In this reflective essay, I am going to share my experience on teaching Information Security course using various ICT-tools. It was the fourth course that I was teaching in the span of one year at Lulea University of Technology (LTU). I got good reviews and some critical comments in my three previous courses. Those courses have some limitations in terms of aligning intended learning outcomes, teaching/learning activities, and assessment. Particularly, utilization of ICT-tools in these courses was limited to Fronter and Adobe Connect. Before teaching my fourth course ‘Information Security’, I attended two courses in teaching and learning in higher education. In these courses, I came across two theoretical lenses constructive alignment (Biggs & Tang, 2011) and conversational framework (Laurillard, 2002). The theoretical lenses were useful to understand how to align various teaching/learning activities and assessment process. Furthermore, the framework also helped me to select different ICT-tools and integrate these tools to teaching/learning activities. In response to the questions such as why two theories, I would say constructive alignment provides a holistic approach to align intended learning outcome, teaching learning activities, and assessment, but says little about choice of media in this process. On the other hand, conversational framework as a complementary framework explains nicely on selection and use of the media. For example, Laurillard’s (2002) framework explains how teachers and students create a shared understanding through discussion, adaptation, interaction, and reflection. She also suggested that in this learning process, media provide different affordances, such as narrative (e.g. showing some text and images), interactive (e.g. responding to the participant), communicative (e.g. exchanging ideas through discussion forums), adaptive (e.g. changing the learning environment as per learners need) and productive (e.g. where learners can produce something while learning).
To start with the planning of mixed mode (distance as well as campus) teaching/learning activities as Salmon (2002) termed it as E-tivity. My prime concern was to use the ICT-tools to actively involve all the students, especially distance, in the classroom discussions and exercises. In Laurillard’s word, I used media as an interactive (Adobe), communicative (Fronter and Wiki) and productive (Security Lab) tool. In this approach, I establish myself as an e-mediators (Salmon, 2004). I applied the E-tivity concept here to bring learners and e-moderator (myself) in the same platform using online communication environment. To achieve this goal as Salmon suggested, I asked my teaching assistant, to provide all the necessary information to explore the ICT-tools that we were using in the course. Thereafter, I asked my students to write their perception of information security as the first assignment. The idea was to socialize and understand their pre-knowledge and expectation from the course. The initial short notes from students helped me to get an overall idea of students’ background with regard to the subject. The intended learning outcome of the course was to provide a broader picture of the information security as formal, informal and technical controls.
The next activity was to make interactive seminar. In this seminar, the students were already provided with reading materials before coming to classroom. Thereafter, they used to write down the essence of the reading materials and try to form a shared understanding through debate and discussions on the wiki. The biggest challenge in this case was to actively involve students in the discussions. For example, it was easy to engage on-campus student, but bringing distance students into the dialogue was not so easy. To tackle this situation, I used Adobe as an interactive tool. The benefits of using adobe are we can use microphone, chat room, discussion rooms, etc. to promote active participation. There are some technical challenges with using adobe such as poor sound and video quality, and low bandwidth in the end user side.
In my teaching/learning activities, some elements of flipped classroom (Baker, 2000) were also introduced. For instance, I use to record all the lectures so that distance student can watch the video in their own pace and post their reflections and questions in the wiki. The use of wiki was not only for writing learning diaries but also for the group discussion. For that I divided the students into different groups and assigned a case study so that they can generate discussion among their own group members. The idea of dividing students into smaller groups was to enact the sense of roles and responsibilities among group members. The enactment was easy in smaller group. However, at the same time, I gave the liberty to every student so that they can comments to any other groups’ task, if they found some discussions interesting to them. I was continually reading and monitoring their wiki entries. I have also used the learning management system (Fronter) as an information organizing tool. For instance all the lecture recordings, prescribed reading materials, and administrative information were uploaded on the Fronter. The information security course needs hands on exercises as well. Therefore, I designed some lab assignments. The micro approach in designing lab assignments was PSI personalized system of instruction (Sherman & Ruskin, 1978). The idea is to give assignment with specific deadline, and make the entire assignments path dependent. It means they have to complete first assignment to attempt the second one. Moodle another learning management system was deployed to handle security lab exercises. Salmon (2002) argued that E-tivies take place asynchronously; however, I utilized both synchronous and asynchronous approach to provide feedback and critique as an e-moderator. Furthermore, the ICT-tools facilitated an environment where learner/moderator exchange their information, co-create their knowledge, and developed the habit of being responsible for reflecting and assessing their own in addition to peers work.
The whole process helped me to do the formative assessment more efficiently and effectively. Likewise, I could easily monitor the contributions of each student as an individual as well as a contributor to the group work. For the summative assessment, I used case study analysis instead of multiple choice questions. The evaluation framework was derived from SOLO framework (Biggs & Tang, 2011). The framework suggests creating a deep learning among students. Therefore, to assess the students’ level of understanding, I reassigned the same task to them that they did at the beginning of the lecture. For example, write about their understanding of information security. And, as expected the understanding of students about the subject was enriched. For example, at the beginning, most of them wrote that they think information security is mostly about technical control; however, after the course, they realized that information security is not just about protecting hardware and software, but it is an interaction among technical, social, formal (policies), and informal (culture) controls.
Teaching students with different cultural and educational background, and mix of online and campus students using different media in education is always a challenging task. One of the challenges in the online education is to create a sense of presence as Dreyfus (2008) call it embodied involvement. That’s why Salmon (2002) suggested that the first step in this learning process should be ‘Socialization’. We have to create a rapport with the student. We as an e-moderator needs a lot of social skills to successfully implement eLearning platforms.
It is also important to make all the teachers’ familiar with the ICT-tools and pedagogical approaches. We need to apply useful and easy to use ICT-tools to the students. In my course, I found that once the students get familiar with the tools, they start using it in a very productive way. Likewise, teacher assistant plays an important role in providing technical support, managing assignments, and facilitating students to communicate with the teacher.
Similarly, conducting online examination can be another challenge. It is difficult to monitor the students during the exam time, and sometimes students get offended when they are asked to install spyware to take distance exam. One of the solutions can be to create affiliation with different distant educational institutions and provide examination facilities in those affiliated centers.
In conclusion, the growing use of internet and inter-connectivity have changed the teaching paradigms, therefore it’s a time to look for appropriate pedagogical approaches that can integrate the emerging technologies in teaching/learning activities.
Baker, JW. (2000). The" classroom flip": Using web course management tools to become the guide by the side. Paper presented at the 11th international conference on college teaching and learning, Jacksonville, FL.
Biggs, John, & Tang, Catherine. (2011). Teaching for quality learning at university: McGraw-Hill International.
Laurillard, Diana. (2002). Rethinking university teaching: A conversational framework for the effective use of learning technologies: Psychology Press.
Sherman, John Gilmour, & Ruskin, Robert S. (1978). The personalized system of instruction (Vol. 13): Educational Technology Publications Englewood Cliffs, NJ.