You are on page 1of 8

CO N N ECTE D YO UTH

Acceptable Use of
Technology in Schools:
Risks, Policies,
and Promises
Barriers to greater ubiquity of pervasive computing systems in formal
educational contexts come in the form of legal policies, moral standards,
and institutional responsibilities.

M
obile technologies and that, to date, few educational applications us-
social applications are ing mobile phones have been developed for the
nearly ubiquitous in the classroom.6–8
lives of many of America’s To explore mobile technology’s potential
youth. Mobile device own- to facilitate learning, the community at large
ership and social media use have been increas- must consider this technology’s use in schools
ing over the past few years: 93 percent of US as a complement to an understanding of its
teens go online, 73 percent use social network- impact outside schools. Specifically, schools’
ing sites,1 75 percent own a cell phone, and acceptable-use policies represent the current
66 percent use text messaging 2 (see Figure legal basis and historical precedents that de-
1). Children under 12 are one of the fastest- fine the climate of mobile phone and social
growing segments of mobile technology users, media use in classrooms. Understanding these
and 93 percent of six-to-nine-year-olds live in policies is an important first step toward cre-
homes with a cell phone. 3 However, despite ating a workable solution as a joint commu-
students’ strong connection nity of teachers, researchers, and designers.
Meg Cramer and Gillian R. Hayes with the digital world and Rather than holding teachers responsible for
University of California, Irvine media environments and these adapting teaching practices to technologies,
systems’ potential to improve or holding designers responsible for adapting
learning,4,5 they’re rarely used technologies to teaching practices, we explore
in US schools, where students how to address these issues together.
spend a significant percentage of their time— This article speaks to a broad audience,
more than 1,200 hours annually. including
In formal school settings, teachers, admin-
istrators, and other stakeholders must nego- • developers, who have designed products
tiate a complex set of issues when addressing for the classroom but aren’t seeing rapid
the use of mobile phones and other portable adoption;
networked devices. Efforts to integrate technol- • educators, who are both mobile-technology
ogy in schools include investment in curriculum practitioners and purveyors of knowledge
development and difficult purchase and instal- about their use; and
lation decisions. In addition, numerous legal • researchers, whose future work in this area
and policy issues contribute to the risk/ben- will determine the nature of ubiquitous com-
efit assessment. These challenges have meant puting in school environments.

Published by the IEEE CS n 1536-1268/10/$26.00 © 2010 IEEE PER VA SI V E computing 37


CONNECTED YOUTH

Figure 1. Teens’ mobile phone and


100
social media use has risen in the past
80 few years. Teens are using these devices
and applications at school, though not
Percentage

60
necessarily for school-related purposes.
40 Given the widespread nature of these
practices, it’s important to understand
20
the impact in school settings.
0
Go online Use social network sites Own a cell phone Use text messaging
Mobile social patterns of teens aged 12–17 networked technologies in classroom
activities lets students interact with
devices and applications they use in
Our data and analysis are drawn pri- ting to coordinate school projects, re- everyday life.14 The project’s research-
marily from literature and legal re- searching on the Internet to prepare ers assert that “youth can benefit from
views. Where appropriate and neces- for tests, sharing tips and shortcuts in educators being more open to forms of
sary, we describe our own experiences social networks, and participating in experimentation and social explora-
working in US public schools as both online study groups. tion that are generally not characteris-
practitioners and researchers during Mobile technology can open up new tic of educational institutions.”13
the past several years. Our corpus of possibilities for on-the-go and just-in- Of course, such experiments don’t
data includes thousands of hours of time learning. 3 Research has shown guarantee success, and educators
participant observation, direct ob- that mobile phones can address under­ should undertake interventions with
servation, and interviews. These in- served, hard-to-reach children, espe- some caution. Mobile devices might
terviews focused on the design and cially those who can’t attend school not find a place in the classroom.
evaluation of netbooks and their ap- regularly or don’t have alternative Once-novel technologies such as the
plications in K–12 (elementary and means of accessing digital resources.11 television also held similar promises
secondary) classrooms as well as the Mobile devices extend peer-based to change the nature of schooling but
design and evaluation of classroom- learning to outside the classroom set- aren’t particularly widespread means
specific tools for special education. ting: social media has encouraged of formal teaching and learning. Mo-
peers to learn from each other instead bile phone use in education requires
Potential Benefits of of drawing from adults’ authorita- pedagogical compatibility, includ-
Mobile Technology in Schools tive knowledge. Peer-based feedback ing designing learning environments
Many pundits and researchers argue scaffolds learning by surrounding with a focus on cultural responsive-
that mobile devices and social media individuals with others who are in- ness and situated learning. Even if
applications promise “anytime, any- vested in similar outcomes. Computer- schools adopt mobile phones and as-
where learning” and support new mediated communication could also sociated pedagogies, developing con-
pedagogical approaches for an age of limit the dominance of certain peers, tent and effectively integrating it in
connected learners. 3,9 Schools must as has been repeatedly shown with the curriculum might be a slow pro-
continually adapt to the influx of tech- adults.12 cess. As previous technologies have
nology and new societal demands, in- Furthermore, as the Digital Youth shown, the device can often be much
cluding the push for 21st-century skills Project shows, students create knowl- less important than the development
such as critical thinking and problem edge, establish identities, build rela- of content and practices to enable
solving, as well as student-centered tionships, and participate in other learners to reach educational objec-
and project-based learning models. activities that have important impli- tives in new ways.
Much like adults, students use their cations for social and cognitive devel-
mobile phones and social media for opment.13 According to the project’s The Tension between
both socializing and work-related ac- researchers, “youth are picking up Present and Future Goals
tivities. Students’ work usage patterns basic social and technological skills When considering the use, misuse,
are “closely related to the daily tasks they need to fully participate in con- and control of mobile phones and
and activities in their young lives,”10 temporary society.” In fact, online ac- social media in schools, we must also
including managing schoolwork and tivities are complex and often require consider education’s role in socializing
scheduling activities. Outside school skills and confidence with technology young people. Students’ engagement
hours, students have reported tex- and communication strategies. Using with educational materials, including

38 PER VA SI V E computing www.computer.org/pervasive


social media and pervasive computing trators, whether or not it’s for school cial learning environments.
systems, is an individually constructed purposes, and teachers and other staff
experience that helps them learn about often hide mobile device use from ad- Acceptable Use
the world around them. The education ministrators and students. During our In response to these myriad complex is-
system has an enduring social struc- fieldwork, teachers regularly noted that sues, most US schools have acceptable-
ture comprising roles, responsibilities, they would like to employ novel uses use policies to regulate mobile phone
processes, and traditions that carry of networked devices in their curricu- and social media use. Mobile phone
social meaning. What’s more, educa- lum but were restricted by policies that and pager bans were established in the
tion is a moral institution that serves prevented technology use for various late 1980s and early 1990s in response
society as a whole, focusing on what it reasons, including lack of technical in- to fears that students would use these
should do for its members and adding frastructure, network security regula- devices to traffic drugs16 and that usage
a moral dimension to the activities that tions, possible disruptions, and lack of would disrupt classrooms and control
happen in it. Specifically, schools have parent and staff support. In the schools structures.
a moral character in their rules, dress in which we conducted our work, re-
codes, student governments, and so on. sponses from administrators about Beyond the Ban
Consequently, their policies on technol- whether they’d actually punish any For many reasons, mobile phone and
ogy use both implicitly and explicitly teachers caught violating these poli- social media bans in US schools have
define what’s normal and what’s right cies varied dramatically from school to become unrealistic and even undesir-
and wrong. So, schools are both places school and even—in the same school— able.3 Parents and educators no longer
for individual and collaborative sense- from teacher to teacher. Almost uni- fear that student cell phones are pri-
making and places where students learn versally, when teachers used phones marily tools for drug deals and other
about morality and society’s expecta- in class for learning and other work- criminal activities. In addition, parents
tions of them. related tasks, such as communicating and other stakeholders have pushed for
Education is more than learning a with parents, they hid these practices increased acceptance of these devices
prescribed curriculum. Children and from administrators. for “emergency use” so that students
teens learn constantly, and formal edu- US schools are at a delicate tension can coordinate relatively benign events,
cation might simply be an attempt to point. There’s the inherent desire to such as rescheduling a carpool, and are
adjust what they would learn naturally maintain social propriety as defined prepared in the case of true crises, such
into what the adults of a society want over the past several decades of for- as a school shooting.
them to learn. Thus, educational sys- mal education. However, many educa- Although complete bans are un-
tems can be seen both as descriptions of tors favor the development of a more realistic, evidence exists to support
what’s currently important in society, individual student-centered learning the formulation of appropriate rules
including social roles, and as prescrip- model, often through the use of novel and regulations. Increased use of cell
tions for what society wants for the fu- technological solutions. As moral and phones and mobile devices for phone
ture.15 The tension between represent- political institutions, schools will likely calls and other purposes—for exam-
ing today’s standards and preparing play a significant role in developing and ple, social networking, instant messag-
students for the future requires schools transmitting societal rules about these ing, SMS (Short Message Service), and
to continually negotiate what is and
isn’t suitable for the classroom.
These negotiations have left students Formal education might simply be an attempt
without access to many of the technolo-
gies that are familiar in other aspects to adjust what teens would learn naturally into
of their lives but not yet considered ap-
propriate in the context of schooling. A what the adults of a society want them to learn.
2002 Pew Internet Research report re-
vealed that students find a “substantial technologies, based on their potential blogging—has brought about new con-
disconnect between how they use the risks and benefits. For example, e-mail cerns for schools, parents, and regula-
Internet for school and how they use and mobile phone etiquette, under- tory bodies.
the Internet during the school day.”10 standing of security and privacy risks, For example, mobile phones specifi-
Restrictions and bans don’t keep and preparation for the workplace in cally have come under much scrutiny
mobile devices off school premises or terms of online reputations and contri- regarding “sexting,” the practice of
eliminate their use. Students often hide butions are all issues schools will face sending or receiving sexually suggestive
their use from teachers and adminis- because of their inherent position as so- nude or nearly nude photos or videos.

JULY–SEPTEMBER 2010 PER VA SI V E computing 39


CONNECTED YOUTH

Sexting isn’t just a moral concern for institutional control, and puts schools is protected or subject to disciplinary
educators and parents; it’s also punish- at risk for lawsuits. Consequently, action, schools struggle to define what’s
able under child pornography laws. As administrators generally develop on campus as opposed to off campus
legislators and lawyers in some states acceptable-use policies to protect in light of new technologies that blur
are attempting to change the offense schools from these threats. these lines. A school entity can be dis-
from a felony to a misdemeanor specifi- rupted or threatened by speech acts that
cally for minors, laws are emerging to Defining What’s Free Speech originated away from school grounds,
deal with possession of such images on Whereas safety is an overt goal of and mobile phones and social media
mobile phones, “increasingly the locus acceptable-use policies, protection of can make certain speech acts more vis-
of teens’ personal, and seemingly pri- free speech is the dominant issue in rel- ible and persistent. Recent case law has
vate communication.”2 evant case law. Acceptable-use policies exposed incidents in which websites,
As a result of such challenges, most are binding contracts that students and social networking profiles, and instant
states now place the authority to de- parents enter into at the beginning of messages created off campus were
termine electronic communication’s each academic year. However, these thought to have compromised school
safety.
In some off-campus cases, courts
Recent case law has exposed incidents in which have ruled that disciplinary action
against students wasn’t warranted.
websites, social networking profiles, and instant This includes cases involving a parody
profile of a school principal (Layshock
messages created off campus were thought to v. Hermitage School District, 2007)
and an e-mail of a top-10 list regard-
have compromised school safety. ing a school’s athletic director (Kil-
lion v. Franklin Regional School Dis-
role in the classroom in the hands of policies must adhere to the legal rights trict, 2001). In other off-campus cases,
local school boards. These boards con- that the federal government has guar- courts have upheld schools’ disciplin-
sist of elected or appointed officials, anteed students, including the right to ary actions—for example, the cases of
educators, and community members free speech at school, secured in the a YouTube video depicting the killing of
who represent the school districts’ First Amendment of the US Constitu- a teacher (O.Z. v. Board of Trustees of
interest, determine policy, and lobby tion and confirmed in the 1969 semi- Long Beach Unified, 2008) and a hate
for and allocate resources. State stat- nal court case, Tinker v. Des Moines website directed at an algebra teacher
utes now allow—and, in some cases, School District. (J.S. v. Bethlehem Area School Dis-
require—local stakeholders to estab- Most legal cases we discuss here trict, 2002). Given that technological
lish policies concerning the posses- center on the schools’ rights to protect devices and networks are increasingly
sion and use of mobile phones, social students and faculty and the students’ used in a variety of physical locations,
media, and computational devices on rights to free speech. Not every form of a wide array of behaviors involving
school property, including disciplin- speech is protected. School administra- mobile social technologies obscures
ary measures.16 These policies reflect tors and teachers are obligated to disci- the boundaries between places such as
the legal obligations and rights of pline students for lewd, profane, or in- home and school.
schools and the governments that sup- decent speech; threats of violence; drug Acceptable-use policies are already
port them, as well as address concern trafficking; or other speech acts that in- changing in response to speech acts
for student and teacher well-being and terfere with others’ rights at school or occurring outside school property, a
school reputation. during school-related activities (Bethel trend we expect will continue. One
A safe school environment protects School District v. Fraser, 1986; Lovell such change is the inclusion of “rea-
students from physical harm and cre- v. Poway Unified School District, sonable foreseeability,” a test put forth
ates a space where they can focus on 1996; Morse v. Frederick, 2007; Tinker in Wisnieski v. Board of Education of
learning. Students concerned for their v. Des Moines School District, 1969). If Weedsport Central School District
well-being or safety will unlikely make a communication device is involved, it (2007). A report to the leadership of
substantial academic gains. Mobile needn’t be school property for a student schools in Southern California rec-
phones and social media can be av- to commit an offense; indeed, in many ommended policy changes that would
enues for “hate speech” or other ille- court cases, the devices belonged to the further delineate the nexus of accept-
gal speech that’s threatening and hurt- students or their parents. able off-campus use and the schools’
ful to students or faculty, undermines In establishing whether a speech act interest.17 If the speech act doesn’t

40 PER VA SI V E computing www.computer.org/pervasive


directly reach the school campus, such literature review from the Berkman paradigms. New technologically medi-
as a website that wasn’t accessed or Center for Internet and Society reiter- ated learning environments and cur-
created at school, it’s put to a test in ates that Internet sex crimes haven’t ricula often sanction the use of other
which an adult determines whether contributed to a rise in sex crimes materials (for example, online research
the information would have eventu- against minors.18 This report estab- and building off other students’ work
ally reached the school and caused lishes that the most frequent threats in online environments) that might
disruption. Reasonable foreseeability online are from bullying by known not have been allowed just a few years
gives schools the right to discipline peers. However, sexual predation re- ago. Researchers must examine how
students for speech acts committed mains a concern, and more research is students use mobile phones and social
off campus when a material disrup- necessary. media in situations of academic dis-
tion of and substantial interference Most teens use social media and mo- honesty. In particular, we must seek to
with others’ rights exist. Designed to bile phones to strengthen relationships understand whether these devices do
alleviate the confusion surrounding that they’ve established offline, not in fact make cheating easier and, if so,
the school’s authority to manage off- with strangers. It’s not uncommon for whether this ease makes cheating more
campus speech acts, this test should adolescents to congregate in unmod- prevalent.
result in more elaborate policies ad- erated spaces (physical or online).13
dressing both on- and off-campus use. When students can access virtual Observed Hazards
spaces anywhere, anytime, parents and Many longtime school problems, such
Risks for Schools and schools must consider a much broader as bullying, “at-risk” youth, and class-
Students definition of unsupervised or unmedi- room disturbances, are facing new com-
Schools’ usage patterns and policies are ated peer interaction. Beyond students’ plications regarding mobile devices and
shaped not only by the desire to mini- ability to interact with strangers, school social media. In addition, one possible
mize liability but also by the risks of policies must consider time spent with new problem is student multitasking.
social media and networked devices for friends in unsupervised locations where
students as users. much of their activity is supposed to be Bullying. Online bullying (also called
monitored. cyberbullying or online harassment)
Perceived Risks Another recent study receiving atten- is a substantial concern for educators.
A glance at any news website or parent- tion from the popular press states that According to the Internet Safety Tech-
ing magazine exposes the vast array of one-third of teens with mobile phones nical Task Force, online bullying can
perceived risks of engaging with social admitted to using them to cheat at involve “direct (such as chat or text
media and pervasive computing tech- least once in school.19 Although these messaging), semipublic (such as post-
nologies. However, stories in the pop- numbers are alarming at first glance, ing a harassing message on an e-mail
ular press can misrepresent research prompting reactions to “cybercheat- list), or public communications (such as
and generate panic about issues such ing,” the report doesn’t discuss the fre- creating a website devoted to making
as dangerous online solicitations. In quency or conditions under which the fun of the victim).”18 This can seriously
reality, online solicitation is incredibly
nuanced.
Findings from the Youth Internet Most teens use social media and mobile phones
Safety Surveys, commissioned by the
Center for Missing and Exploited to strengthen relationships that
Children, revealed that one in seven
youth has been sexually solicited on- they’ve established offline, not with strangers.
line.18 These and similar reports have
prompted most schools to deploy In- cheating occurred. Furthermore, stu- harm victims, who can experience de-
ternet filters and blocks on websites, dents reported ambiguity as to what pression, loneliness, lower grades, and
instant messaging, and other social they considered cheating (for instance, absenteeism. Online bullying becomes
media. But blocks meant to protect telling a student in a different class a school concern when it’s connected
students are much harder—if not about a surprise quiz). to the student’s well-being and a liabil-
impossible—to enforce when mobile Our fieldwork, although not quan- ity if it involves the school location or
devices are involved and students no titative and thus difficult to compare school peers.
longer need the school network for ac- directly to these results, indicates that In some ways, cyberbullying differs
cess. Furthermore, it’s unclear whether teachers are also unclear on the defi- from in-person bullying. Cyberbullies
the blocks prevent solicitation. A recent nition of cheating in modern learning aren’t restricted by distance, and their

JULY–SEPTEMBER 2010 PER VA SI V E computing 41


CONNECTED YOUTH

reach can be extended within the online concern for teachers—and likely the of people who engaged in substantial
environment. They might not be bullies one that comes to mind most readily multitasking as youth differed measur-
in the “real” world; rather, they might when considering mobile phone use in ably from that of those who hadn’t. 21
consider the Internet a place to exer- schools—is the potential disruption to It’s unclear what these changes mean
cise more dominance and aggression the classroom environment. Teaching in terms of long-term human cognitive
than they would in person. (Interest- is a challenge; teachers must manage and emotional capabilities; researchers
ingly, this effect mirrors the workplace, students’ diverse needs and behavior are continuing work in this area.
wherein computer-mediated commu- to meet an entire school year’s worth Parents and teachers, both in these
nication tends to flatten hierarchical of established goals in a timely man- reports and in our fieldwork, have been
power interactions.12) Current school ner. Mobile phones can undermine the less concerned about multitasking than
policies consider bullying a serious of- classroom’s paramount learning objec- about productivity, etiquette, and rude-
fense, and schools must respond to the tives, in which decorum, order, and ness or distraction. New rules and cop-
new trends in student harassment. control are valued. ing strategies should ensure that cross-
Teachers and administrators have generational expectations regarding
At-risk students. Mobile technology’s posted to blogs (for instance, www. these issues are met.
possible effect on at-risk students— commonsensemedia.org /cheating-
those who are potential dropouts, fail- goes-hi-tech) with complaints about Discussion
ing academically, or performing below in-class student behavior involving mo- As educators must begin to understand
grade level—is another area of concern bile phone and social media use. These pervasive computing technologies, re-
for schools. Studies show solicitation, statements often describe mobile device searchers need a solid understanding of
victimization, and online harassment use in classrooms no differently than classroom dynamics and management
aren’t correlated to a particular type of passing notes or whispering between strategies to develop technologies that
social media (for example, Facebook) students. Like other disruptive activi- support the realities of formal K–12
or practice (for example, SMS-based ties, then, mobile phone use can be learning environments. Experts in per-
texting). Instead, risk online is statisti- managed by teachers who engage their vasive computing, educational technol-
cally correlated with risk offline.18 Stu- students and provide proper guidance. ogy, and teaching must work together
dents struggling with a poor home en- Teachers have always diverted student to establish best practices for integrat-
ing technology into classrooms, using
mobile devices and applications to aug-
Experts in pervasive computing, educational ment school tasks rather than distract
from them.
technology, and teaching must work together We must continually ask ourselves
where pervasive and mobile technolo-
to establish best practices for integrating gies fit in formal schooling and where
educational technology’s boundaries
technology into classrooms. lie. Examining mobile devices’ and
applications’ roles in teenagers’ lives
vironment, physical abuse, depression, attention away from potential distrac- lets us think differently about educa-
and substance abuse tend to make poor tions and toward the task and material tional technology and education itself.
choices and might find themselves in at hand—which is difficult but doable. Many researchers argue that pervasive
undesirable situations online. computing systems, including mobile
Educators have long known that Multitasking. In 2006 and 2010, the and networked devices and the mobile
these offline issues are tied to academic Kaiser Family Foundation produced social applications running on them,
performance; they must now address two reports on concerns about multi- could support sociality and learning
online risks as well. We predict that tasking. The 2010 report stated that in schoolwork and overcome some
schools would fare better if they didn’t “development of mobile media has known barriers to learning by influenc-
target any particular device or media allowed—indeed encouraged—young ing pedagogical change. Schools can be
but rather focused on interventions for people to find even more opportunities sites for building interest in and under-
at-risk youth that include education throughout the day for using media,” standing of social media. However,
and resources addressing risky online with minority youth being the heaviest as we discussed earlier, substantial
practices. consumers of media content via mo- barriers to adoption and use still ex-
bile phones. 20 The 2006 report noted ist, with only preliminary evidence of
Classroom disruption. A significant that the brain structure and function educational outcomes from the use of

42 PER VA SI V E computing www.computer.org/pervasive


these technologies, often in university tion on social networking sites during commonplace in US public schools.
settings. We should seek scalable posi- school hours, schools might build les- However, these policies are often more
tive educational outcomes for K–12 sons into the curriculum about appro- like “unacceptable-use” policies, fo-
education. priate behavior in online environments cusing on how students shouldn’t use
For mobile devices to become truly and encourage students to use wikis, mobile phones and the consequences
pervasive in learning environments, social networking sites, and mobile for breaking the rules. These stringent
designers and researchers must also communication technologies. To ad- guidelines leave little room or desire for
acknowledge current and transition- dress concerns about online solicita- innovation in teaching or learning. The
ing acceptable-use policies as keys to tion, bullying, and excessive burden to technological landscape has changed
understanding the school environment
and administrators’ and parents’ legal
duties. The design implications drawn The next step toward a truly
from this analysis wouldn’t force perva-
sive technologies to fit perfectly in the connected youth is bridging the gap
tight contextual box that these policies
create. Instead, acceptable-use poli- between in-school and out-of-school technology
cies regulate speech and expose how
speech and technology can be con- use, both in policy and practice.
flated. So, the challenge of developing
mobile technologies for learning is de- at-risk youth, these environments could dramatically, and researchers have be-
termining how to enable free speech in be limited to only those affiliated with gun to demonstrate benefits to learning
a way that makes sense in the schooling a particular school or school district— through these novel technological solu-
environment. in much the same way Facebook was tions.4,5 The next step toward a truly
On the basis of our initial survey initially limited to Harvard students— connected youth is bridging the gap be-
of the landscape, we offer the follow- and moderated by educators. tween in-school and out-of-school tech-
ing thought experiments about perva- Again, this design concept prompts nology use, both in policy and practice.
sive technology design for classrooms. us to wonder what might happen as a Relevant stakeholders must ensure
These aren’t prototypical recommenda- result of such a system’s implementa- that school guidelines are flexible
tions or even suggested designs for fu- tion. Would the new environments be enough to protect students and faculty
ture systems. Rather, they’re meant to virtual “ghost towns” like so many cor- while supporting innovative practices.
provoke critical thought. porate intranet communities, or would Whereas the contracts must retain their
First, rather than ban text-based students engage in this new sandbox? legal base, schools can benefit from ex-
chatting in classrooms, educators Does critical mass take on different ploring possible additions that outline
could capture and share these conver- meaning when most of your social net- practices that aren’t just acceptable but
sations. This solution is analogous to work is in one organization? Would encouraged in the school environment.
encouraging students who are having students reject systems limited to only For example, policies could let students
side conversations in pairs or small their schools? These online environ- engage with mobile phone services and
groups to share their discussion with ments could transition from risk-laden social media to manage the school day
the class. What would be the result of enterprises to safe places for experi- and organize homework, tests, and
such an intervention? Almost certainly, mentation and learning. These systems activities. In addition, policies could
some students would “game” the sys- might even destroy data when students let teachers exercise discretion when
tem, intentionally using it as a stage on graduate to protect their reputations. experimenting with mobile devices in
which to perform. Others might avoid These concepts can be a starting lesson plans. Mobile phones’ potential
using the technologies altogether, and point for thinking about appropriate in schools lies in their features and ser-
still others might use the system to ask mobile-technology design in school vices that can be leveraged for not only
public questions on the lecture anony- environments. socializing and play but also learning
mously. Regardless of the specific re- objectives. Policies should remind stu-

M
sult, it’s interesting to think about how dents and parents of the ongoing nego-
educators can use communication obile phone bans have tiation between the desire to use tech-
technologies to foster discussion—and been in schools for nologies and school objectives, as well
yes, perhaps a little mayhem—in the more than two decades, as perceived versus actual risks.
classroom. and local control and The future depends on educators,
Second, rather than block participa- acceptable-use policies are becoming designers, and researchers working

JULY–SEPTEMBER 2010 PER VA SI V E computing 43


CONNECTED YOUTH

the AUTHORS gap-between-Internetsavvy-students-


and-their-schools.aspx.
Meg Cramer is a PhD student in the School of Information and Computer
Science at the University of California, Irvine. Her research focuses on user ex- 11. S.C. Watkins, The Young and the Digital:
perience in schools and informal learning environments. Specifically, she has What the Migration to Social Network
looked at 1:1 computing models and the design of personal devices in educa- Sites, Games, and Anytime, Anywhere
tion. Cramer has a BS in sociology and communication from Northwestern Media Means for Our Future, Beacon
University. She’s a National Science Foundation graduate research fellow. Con- Press, 2009.
tact her at mdcramer@ics.uci.edu.
12. L. Sproull and S. Kiesler, Connections:
New Ways of Working in the Networked
Organization, MIT Press, 1991.
Gillian R. Hayes is an assistant professor in the Department of Informatics
at the University of California, Irvine, Donald Bren School of Information and
13. M. Ito et al., Living and Learning with
Computer Sciences. Her research interests are human-computer interaction
New Media: Summary of Findings
and ubiquitous computing, specifically related to recording-keeping and sur-
from the Digital Youth Report, John
veillance technologies. Hayes has a PhD in computer science from the Georgia
D. and Catherine T. MacArthur Foun-
Institute of Technology. She’s a member of IEEE, the ACM, and SIGCHI. Con-
dation, 2008; www.macfound.org /
tact her at gillianrh@ics.uci.edu.
at f /c f /%7 B B 0386C E 3 - 8B2 9 - 4162 -
8 0 9 8 - E 4 6 6 F B 8 56 7 9 4%7 D / DM L _
ETHNOG_WHITEPAPER.PDF.

14. L. Kolb, Toys to Tools: Connecting Stu-


dent Cell Phones to Education, Int’l Soc.
3. C. Shuler, Pockets of Potential—Using for Technology in Education, 2008.
together to build adaptable systems Mobile Technologies to Promote Chil-
and construct usage policies that make dren’s Learning, Joan Ganz Cooney Cen- 15. D.H. Kamens, “Education and Democ-
sense in formal learning environments. ter, 2009; www.joanganzcooneycenter. racy: A Comparative Institutional Analy-
org/pdf/pockets_of_potential.pdf. sis,” Sociology of Education, vol. 61, no.
Technologists, policymakers, and re- 2, 1988, pp. 114–127.
searchers must all understand formal 4. S.W. Draper and M.I. Brown, “Increas-
schooling’s unique environment and ing Interactivity in Lectures Using an 16. “Pagers and Cellular Phones on School
Electronic Voting System,” J. Computer Property,” ECS StateNotes: Safety, Crime,
how pervasive technology practices Assisted Learning, vol. 20, no. 2, 2004, Violence, Commission of the States, 2004;
are being carried out there—not just pp. 81–94. www.ecs.org/clearinghouse/54/44/5444.
in students’ afterschool and home life, pdf.
5. C. Markett et al., “Using Short Message
on which most research currently fo- Service to Encourage Interactivity in the 17. F. Kemerer, “First Amendment and Pri-
cuses. To predict how students will be Classroom,” Computers & Education, vacy Dimensions of Student Misuse of
workers in the future, we must learn vol. 46, no. 3, 2006, pp. 280–293. Electronic Communication Devices in
California,” to be published in Center for
how they’re using technology for their 6. M. Kam et al., “Designing E-Learning Education Policy and Law, 2011; www.
work today. Games for Rural Children in India: A For- sandiego.edu/cepal.
mat for Balancing Learning with Fun,”
Proc. 7th ACM Conf. Designing Interac- 18. J. Palfrey et al., Enhancing Child Safety
tive Systems (DIS 08), ACM Press, 2008, and Online Technologies: Final Report
ACKNOWLEDGMENTS pp. 58–67. of the Internet Safety Technical Task
Force to the Multi-state Working Group
We thank the researchers at the University of 7. J.C. Reis, R. Bonacin, and M.C. Martins, on Social Networking of United States
San Diego Center for Education Policy and Law “Mobile Phone Interfaces for Informal Attorneys General, Berkman Center for
and Frank Kemerer for the valuable insights that Education,” Online Communities and Internet and Society, 2008.
helped shape this article. We also thank Julie Social Computing, LNCS 5621, Springer,
Kientz, Khai Troung, Jed Brubaker, Monica Ten- 2009, pp. 515–524. 19. “High-Tech Cheating: Cell Phones
tori, David Nguyen, and Alex Markov for their and Cheating in Schools,” Com-
comments on earlier drafts of this article. 8. S. Akkerman, W. Admiraal, and J. Huiz- mon Sense Media, June 2009; www.
enga, “Storification in History Education: commonsensemedia.org/sites/default/
A Mobile Game in and about Medieval files/ Hi-Tech%20Cheating%20-%20
Amsterdam,” Computers & Education, Summary%20NO%20EMBARGO%20
vol. 52, no. 2, 2009, pp. 449–459. TAGS.pdf.
REFERENCES
9. M. Hooft and K. Swan, Ubiquitous Com- 20. V.J. Rideout, U.G. Foehr, and D.F. Rob-
1. A. Lenhart et al., Social Media and puting in Education: Invisible Technol- erts, Generation M2: Media in the Lives
Young Adults, Pew I nternet and ogy, Visible Impact, Lawrence Erlbaum of 8- to 18-Year-Olds, Henry J. Kaiser
American Life Project, 3 Feb. 2010; Associates, 2007. Family Foundation, 2010; www.kff.org/
www.pewinternet.org/Reports/2010/ entmedia/upload/8010.pdf.
Social-Media-and-Young-Adults.aspx. 10. D. Levin, The Digital Disconnect: The
Widening Gap between Internet-Savvy 21. U.G. Foehr, Media Multitasking among
2. A. Lenhart, Teens and Sexting, Pew Students and Their Schools, Pew Inter- American Youth: Prevalence, Predic-
Internet and American Life Project, net and American Life Project, 2002; tors, and Pairings, Henry J. Kaiser Fam-
15 Dec. 2009; www.pewinternet.org/ www.pewinternet.org/Reports/2002/ ily Foundation, 2006; www.kff.org/
Reports/2009/Teens-and-Sexting.aspx. The-Digital-Disconnect-The-widening- entmedia/upload/7593.pdf.

44 PER VA SI V E computing www.computer.org/pervasive

You might also like