Professional Documents
Culture Documents
Acceptable Use of
Technology in Schools:
Risks, Policies,
and Promises
Barriers to greater ubiquity of pervasive computing systems in formal
educational contexts come in the form of legal policies, moral standards,
and institutional responsibilities.
M
obile technologies and that, to date, few educational applications us-
social applications are ing mobile phones have been developed for the
nearly ubiquitous in the classroom.6–8
lives of many of America’s To explore mobile technology’s potential
youth. Mobile device own- to facilitate learning, the community at large
ership and social media use have been increas- must consider this technology’s use in schools
ing over the past few years: 93 percent of US as a complement to an understanding of its
teens go online, 73 percent use social network- impact outside schools. Specifically, schools’
ing sites,1 75 percent own a cell phone, and acceptable-use policies represent the current
66 percent use text messaging 2 (see Figure legal basis and historical precedents that de-
1). Children under 12 are one of the fastest- fine the climate of mobile phone and social
growing segments of mobile technology users, media use in classrooms. Understanding these
and 93 percent of six-to-nine-year-olds live in policies is an important first step toward cre-
homes with a cell phone. 3 However, despite ating a workable solution as a joint commu-
students’ strong connection nity of teachers, researchers, and designers.
Meg Cramer and Gillian R. Hayes with the digital world and Rather than holding teachers responsible for
University of California, Irvine media environments and these adapting teaching practices to technologies,
systems’ potential to improve or holding designers responsible for adapting
learning,4,5 they’re rarely used technologies to teaching practices, we explore
in US schools, where students how to address these issues together.
spend a significant percentage of their time— This article speaks to a broad audience,
more than 1,200 hours annually. including
In formal school settings, teachers, admin-
istrators, and other stakeholders must nego- • developers, who have designed products
tiate a complex set of issues when addressing for the classroom but aren’t seeing rapid
the use of mobile phones and other portable adoption;
networked devices. Efforts to integrate technol- • educators, who are both mobile-technology
ogy in schools include investment in curriculum practitioners and purveyors of knowledge
development and difficult purchase and instal- about their use; and
lation decisions. In addition, numerous legal • researchers, whose future work in this area
and policy issues contribute to the risk/ben- will determine the nature of ubiquitous com-
efit assessment. These challenges have meant puting in school environments.
60
necessarily for school-related purposes.
40 Given the widespread nature of these
practices, it’s important to understand
20
the impact in school settings.
0
Go online Use social network sites Own a cell phone Use text messaging
Mobile social patterns of teens aged 12–17 networked technologies in classroom
activities lets students interact with
devices and applications they use in
Our data and analysis are drawn pri- ting to coordinate school projects, re- everyday life.14 The project’s research-
marily from literature and legal re- searching on the Internet to prepare ers assert that “youth can benefit from
views. Where appropriate and neces- for tests, sharing tips and shortcuts in educators being more open to forms of
sary, we describe our own experiences social networks, and participating in experimentation and social explora-
working in US public schools as both online study groups. tion that are generally not characteris-
practitioners and researchers during Mobile technology can open up new tic of educational institutions.”13
the past several years. Our corpus of possibilities for on-the-go and just-in- Of course, such experiments don’t
data includes thousands of hours of time learning. 3 Research has shown guarantee success, and educators
participant observation, direct ob- that mobile phones can address under should undertake interventions with
servation, and interviews. These in- served, hard-to-reach children, espe- some caution. Mobile devices might
terviews focused on the design and cially those who can’t attend school not find a place in the classroom.
evaluation of netbooks and their ap- regularly or don’t have alternative Once-novel technologies such as the
plications in K–12 (elementary and means of accessing digital resources.11 television also held similar promises
secondary) classrooms as well as the Mobile devices extend peer-based to change the nature of schooling but
design and evaluation of classroom- learning to outside the classroom set- aren’t particularly widespread means
specific tools for special education. ting: social media has encouraged of formal teaching and learning. Mo-
peers to learn from each other instead bile phone use in education requires
Potential Benefits of of drawing from adults’ authorita- pedagogical compatibility, includ-
Mobile Technology in Schools tive knowledge. Peer-based feedback ing designing learning environments
Many pundits and researchers argue scaffolds learning by surrounding with a focus on cultural responsive-
that mobile devices and social media individuals with others who are in- ness and situated learning. Even if
applications promise “anytime, any- vested in similar outcomes. Computer- schools adopt mobile phones and as-
where learning” and support new mediated communication could also sociated pedagogies, developing con-
pedagogical approaches for an age of limit the dominance of certain peers, tent and effectively integrating it in
connected learners. 3,9 Schools must as has been repeatedly shown with the curriculum might be a slow pro-
continually adapt to the influx of tech- adults.12 cess. As previous technologies have
nology and new societal demands, in- Furthermore, as the Digital Youth shown, the device can often be much
cluding the push for 21st-century skills Project shows, students create knowl- less important than the development
such as critical thinking and problem edge, establish identities, build rela- of content and practices to enable
solving, as well as student-centered tionships, and participate in other learners to reach educational objec-
and project-based learning models. activities that have important impli- tives in new ways.
Much like adults, students use their cations for social and cognitive devel-
mobile phones and social media for opment.13 According to the project’s The Tension between
both socializing and work-related ac- researchers, “youth are picking up Present and Future Goals
tivities. Students’ work usage patterns basic social and technological skills When considering the use, misuse,
are “closely related to the daily tasks they need to fully participate in con- and control of mobile phones and
and activities in their young lives,”10 temporary society.” In fact, online ac- social media in schools, we must also
including managing schoolwork and tivities are complex and often require consider education’s role in socializing
scheduling activities. Outside school skills and confidence with technology young people. Students’ engagement
hours, students have reported tex- and communication strategies. Using with educational materials, including
Sexting isn’t just a moral concern for institutional control, and puts schools is protected or subject to disciplinary
educators and parents; it’s also punish- at risk for lawsuits. Consequently, action, schools struggle to define what’s
able under child pornography laws. As administrators generally develop on campus as opposed to off campus
legislators and lawyers in some states acceptable-use policies to protect in light of new technologies that blur
are attempting to change the offense schools from these threats. these lines. A school entity can be dis-
from a felony to a misdemeanor specifi- rupted or threatened by speech acts that
cally for minors, laws are emerging to Defining What’s Free Speech originated away from school grounds,
deal with possession of such images on Whereas safety is an overt goal of and mobile phones and social media
mobile phones, “increasingly the locus acceptable-use policies, protection of can make certain speech acts more vis-
of teens’ personal, and seemingly pri- free speech is the dominant issue in rel- ible and persistent. Recent case law has
vate communication.”2 evant case law. Acceptable-use policies exposed incidents in which websites,
As a result of such challenges, most are binding contracts that students and social networking profiles, and instant
states now place the authority to de- parents enter into at the beginning of messages created off campus were
termine electronic communication’s each academic year. However, these thought to have compromised school
safety.
In some off-campus cases, courts
Recent case law has exposed incidents in which have ruled that disciplinary action
against students wasn’t warranted.
websites, social networking profiles, and instant This includes cases involving a parody
profile of a school principal (Layshock
messages created off campus were thought to v. Hermitage School District, 2007)
and an e-mail of a top-10 list regard-
have compromised school safety. ing a school’s athletic director (Kil-
lion v. Franklin Regional School Dis-
role in the classroom in the hands of policies must adhere to the legal rights trict, 2001). In other off-campus cases,
local school boards. These boards con- that the federal government has guar- courts have upheld schools’ disciplin-
sist of elected or appointed officials, anteed students, including the right to ary actions—for example, the cases of
educators, and community members free speech at school, secured in the a YouTube video depicting the killing of
who represent the school districts’ First Amendment of the US Constitu- a teacher (O.Z. v. Board of Trustees of
interest, determine policy, and lobby tion and confirmed in the 1969 semi- Long Beach Unified, 2008) and a hate
for and allocate resources. State stat- nal court case, Tinker v. Des Moines website directed at an algebra teacher
utes now allow—and, in some cases, School District. (J.S. v. Bethlehem Area School Dis-
require—local stakeholders to estab- Most legal cases we discuss here trict, 2002). Given that technological
lish policies concerning the posses- center on the schools’ rights to protect devices and networks are increasingly
sion and use of mobile phones, social students and faculty and the students’ used in a variety of physical locations,
media, and computational devices on rights to free speech. Not every form of a wide array of behaviors involving
school property, including disciplin- speech is protected. School administra- mobile social technologies obscures
ary measures.16 These policies reflect tors and teachers are obligated to disci- the boundaries between places such as
the legal obligations and rights of pline students for lewd, profane, or in- home and school.
schools and the governments that sup- decent speech; threats of violence; drug Acceptable-use policies are already
port them, as well as address concern trafficking; or other speech acts that in- changing in response to speech acts
for student and teacher well-being and terfere with others’ rights at school or occurring outside school property, a
school reputation. during school-related activities (Bethel trend we expect will continue. One
A safe school environment protects School District v. Fraser, 1986; Lovell such change is the inclusion of “rea-
students from physical harm and cre- v. Poway Unified School District, sonable foreseeability,” a test put forth
ates a space where they can focus on 1996; Morse v. Frederick, 2007; Tinker in Wisnieski v. Board of Education of
learning. Students concerned for their v. Des Moines School District, 1969). If Weedsport Central School District
well-being or safety will unlikely make a communication device is involved, it (2007). A report to the leadership of
substantial academic gains. Mobile needn’t be school property for a student schools in Southern California rec-
phones and social media can be av- to commit an offense; indeed, in many ommended policy changes that would
enues for “hate speech” or other ille- court cases, the devices belonged to the further delineate the nexus of accept-
gal speech that’s threatening and hurt- students or their parents. able off-campus use and the schools’
ful to students or faculty, undermines In establishing whether a speech act interest.17 If the speech act doesn’t
reach can be extended within the online concern for teachers—and likely the of people who engaged in substantial
environment. They might not be bullies one that comes to mind most readily multitasking as youth differed measur-
in the “real” world; rather, they might when considering mobile phone use in ably from that of those who hadn’t. 21
consider the Internet a place to exer- schools—is the potential disruption to It’s unclear what these changes mean
cise more dominance and aggression the classroom environment. Teaching in terms of long-term human cognitive
than they would in person. (Interest- is a challenge; teachers must manage and emotional capabilities; researchers
ingly, this effect mirrors the workplace, students’ diverse needs and behavior are continuing work in this area.
wherein computer-mediated commu- to meet an entire school year’s worth Parents and teachers, both in these
nication tends to flatten hierarchical of established goals in a timely man- reports and in our fieldwork, have been
power interactions.12) Current school ner. Mobile phones can undermine the less concerned about multitasking than
policies consider bullying a serious of- classroom’s paramount learning objec- about productivity, etiquette, and rude-
fense, and schools must respond to the tives, in which decorum, order, and ness or distraction. New rules and cop-
new trends in student harassment. control are valued. ing strategies should ensure that cross-
Teachers and administrators have generational expectations regarding
At-risk students. Mobile technology’s posted to blogs (for instance, www. these issues are met.
possible effect on at-risk students— commonsensemedia.org /cheating-
those who are potential dropouts, fail- goes-hi-tech) with complaints about Discussion
ing academically, or performing below in-class student behavior involving mo- As educators must begin to understand
grade level—is another area of concern bile phone and social media use. These pervasive computing technologies, re-
for schools. Studies show solicitation, statements often describe mobile device searchers need a solid understanding of
victimization, and online harassment use in classrooms no differently than classroom dynamics and management
aren’t correlated to a particular type of passing notes or whispering between strategies to develop technologies that
social media (for example, Facebook) students. Like other disruptive activi- support the realities of formal K–12
or practice (for example, SMS-based ties, then, mobile phone use can be learning environments. Experts in per-
texting). Instead, risk online is statisti- managed by teachers who engage their vasive computing, educational technol-
cally correlated with risk offline.18 Stu- students and provide proper guidance. ogy, and teaching must work together
dents struggling with a poor home en- Teachers have always diverted student to establish best practices for integrat-
ing technology into classrooms, using
mobile devices and applications to aug-
Experts in pervasive computing, educational ment school tasks rather than distract
from them.
technology, and teaching must work together We must continually ask ourselves
where pervasive and mobile technolo-
to establish best practices for integrating gies fit in formal schooling and where
educational technology’s boundaries
technology into classrooms. lie. Examining mobile devices’ and
applications’ roles in teenagers’ lives
vironment, physical abuse, depression, attention away from potential distrac- lets us think differently about educa-
and substance abuse tend to make poor tions and toward the task and material tional technology and education itself.
choices and might find themselves in at hand—which is difficult but doable. Many researchers argue that pervasive
undesirable situations online. computing systems, including mobile
Educators have long known that Multitasking. In 2006 and 2010, the and networked devices and the mobile
these offline issues are tied to academic Kaiser Family Foundation produced social applications running on them,
performance; they must now address two reports on concerns about multi- could support sociality and learning
online risks as well. We predict that tasking. The 2010 report stated that in schoolwork and overcome some
schools would fare better if they didn’t “development of mobile media has known barriers to learning by influenc-
target any particular device or media allowed—indeed encouraged—young ing pedagogical change. Schools can be
but rather focused on interventions for people to find even more opportunities sites for building interest in and under-
at-risk youth that include education throughout the day for using media,” standing of social media. However,
and resources addressing risky online with minority youth being the heaviest as we discussed earlier, substantial
practices. consumers of media content via mo- barriers to adoption and use still ex-
bile phones. 20 The 2006 report noted ist, with only preliminary evidence of
Classroom disruption. A significant that the brain structure and function educational outcomes from the use of
M
sult, it’s interesting to think about how dents and parents of the ongoing nego-
educators can use communication obile phone bans have tiation between the desire to use tech-
technologies to foster discussion—and been in schools for nologies and school objectives, as well
yes, perhaps a little mayhem—in the more than two decades, as perceived versus actual risks.
classroom. and local control and The future depends on educators,
Second, rather than block participa- acceptable-use policies are becoming designers, and researchers working