Social Constructivism and Deep Learning in Privacy, Security, Freedom: Social Concerns for the 21st Century A Case Study in Best Practice Using Empire State College’s Online Learning Methodology Center for Distance Learning Nicola Martinez, Director of Curriculum and Instructional Design Who We Are: Empire State College Locations around New York State The Center for Distance Learning (CDL) serves adult students around the world Center for Distance Learning adult learning centered offers asynchronous online courses in five, 15-week semesters per year leading enroller in the SUNY Learning Network partner with several institutions such as eArmyU & Navy, public & private organizations, labor unions, member institution, The Consortium of Higher Education for Emergency and Fire Services (CHEEFS) offering baccalaureate degrees for the fire and emergency services community through the National Fire Academy’s Degrees at a Distance Program. Center for Distance Learning Course Statistics 350 distinct online courses, many with multiple sections 46 courses developed/revised for Sept 03 50+ courses developed or revised for Jan 04 68 courses developed or revised for Sept 04 70 courses developed or revised for Jan 05 55+ courses in development or revision for Sept 05 all courses on a two year revision cycle managed using the Coursetrak system Areas of Study The Arts | Business, Management & Economics | Community & Human Services | Communications, Humanities & Cultural Studies | Educational Studies | Historical Studies | Human Development | Labor Studies | Science, Math & Technology | Social Theory, Structure & Change Objectives objectives: 1. Present a case study of an Empire State College Center for Distance Learning Online Course (Privacy Security, Freedom: Social Concerns for the 21st Century) illustrating best practices in the application of social constructivist learning theory. 2. The author will demonstrate how carefully designed course materials, as well as interactive, collaborative learning activities requiring data collection, evaluation of evidence, and interpretive analysis challenge the student and enrich the learning experience. Social Constructivism social constructivism: is a variety of cognitive constructivism that emphasizes the collaborative nature of much learning. Social constructivism was developed by post-revolutionary Soviet psychologist, Lev Vygotsky. Vygotsky was a cognitivist, but rejected the assumption made by cognitivists such as Piaget and Perry that it was possible to separate learning from its social context. He argued that all cognitive functions originate in, and must therefore be explained as products of, social interactions and that learning was not simply the assimilation and accommodation of new knowledge by learners; it was the process by which learners were integrated into a knowledge community. (from: http://gsi.berkeley.edu/resources/learning/social.html). The zone of Proximal Development. Vygotsky’s zone of proximal development: It is the distance between the actual developmental level as determined by independent problem solving and the level of potential development as determined through problem solving under adult guidance or in collaboration with more capable peers. Vygotsky, L. (1978). Mind in Society. (Trans. M. Cole). Cambridge, MA: Harvard University Press. Social Constructivism and Instructional Models social constructivism and instructional models: Instructional models based on the social constructivist perspective stress the need for collaboration among learners and with practitioners in the society (Lave & Wenger, 1991; McMahon, 1997). Lave and Wenger (1991) assert that a society’s practical knowledge is situated in relations among practitioners, their practice, and the social organization and political economy of communities of practice. For this reason, learning should involve such knowledge and practice (Lave & Wenger, 1991; Gredler, 1997). Kim, B. (2001). Social constructivism. In M. Orey (Ed.), Emerging perspectives on learning, teaching, and technology. Social Constructivist Approaches social constructivist approaches can include : reciprocal teaching peer collaboration cognitive apprenticeships problem-based instruction webquests anchored instruction and other methods that involve learning with others (Shunk, 2000). Kim, B. (2001). Social constructivism. In M. Orey (Ed.), Emerging perspectives on learning, teaching, and technology. Deep Learning 1 deep learning: Marton and Saljo (1976) developed the following definitions of surface and deep approaches to learning: Surface approach: Students relate to the needs of the instructor, rather than to either their own personal identification with the subject or to the structure of the imparted knowledge. The learning task is to reproduce the subject matter at a later date (e.g. in an exam). Deep approach: Students connect the structure of the subject to their own learning structures. This involves thinking, seeking integration between components and between tasks, and ‘playing’ with ideas. Marton, F., Saljo, R. (1976). "On qualitative differences in learning: Outcome and process." British Journal of Educational Psychology 46: 4-11. Deep Learning 2 deep learning: Gibbs (1992) further refines the definition: Most students can adopt both surface and deep approaches to their learning; students can develop an increasingly sophisticated conception of learning; inappropriate course design, teaching methods and assessment can foster a surface approach; and appropriate course design, teaching methods and assessment can foster a deep approach. Gibbs, G. (1992a). Improving the quality of student learning through course design. In R. Barnett (Ed.). Learning to Effect . Buckingham: SRHE/Open University Press. Part I Using research to improve student learning. Gibbs, G. (1992b). Improving the quality of student learning . Bristol: Technical and Educational Services. Adult Learning Theory adult learners need: To know why learning is required To direct their learning To contribute their experiences to the learning situation To apply what they have learned to serve real world problems To feel competent and experience success throughout the learning program. adapted from: Knowles, M. S., Holton III, Elwood F., Swanson, Richard A. (1998). The adult learner. Houston: Gulf. Wlodkowski, R. J. (1993). Enhancing adult motivation to learn: A guide to improving instruction and increasing learner achievement. San Francisco: Jossey-Bass. A Case Study an online course: Privacy, Security, Freedom: Social Concerns for the 21st Century. The course is a sociological and philosophical exploration of the questions of privacy, security and freedom in the 21st Century in the context of both the theory and practical, policyoriented aspects of these social concerns. Official Course Description Privacy, Security, Freedom: The sociological and philosophical exploration of the questions of privacy, security and freedom in the 21st Century in the context of both the theory and practical, policy-oriented aspects of these social concerns. This study will include an examination of some of the concepts of political and social philosophy, such as private vs. public domains, the individual and the state, freedom, political obligation, and their relevance to contemporary society and government, with a particular focus on the Patriot Act, the Homeland Security Act, and Total Information Awareness/Terrorism Information Awareness. Credits 4 Credits, advanced level course Course Prerequisites Upper Level Standing Knowledge or Skills Needed Writing and internet and/or library research skills. Activities for Collaborative Learning collaborative learning: 1. Students engage collaboratively in both pro-con debate (on the Patriot Act) and (Security) policy development while harnessing the availability of Internet based resources. 2. They read, evaluate and analyze primary sources, such as the Patriot Act and the Homeland Security Act. 3. They search for and share other resources presenting a variety of perspectives, which allow the student to form his or her own educated opinion grounded in both philosophical inquiry and policy analysis. 4. In addition, each student introduces a topic for discussion, based on assigned readings for every module. 5. Due to the high level, highly relevant professional experience of many of the students, their study is enhanced with practice-based research. Sample Students 1 students: Classmate A: I am a Lieutenant with a large metropolitan police department, assigned to the Commissioner who spearheads crime control strategies. I have a background in the areas of criminal intelligence, investigations, antiterrorism as well as WMD training (CBR) from the Department of Homeland Security. Classmate B: I am working toward a bachelor's degree in Social Theory, Structure and Change with an emphasis on National Security. Classmate C: In 1965, as a colonel's orderly, I observed Rudolph Hess tending his flowers in Berlin's Spandau prison Classmate D: I am employed as a Lieutenant in a Correctional Facility. I am a certified instructor at my place of employment, specializing in terrorism and emergency response to WMD Incidents. I just returned from a training course for Domestic Security in Washington, DC. Sample Students 2 students: Classmate E: I am heavily involved in emergency services. My current position is EMS Coordinator for my county and Commander for a federal response team. In my spare time I volunteer on my local ambulance corps.. Classmate F: I am in the Navy. I am an IT working with Intel. Classmate G: I work as a Systems Architect designing CRM (Customer Relationship Management) systems mostly for banks. This software is used to collect contact information about clients and prospects to help increase the quality of customer service as well as to analyze the “sales pipeline”. The software may or may not pose privacy issues. Classmate H: I work for a large high-end retailer and I am an investigator. I investigate all aspects of internal theft from the theft of goods and money, to the theft of company time and resources. Course Readings 1 readings: David Brin. The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? June 1999 Edition. Perseus Publishing. Reginald Whitaker. The End of Privacy: How Total Surveillance Is Becoming a Reality. February 2000 Edition. New Press . Bruce Schneier. Beyond Fear: Thinking Sensibly About Security in an Uncertain World. September 2003 Edition. Copernicus Books. John Stuart Mill. On Liberty. June 2002 (Paperback) Edition. Dover. Jean-Jacques Rousseau. On The Social Contract. January 1998 (Revised) Edition. Hackett Publishing Company. Course Readings 2 readings: Texts and additional course materials provide students with a foundation in political science, social policy and political sociology. In addition to the texts, students read excerpts from: the Patriot Act, the Homeland Security Act, total/terrorism information awareness, predecessors and successors analyzes of the acts, both pro and con and other official documents, policies and legislature having direct relevance to the issues of privacy, security, and freedom. Students also examine current case studies online using sociological and social policy making methodologies. Discussions discussions: Discussion will include philosophical inquiry and social critique. We will also discuss recent developments such as the Patriot Act, The Homeland Security Act, Total Information Awareness/Terrorism Information Awareness (and related developments). There are a number of outstanding websites, both governmental and organizational, that will provide the basis for outstanding coverage of the issues. The discussions are intended to help you further explore and think critically about the information you are reading and viewing. I shall pose questions to get the discussions going. I intend to be an active--two or three times a week--participant in the discussions, and expect each of you to be so, as well. Please Note: Each discussion response must have a minimum of 125 words, spell checked, well written and citing references in support of arguments. Student led discussion topics must have a minimum of 250 words for the original posting, 125 words for responses. Written Assignments students complete the following written activities: (1) lead 4 discussion topics with a 250 word commentary; (2) participate in a pros/cons debate on privacy in relation to the Patriot Act using case studies and recent "real" events to support arguments. This assignment requires the research, review, analysis and evaluation of six articles; (3) Join a team for a role play scenario based learning activity. This assignment includes deciding on the scenario (what happened, how, what are the implications), participating in a group discussion, researching and reviewing 2 articles/websites, and contributing to the development a 500 word security policy; (4) Design a research project of using one or more of the following methods: data collection, evaluation of evidence, and employment of interpretive analysis using resources on the World Wide Web, examination of primary text materials such as the Patriot Act and the Homeland Security Act, and observation within their communities. The research project includes a formal research proposal and an 10-15 resource annotated bibliography. The Role Play Scenario, Part 1 choose one of the following scenarios: 1. Imagine that you are all board members of a school district having to establish a security policy after an incident in the school. 2. You are the computer security team for a government organization housing highly sensitive information. An unknown hacker has accessed your files and leaked confidential information to the public. Concerned that insider information may have given the hacker easier access, you must develop a tighter internal security policy. The Role Play Scenario, Part 2 steps: First, decide on the scenario: what happened, how, what are the implications. Start an initial group discussion on the scenario. Each group member must research and review 2 articles/websites that might be relevant to the case, and submit an evaluation/review of the article to the group. Then, develop a 500 word security policy after weighing the rights of the individuals against the security of the group. As you develop your policy, follow the five step process proposed by Schneier in Beyond Fear (Chapter 16, pp 257-258). Be sure to consider the four "environmental constraints on behavior" (pp264265). In addition, consider Schneier's three final rules (pp. 279280). In addition, the group must reference one or more sections of the Homeland Security Act in support of the proposed policy. Comments from Students 1 Has this course achieved the objectives that it set out to accomplish? From every conceivable aspect, this course has surpassed these objectives and more. Our group as a whole was introduced to some of the most complicated issues facing citizens and government today. We explored, analyzed, researched and even debated acts of legislation, political and social commentary, not to mention philosophy. Our eyes were opened to the various issues facing modern society; privacy, security, terrorism and cultural awareness were only some of the topics we delved into. Group discussions and debates allowed for us to deliver our individual and collective stances on the issues we examined. Although sometimes energetic and yes, maybe heated, we were all part of a unique learning process. Nicola led us admirably through the gauntlet of subject matter; by design and good chemistry within the group, I think we will all walk away from this course better students and citizens with a host of useful information. The Course Privacy, Security, Freedom: Social Concerns for the 21st Century Here I take the audience to a reference copy of the course (student and term independent) to illustrate my points http://sln.suny.edu/courses/21/2842100210.nsf/ Comments from Students 2 The course presentation and materials were excellent : I just wished that I could have absorbed more. Some of my precourse thoughts have gotten stronger, others have weakened, while many new ideas have been aroused by the writers ,the tutor, and the classmates. Collective participation was both a necessity, and asset and not a hindrance which was my original fear. I have had some mandatory online Verizon schooling, but that involved, cut and dry-yes and know, type answers. A course in history or philosophy online was not for me. How could I cut the other person off, just to insert my twopense into the discussion. This technique of preemptive interruption is widely used by the experts as they project their importance and knowledge, but rather useless in an online course. I learned to wait my turn, and not alone listen to, but also read and interpret what others had to say. What a blessing and what a lesson in manners for the information age. Can we teach our elite, the politicians? Comments from Students 3 I would like to say how much I have enjoyed participating in the group/student led discussions and the group project. They have been very enlightening and have helped me to reevaluate my personal beliefs about privacy, freedom and the impact that the Patriot Act has on both. I have thoroughly enjoyed debating with my classmates about these topics and have learned so much from all of you. It always amazes me that just when you think you have a firm grip on your personal beliefs, that someone brings something to light that changes everything. This is how I felt, over and over again. I have always been a very opinionated and outspoken person, but I have often had a hard time being open minded to the opinions of others. This class has helped me to learn that being open minded may not always be easy, but that it definitely has it’s rewards. More importantly, I learned a lot about myself , including how to “temper my arguments”. The way in which information is presented has a lasting effect on those who are listening, good or bad. Knowing that, will help me achieve the desired outcome of the information presented, whatever that may be. This is something that will stick with me forever. Comments from Students 4 I thoroughly enjoyed the books as well as being involved in the projects. I thought that the groups projects really helped us to share a great deal of information and both groups put together some great presentations. Believe it or not my favorite part of this class was the group reports/projects. While it was not the easiest task in the world trying to get all of us on the same page; the end result was well worth the effort. Other than enjoying the whole “group aspect” of it, I also found the task of making our own school weapons policy very intriguing. Also, a series of unfortunate events also synchronized with our project as well (shootings/stabbings in school). Those events, I believe played an important part in some of our decisions about what to include, and not include in our policy. I have taken many classes, in a number of schools, throughout my life. Some of the information I absorbed, some went in one ear and out the other. The lessons we have learned in this course will probably stay with us for the rest of our lives. We will re-evaluate political policies and security measures, be more aware of privacy issues, and cherish more deeply the freedoms that remain available to us. Conclusion in conclusion: I hope that I have demonstrated that carefully presented course materials combined with active, authentic, engaging and collaborative learning activities within a social constructivist approach provide the student with opportunities for enriched learning. and that this method, applied to teaching and learning in online environments, supports a deep approach to learning. …Nicola Martinez References 1 Gredler, M. E. (1997). Learning and instruction: Theory into practice (3rd ed). Upper Saddle River, NJ: Prentice-Hall. Gibbs, G. (1992b). Improving the quality of student learning . Bristol: Technical and Educational Services. Kim, B. (2001). “Social constructivism”. In M. Orey (Ed.), Emerging perspectives on learning, teaching, and technology. Available Website: http://www.coe.uga.edu/epltt/SocialConstructivism.htm Knowles, M. S., Holton III, Elwood F., Swanson, Richard A. (1998). The Adult Learner. Houston: Gulf. Lave, J., & Wenger, E. (1991). Situated learning: Legitimate peripheral participation. Cambridge, UK: Cambridge University Press. Marton, F., Saljo, R. (1976). "On qualitative differences in learning: Outcome and process." British Journal of Educational Psychology 46: 4-11. McMahon, M. (1997, December). Social Constructivism and the World Wide Web - A Paradigm for Learning. Paper presented at the ASCILITE conference. Perth, Australia. Shunk, D. H. (2000). Learning theories: An educational perspective (3rd ed). Upper Saddle River, NJ: Prentice-Hall. Vygotsky, L. (1978). Mind in Society. (Trans. M. Cole). Cambridge, MA: Harvard University Press. Wlodkowski, R. J. (1993). Enhancing adult motivation to learn: A guide to improving instruction and increasing learner achievement. San Francisco: Jossey-Bass. References 2 websites on social constructivism: http://gsi.berkeley.edu/resources/learning/social.html http://dougiamas.com/writing/constructivism.html#social http://www.dmu.ac.uk/~jamesa/learning/constructivism.htm http://www.coe.uga.edu/epltt/SocialConstructivism.htm http://www.comnet.ca/~pballan/Vygotsky(1978).htm Contact Information Nicola.Martinez@esc.edu 518-587-2100 x 776