Lesson Planning

Starting on Monday we will all be planning our little hearts out, making sure that we all incorporate our ICTS!! Firstly, lesson planning has been drilled into us since day one about its importance and frankly I don’t know what I would do without it in some instances.

The learning objectives are one thing that has always been stressed to me while on professional experiences, therefore I always make sure I begin my lesson stating what we will have achieved by the end of the lesson. I believe this is a vital component to any teaching practice as it sets the student up for their learning as well as establishes your expectations. Furthermore, the ACARA and QCAA content descriptors allow for the teacher to organise what they want students to learn, in conduction with the use of backwards mapping or other frameworks to organise their ideas.

Take a further look at Abi’s blog post about creating authentic learning experiences!

If you need further information about content descriptors here are the following websites to locate them.


IWB’s on Professional experience

As most classrooms these days have Interactive Whiteboards within the classroom many of use will be utilising this technology whilst we are on professional experience! Over time the functionality of the IWB’s have increased and with this so have the tools, techniques and approaches we use on them. Take a further look at this reading that further explains some of these approaches and techniques and tools.

Some approaches you may take to using the device are through the use of touch devices such as the special pen for the whiteboards or the use of a finger. Furthermore this enables the students to easily be involved in the creation and exploration of their learning, as they are heavily involved in the discovery process. Take a look at Maggie’s blog 5495939989_ae06088140to find out more about the students discovery process whilst on professional experience and possible fears that may be had.

CLEM? another acronym…

Ok, so how many new terms does one need know? Being bombarded with acronyms. However this little beauty is designed to scaffold how we learn to use ICTs to enhance, amplify and transform student learning! So what does it all mean?…

C- Community: Many (but not all) ICTs used in learning and teaching will have developed a community of people using that ICT. These communities might be very tight knit and focused around one website. Or, they might be spread out across various websites and face-to-face meetings.

L- Literature: Some ICTs used in learning and teaching will have been part of research around their use in learning and teaching. That research can (but not always) provide useful insights into what works and what doesn’t.

E- Examples: While the community and the literature can be useful, it is often easiest (for most people) to learn about a new ICT (or just about anything) from examples. Especially examples that are close to what you’re looking for. Examples can often be great inspiration for your own lessons.

M- Model: All ICT have designed/programmed with a particular model embedded into the ICT. Know this model and the words used to describe its components, and learning how to use it effectively can be so much simpler.

Take a look at this blog post to see what another student thinks about the CLEM framework.

What I’ve learnt

As a result of the learning path the issues and strategies available to support the safe, responsible and ethical use of ICT in learning and teaching have been made available with many resources being presented to gain greater insight.

As my next professional experience is in a state school it will be important to look at:

  • Cyber safety in QLD state schools
  • The National Safe Schools Framework
  • Safe Schools Hub
  • The schools student safety and wellbeing policies
  • ICT General Capabilities in the Australian Curriculum

As a result of this learning path, I have gained more questions to ask my mentor regarding the schools policies on safety and cyber networking. As well as what sort of technologies will be made available to me in a HPE teaching context. This be my greatest challenge I can foresee as many ICTs cannot be used in the outside environment. Therefore a lot of planning will need to take place…

Tamika establishes some of her own thoughts in her blog post relating to the learning path activities.

Is technology taking over our lives?.. Ahhh


With ongoing concerns of the impact of screen time on personality, social skills, health and other factors. Are students losing heir ability to read human emotions? Is there such thing as too much technology? These days we spend more and more hours looking at a screen. Its recommended by American Academy of Paediatrics (AAP) that children under 2yrs have NO screen time and children between 3-18yrs have 2hrs or less per day. I for know, I spend a majority of the day on my laptop some days, so whats the implications for our students? This article  reports on a range of research and perspectives on ‘screen time’.

Take a look at Jessica Packers recent blog post about the ‘joys of being a teacher’, sure to lighten the spirits.

Digital citizen

The term “digital citizenship” is (sometimes) a part of this move. It moves away from a focus on risk and protection and replaces it with a focus on what is required to be a productive member of and contributor to the digital society. This includes some recognition of what it takes to be safe, but the ultimate focus is on making a contribution.

The Australian Government’s Stay Smart Online Site offers more information on the safe use of digital technologies.

Budd:e is a “Cyber security education package” provided by the Australian government. Amongst its many resources are videos outlining what students are doing online and what can happen to them online. There are options for primary and secondary students. Budd:e is education about the technical and behavioural measures we can use to help reduce risk and bolster cybersecurity, personal safety for the online world and security for our internet-enabled devices. Take a look at the website for more information and video presentations describing range of things regarding secondary students.

The social invasion norm…

As we all know the saying, big brother is watching.. just like the TV show and the movie/book 1923, theres someone watching our every move through online data collections/ depositaries. Its the social norm that we all post online whether that be Facebook, instagram, twitter, snap chat  ect, and this is posing a threat to our freedom and possibly future career endeavours.

Current technologies such as your iPhone has the ability to identify where a photo was taken, as well as a variety of other information. This information is stored in an Exchangeable image file format (Exif). In its barest form the photo will have information that includes the name of the file, the image format and the date the image was taken. If you camera/device has a GPS, the Exif information will include the latitude and longitude of where the photo was taken. Now thats an invasion of privacy! Especially if it fell into the wrong hands….

Take a look at this link establishing the danger of posting photos online about children.


Bullying Vs. Cyber-bullying

How much do you think you know about bullying? We’ve all been to school, we’ve all seen it or experienced it, but how do we as future educators stop it?

Students who often take part in bullying have inflated self-esteem rather than low self-esteem

The most effective way to control bullying in a secondary school context is to not teach a student who is being bullied to use more effective social skills as it hasn’t been shown to stop a bullying situation. When a teacher focuses on just teaching the student who is being bullied social skills without first stopping the bullying, they send a message to this student that it is their fault they are being bullied because they don’t have good social skills. However, all students gain confidence from regular opportunities to learn and practise social skills. Sometimes having these skills can reduce the likelihood that a student will be bullied.

Cyber-safety is really important for all students and teachers, as password protect all our personal information and logins. It is therefore vital you don’t use your personal information on unsafe websites.