skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Examining Technologies Used in K-12 School Districts: A Proposed Framework for Classifying Educational Technologies
K-12 schools utilize a growing number of technologies to operate effectively, ranging from technologies for learning to technologies that manage student and personnel data. We share findings from an analysis of 23 school district websites for technologies used in a number of K-12 school districts surrounding a public, research university in a southeast region of the United States. In addition, we also share findings on technologies used in K-12 school districts from interviews with 12 technology directors. We propose a technology classification framework including educational technologies, management technologies, support technologies, networking technologies, and security technologies in addition to identifying various technologies that are currently used by school districts based on this framework. This framework has implications for K-12 technology adoption and clarifying the roles of school technology personnel.  more » « less
Award ID(s):
2309400
PAR ID:
10396839
Author(s) / Creator(s):
 ;  ;  ;  ;  ;  
Publisher / Repository:
SAGE Publications
Date Published:
Journal Name:
Journal of Educational Technology Systems
Volume:
51
Issue:
3
ISSN:
0047-2395
Format(s):
Medium: X Size: p. 282-302
Size(s):
p. 282-302
Sponsoring Org:
National Science Foundation
More Like this
  1. With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers. 
    more » « less
  2. Increased use of technology in schools raises new privacy and security challenges for K-12 students---and harms such as commercialization of student data, exposure of student data in security breaches, and expanded tracking of students---but the extent of these challenges is unclear. In this paper, first, we interviewed 18 school officials and IT personnel to understand what educational technologies districts use and how they manage student privacy and security around these technologies. Second, to determine if these educational technologies are frequently endorsed across United States (US) public schools, we compiled a list of linked educational technology websites scraped from 15,573 K-12 public school/district domains and analyzed them for privacy risks. Our findings suggest that administrators lack resources to properly assess privacy and security issues around educational technologies even though they do pose potential privacy issues. Based on these findings, we make recommendations for policymakers, educators, and the CHI research community. 
    more » « less
  3. Problem. As school districts develop K-12 computer science pathways, they seek guidance and examples from other districts with established pathways. Research Question. Our research question for this project was: How have K-12 school districts in a Midwest state built and implemented a K-12 CS pathway? Methodology. We conducted virtual interviews with 15 representatives from 11 Midwest school districts on developing CS pathways, using a semi-structured protocol and thematic analysis. Findings. CS pathways are often initiated by champions, frequently beginning in high school and progressing to elementary then middle school. CS teachers find it challenging to meet, a variety of funding sources are used, and equity often focuses on student enrollment. Implications. Many school districts need to create CS pathways while others continue to build and refine their pathways; many of whom desire support in that process. The findings can be used by districts, support organizations and policymakers to inform the development of CS pathways. 
    more » « less
  4. Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and “bring your own technology” initiatives, attention to these topics is becoming increasingly important. A total of 593 middle school students were surveyed about digital footprints and concerns about social media. The results show that 17% started using social media at age nine or younger, 40% accepted friend requests from people they do not know, and 40% reported that their parents did not monitor their social media use, which calls for the needs of cyber-security education. These middle school students reported using social media most often to connect with their friends, share pictures, and find out what others are doing. They indicated that Instagram (27%), SnapChat (25%) and YouTube (25%) were their most used social media sites. These students have concerns about social media due to inappropriate postings, getting hacked, getting their feelings hurt, lack of privacy, inappropriate pictures, bullying, negativity, and stalkers. This study informs teachers, administrators, technology facilitators and parents on social media use by students. 
    more » « less
  5. The Four Corners Noyce Program seeks to encourage talented science, technology, engineering, and mathematics (STEM) majors and professionals to become high school mathematics and science (including engineering and computer science) teachers in the Four Corners area. The geographic area includes both tribal and public K-12 school districts. The program seeks to serve high schools in these districts. 
    more » « less