Some of you will have read the 2015 OECD report: “Students, Computers and Learning: Making the Connection” which indicates that, based on an analysis of PISA data, where ICT is used in the classroom its impact on student performance is mixed, with no appreciable improvements in student achievement in reading, mathematics or science. Is the OECD right in their assessment? Are we wasting our time with using ICT in education? How do others see this? It would be good to have some articles on this important topic in future issues of EAIT. Beginning this issue is an article from Martin Tallvid (University of Gothenburg, Sweden), titled: “Understanding teachers’ reluctance to the pedagogical use of ICT in the 1:1 classroom”. The article begins by noting the emergence of one laptop per student-initiatives (1:1) as a solution to disappointment with the pace of transformation of teaching methods in schools. Many research studies, however, have indicated that despite major expenditure, increased access and improved technical equipment, few teachers have integrated ICT in the curriculum in a way that leads to significant changes in classroom practice. The article explores teachers’ reluctance towards the pedagogical use of personal laptops in secondary schools and identifies five different, but overlapping, patterns in the explanations for their reluctance: lack of technical competence, not worth the effort, insufficient material, diminishing control and lack of time. “Politic of security, privacy and transparency in human learning systems” is an article by Adil Jeghal, Lahcen Oughdir and Hamid Tairi (University of Sidi Mohamed Ben Abdellah, Taza, Morocco). This article looks at the important role of Information Security, especially in newer education environments such as e-learning environments. The authors point out that the preservation of confidentiality has become a major issue for the majority of applications that process personal information and that the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. Educ Inf Technol (2016) 21:499–502 DOI 10.1007/s10639-016-9479-8
Read full abstract