distance learning.
  6. Internet Issues
    1. Computers have improved education, medical care, and business operations.
    2. Computers have helped artists be more creative and factories and businesses operate more efficiently.
    3. Computer advances also mean problems with Internet security, invasion of privacy, crime, identity theft, spam, plagiarism, and copyright.
  7. Internet Security
    1. Even though data are encrypted or encoded, it is possible to steal information on the data and difficult to verify the user's identity.
    2. Because of security problems, many school districts are using a security system called firewall, a combination of software and hardware that protects communication from computers outside the network, to protect their systems against hackers.
    3. Many people do not want to see unsolicited e-mail or spam on the Internet.
      1. Gary Thuerk was the first person to send spam in 1978, an e-mail ad he sent to 600 people over a network of university and government computers.
      2. The amount of spam sent in 2003 was 76 billion e-mails.
      3. Spam often outnumber legitimate e-mails.
      4. Congress and courts are attempting to lessen or prohibit spam.
      5. E-mail accounts need to be protected by deleting spam, by users complaining to the Internet Service Provider, and by using the spam filter that comes with the browser.
      6. Filtering and monitoring software like Cyber Patrol or Net Nanny helps ensure a safer online experience by disallowing access to inappropriate or unwanted Web sites and e-mail.
      7. Some search engines, especially designed for student use, allow only appropriate sites to be accessed.
    4. Privacy concerns and identity theft issues have increased, as the number of computer systems grows.
      1. A technology called a cookie keeps records of the user's online activities on the hard drive and are "data entries sent from a Web server to a special file on your machine" (Dyrli, 1997).
      2. Computer record matching is a positive tool in locating criminals but may allow unauthorized users access to information on someone's spending and personal habits.
    5. the 1970s and 1980s, a series of laws were enacted to protect privacy by controlling the collection and dissemination of information.
      1. The Freedom of Information Act (1970) gives individuals access to information about themselves collected by federal agencies.
      2. The Privacy Act (1974) allows people to decide what data can be recorded by a government agency, and how it can be used.
      3. The Family Education Rights and Privacy Act (1974) regulates access to public and private school grades and anecdotal records stored on computers.
      4. The Comprehensive Crime Control Act (1984) prohibits unauthorized individuals from accessing a computer file to obtain information protected by the Right to Financial Privacy Act and protected information found in a computer file.
    6. Viruses are a harmful force in computing today.
      1. A virus is a set of instructions or code that infects computer files by duplicating itself, a harmful capability in computing.
      2. Individuals write a virus or code and bury it in an existing program; when the program is loaded into a computer, the virus attaches itself to other programs that reside in the computer's memory, causing a chain reaction that infects and damages programs.
      3. When a person inserts an infected disk into a computer's memory, the computer's files become infected.
      4. Computers can be infected electronically, when a hacker creates a virus and sends it over phone lines to a local network; since the network is connected to thousands of computers, the infection is carried to all the connected computers.
      5. A virus program can be a silly annoyance or a destructive force, wiping out huge amounts of data.
      6. E-mail attachments have become a common way to spread viruses.
      7. Viruses are hard to detect because they can be programmed to wreak havoc immediately or to lie dormant until a given future date. Viruses programmed to go off on a certain date are called "time bombs."
    7. Worms, often confused with viruses, are destructive programs that replicate themselves throughout disk and memory, using up the computer's resources and eventually crashing the system.
    8. Famous examples of both viruses and worms exist that have cost billions of dollars in computer disruptions.
    9. Virus protection software such as Symantec's Norton AntiVirus and McAfee Virex scans for viruses, repairs damaged files, and prints status reports.
    10. Currently, thousands of viruses exist, with ten to fifteen new viruses discovered every day.
    11. The best protection against virus infection involves frequently backing up the hard disk; downloading into a single computer as opposed to a network system; using virus protection programs to check every piece of software for a virus before loading it into the computer's memory; locking the USB drive or zip disk, so they cannot be destroyed; and not opening attachments, unless the sender is known.
    12. Some warnings about computer viruses are hoaxes.
    13. Crime involving computers is increasing, costly, and often difficult to detect.
      1. The cost to the nation of computer crime or abuse amounts to billions of dollars annually.
      2. Criminals steal computers from homes and businesses, manipulate financial accounts, break into secret government computer files, and use computer on-line services to lure young people to their homes.
      3. Research indicates that in the United States, at least 80% of businesses have been victimized by at least one criminal incident involving computers, costing up to $9 billion annually.
      4. Security budgets for companies have increased 188% since 1998.
      5. the early 1980s, there were no clear laws to prevent individuals from accessing military computers or White House computers.
      6. Famous hackers such as Murphy, Zinn, Mitnick, and Levin and his Russian gang perpetrated serious criminal violations, with hacker clubs committing crimes for amusement.
      7. Hacking is now associated with theft and fraud, although computer hackers were once seen as computer geeks who had a curiosity about how things operated.
      8. Some computer programmers with limited access to mainframes created "hacks," or programming shortcuts to complete computing tasks faster, some of which were superior to the original program.
      9. The best known hack was created in 1969, when Dennis Ritchie and Ken Thompson, two Bell Lab employees, came up with an open set of rules to run computer machines and called their standard operating system UNIX.
      10. Many hackers have gone underground, because of fear of prosecution.
    14. Identity theft occurs when someone steals a person's identity by using that person's social security number, driver's license, or other type of identification.
      1. The thief uses the information to purchase items, open new charge accounts, and access the person's existing accounts.
      2. Identity theft is easy today on the Internet, because there is no human contact.
      3. The Federal Trade Commission reported that in the past five years, 27.3 million Americans have been victims of identity theft, at a cost to businesses and individuals of $48 billion.
      4. Protecting passwords, safeguarding computer hardware, taking caution in communicating on the Internet, and updating antivirus and firewall protection can help guard against identity theft.
    15. Plagiarism, representing or using someone else's work as one's own without giving proper credit, is an escalating problem on the Internet.
      1. Students' access to gigantic amounts of information makes discovering plagiarism increasingly difficult for teachers.
      2. A high percentage of students admit to cheating and plagiarizing.
      3. Plagiarism Web sites help teachers and others combat plagiarism, by comparing papers to billions of pages of content on the Internet.
    16. Copyright laws are designed to protect downloaded material from the Internet, as well as books, videos, newspapers, reference materials, magazines, and software, from being copied or used without the creator's and/or publisher's permission.
      1. Teachers should understand the Copyright Act of 1976 and be able to explain the concept of fair use, the guidelines that regulate how educators can copy and use copyrighted materials.
      2. The use of copyrighted material by teachers should consider purpose and character of the use; nature of the work; portion used of the work; and effect of use on the marketplace.







Computer Education for TeacherOnline Learning Center

Home > Chapter 10 > Chapter Outline