Friday, July 25, 2008

Embedded Blog: Highlights from ED693 Emerging Internet Technologies

Yeah! I found out how to embed my podcast within blogspot. That wasn't so hard...

I hope you enjoy the podcast.

Subscribe in a reader



Blog: Highlights from ED693 Emerging Internet Technologies

This URL should take you to my blog that highlights my experiences during ED693 Emerging Internet Technologies.

http://web.me.com/jpotsander/EmergingTechPodcast/Podcast/Podcast.html

or

http://jasonpotsander.podomatic.com/entry/2008-07-25T12_09_24-07_00

or

http://feeds.feedburner.com/PotsanderBlog

Here is a link my podcast through podomatic, but you will see I did find a way to embed the podcast within my blog in the next posting:



Thursday, July 24, 2008

My embeded Grazr Widget Creation

Grazr


With some tinkering and experimentation I figured out how to successfully embed the html that Grazr used to create my widget. When I first tried to embed the code I would get the outline of my Grazr widget, but the reading lists lists said "file not found." I'm still not sure what exactly was not working, but I kept trying to go back to original source code provided by Grazr and would then retry embedding the code. So not it works, yeah!

Wednesday, July 23, 2008

Extra Credit Widget Creation

Patti,
Hopefully this URL address will lead you my Grazr widget creation so you can view it and grade it.

http://www.google.com/ig/adde?moduleurl=grazr.com/jx/widget.pl?destEQ
GoogleIGQSTviewEQsAMPthemeEQgloss_blackAMPaddbarEQonAMPfileEQgrazr.com
/data/jason.potsander/Triathlon_and_Tour_de_France_Blogs_and_Podcasts_1

Friday, July 18, 2008

Web Quest Survey: Security, Ethic and Privacy Concerns of Web 2.0 Media

1. Identify the security concerns that you personally feel need to be addressed before using a web resource or service

a. How do you ensure your students are safe when using Web 2.0 resources and meet district technology guidelines?

When thinking about security concerns that I feel need to be addressed I can categorize a list of questions that falls into three general categories: Web Site Questions, Student Experiences Questions, and Teacher/School Site Questions. The following is a list of questions in each category and my accompanying justification for each.

Web Site Questions:

Is the site reputable? Is the site published by an individual or larger organization? Can the site be trusted as virus/malware free and as a factual source? Does the site contain any bias? Is the site currently banned by a school filter and why?

Justification:

Web resources must be evaluated with the same concerns and rigor that other media are held up to when ascertaining their legitimacy/validity. In fact one could argue that since web resources are becoming so increasingly accessible over other types of media that we must hold them up to an even higher standard. A lot of information can be ascertained by looking at a web site’s domain name and knowing who/what entity is responsible for it’s posting. Knowing who or what group published the site can at times tell you more that the web site itself about how far one can trust the specific site. Also, knowing if the site is currently allowed by a school’s/district’s current filtering protocols can give you some indication as what types of web sites may pose a threat to school-wide networks. Although, schools must often times use broad filtering criteria that unfortunately also blocks many potential useful and legitimate sites in addition to suspect ones.

Student Experiences Questions:

What past experiences have my students had with using Web 2.0 resources? How familiar are my students with Web 2.0 resources and which ones have they used most often? Have any of my students engaged in unsafe Internet practices in the past at school or at home? Have my students acquired any Internet safety information from past teachers or their parents?

Justification:


In all areas of a student’s education they need to be taught how to think critically and technological issues are no different. The above student experience questions are critical if we are to scaffold a student’s technological learning from the known to the unknown. One must know a student’s past experiences and familiarity with Web 2.0 resources to effectively teach them further. Given the vastness of Web 2.0 resources it is helpful to know what holes may exist in a student’s knowledge base. Knowing a student’s past history regarding Web 2.0 resources also helps in giving them specific knowledge to keep them and others safe while online. It can also be helpful to know what specific Internet safety classes/information a student may have received from past teachers or parents as this can vary widely given various teaching and parenting styles.

Teacher/School Site Questions:

Have specific and well-developed Internet safety policies been written, taught, and enforced among the student population? What protection measures have been tried in the past and are currently being applied? What type of security issues have been encountered at the school in the past and how have they been dealt with? What is the current administration’s/district’s philosophy regarding the balance of needed security measures with the need for student/staff productivity and ease of use? Do teachers/administrators generally feel that the student population can be trusted to make safe and wise decisions? Do all school site computer require at least one log-in username and password required from each student/staff? Are the school computers set up in such a way as to be easily monitored and physically secured? Does all staff understand the need to actively monitor any students engaged in online learning?

Justification:

In my mind these teacher/school site questions are among the most important school network security questions primarily because the school staff can profoundly impact them based on individual and collective staff choices. Today’s teachers must understand and effectively work with Generation Y students and younger who have never known a time without a vast array of easily accessible Web 2.0 resources. As one unidentified risk manager in Cara Garretson’s article (Facing Generation Y Security Issues) relates, “flexibility must be accompanied by well-defined policies and layers of security technology.” He goes on to further state, “you need to specifically define parameters for what is and is not allowed in your policies, and spell out what will be the result of any violations.” Having a well-developed Internet safety policy that are proactively communicated, taught, and enforced is a key first step security measure. The specifics of such a policy may vary in an effort to provide the least restrictive and most productive policies to different age groups and school user groups. The current best course of action regarding Internet security policies will depend greatly on the school’s past experience/approach and that of current administration.

A parallel issue is how much school staff trust their students to make generally safe and wise decisions. Ultimately, security issues are blend of social and technological solutions that allow us all to work together efficiently. As Tim Bray, director of Web technologies at Sun Microsystems Inc., states, (Keeping Secrets in a WikiBlogTubeSpace World, by Mary Brandel, Computerworld, March 2007) “If employees can’t be trusted, technology is the least of your problems.” If one replaces the word “employees” with “students” I believe the same sentiment applies.

In addition to a sound and proactively taught Internet safety policy some automatic measures can be taken. At the very least I would agree with “The Lawyer’s Guide to Mobile Computer Security,” in that “All computers should
require at least one password for login. Individual documents containing sensitive information that are shared electronically should be individually password-protected.” Login requirements and specific password protected documents can do much to thwart opportunistic infringements. Also, enabling login requirements greatly helps when tracking down who potential culprits might be.

Login requirements are akin to prudent physical measures such as locking computer lab doors when not use and proactively monitoring learners while they are engaged in online activities. We must not forget or take for granted the simplest of measures before we brainstorm more advanced ones.

Ultimately, security will be best found when using a multifaceted approach that includes policy and technology. As Mary Brandel points out in “Keeping Secrets in a WikiBlogTubeSpace World,” “a combination of antivirus software, URL filtering, application controls, Web reputation services and “safe search” tools” in addition to sound policies all contribute in creating a “secure Web gateway.”

Additional Sources:

1. Bill Helling (http://www.firstmonday.dk/issues/issue3_2/helling/) highlights the fact that many web-sites enable Cookies which “can store the collected information - usually unannounced - on the visitor's hard drive. In some cases, the server itself stores the data and gives the visitor a code instead. When the visitor returns later to the same site, the visitor's browser gives the cookie's information (or the code to access the information) back to the server, and the site can recognize the visitor, perhaps presenting a more personalized version of itself or specifically targeted advertisements.” While this can be helpful in many cases it also raises security and privacy issues especially when users operate on computers that are publicly accessed.

2. Furthermore, schools face legal implications for not having security measures in place. Schools and libraries in the state of Alaska must comply with (Children’s Internet Protection Act) CIPA requirements in order to receive funding for Internet access and connections. Examples of requirements include: blocking sites depicting child pornography or obscenity and providing a filtering mechanism. More information can be found at: http://www.library.state.ak.us/usf/cipa.cfm

2. Ethic concerns are subjective by the individual who uses the Internet.

a. After reviewing the provided articles, please discuss the ethic issues that concern you most when using this new media.

The issues that most concern me regarding ethics include confidentiality of sensitive information and copyright issues. Web 2.0 effectively opens the door for a plethora of opportunities that social networking sites provide ready access to. Issues of confidentiality and copyright are becoming increasingly more muddied. The old adage of “do no harm” commonly used in the health care arena now applies to that of technology (KnowledgeCenterSecurity).

Any business or educational institution needs to takes steps in order to protect consumers’ or students’ personal information, which is becoming increasingly more difficult. In the business world, both businesses and consumers hold responsibility for maintaining confidentiality. For example, a bank issues a debit card with a secure access code. It is the bank’s responsibility to take precautionary measures to protect access to the code, but it is also the consumer’s responsibility to keep both the card and the code in separate, secure locations. The same logic does not necessarily apply to educational institutions. School staff are responsible for the confidentiality of student information, from the teacher who neglects to log out of the computer at the end of the day to the janitor who looks at the computer screen with student information. Students are not expected to maintain their own confidential student records; it is the responsibility of school staff to do so.

In any school or business, it is becoming easy for information to be transmitted to parties not authorized to access information. All devices need protective measures taken to safeguard sensitive information, including iPods and thumb drives. Schools and companies need to develop security policies to cover all mobile devices, not simply limited to laptops and desktops. Treat a USB flash drive as one would an office key, keep it attached to keys and in a protected area. Protect documents so changes cannot be made by saving to PDF format. (Freedman, et al., 2007).

Copyright issues pose a concern as more information is becoming increasingly accessible online, both through legal and illegal means. In the area of education, this takes two main approaches. First, as educators, we need to do our part to attribute credit where it is due. The Creative Commons blog notes some measures such as resources that post a small icon or link to the credits. Displaying such information or taking a moment to acknowledge the artist or author provides a good role model for students. Educators also need to be aware of accessing information legally. According to the Copyright Term Extension Act (CTEA), works published prior to 1923 may be entered into public domain. Be aware of adaptations, make sure to use the original (Jassin, 2003) CopyLaw.com. The second approach is to teach students proper use of copyright as students use Internet resources for research and learning.

On the flip side, is the idea that educators have a legitimate right to use resources within the confines of education for “educational purposes only.” This point is argued by an anonymous blog entitled etc@bmc that can be found at: http://www.brynmawr.edu/etc/etcblog/2007/05/copy-protection-web-20-and-education.html. This site argues for educators to remind lawmakers of our legal right to use resources for education purposes, before this privilege is removed as well.

b. How do you teach your students to adhere to acceptable online ethics and copyright issues? This is a big one so please spend time discussing this.

Ultimately, protection of sensitive information and using copyright information ethically comes back to awareness and education. All the hardware and software precautions in the world such as firewalls, filters and anti-viruses cannot take the place of teaching students and others about their responsibility to use and distribute information in an ethical manner. This fact is highlighted by Rick Cook in an article entitled Protecting Yourself with Web 2.0 CRM (http://www.insidecrm.com/features/prtoecting-yourself-crm-031208/). In this article Rick states, “Although the details of some of threats, especially Web 2.0 attacks, can be extremely complex, the most important way to protect yourself, your company and your customers does not involve technology at all. It relies on good, old-fashioned awareness. Awareness and education are not substitutes for protective measures like firewalls and filters, but all firewalls, security software and gadgets are useless without them.”

We need to teach students responsible practices for use of resources found on the web. It used to be that we taught students not to copy more than 3 consecutive words from an encyclopedia while doing a report. The same set of rules, expanded to apply to online resources, needs to be explicitly taught to our current “cut and paste” generation of young persons. Information such as copyright laws that can be found at CopyLaw.com, need to be taught (Jassin, 2003) in order for educators to hold students accountable to them. Older students may understand the ethical dilemmas of students caught cheating on open-book tests which are described at: http://www.businesspundit.com/the-business-ethics-of-web-20-does-collaboration-and-open-source-blur-the-line-of-what-it-means-to-cheat/

Let students know that you will be checking up on them. Students tend to think they can access information via the Internet and tend to forget that teachers can too! Following a lecture on responsible use of Internet resources and copyright information, I would take any papers that did not sound like the student’s typical writing style and Google segments of their writing in looking for plagiarism. I then highlighted the plagiarized text and gave it back, letting them know this was a warning and they must redo their work. If I caught the same student plagiarizing a second time throughout the year I would assign them an automatic “F” for that assignment.

Cara Garretson writes in the article entitled “Facing Generation Y Security Issues” http://rhetorica.uaf.edu/moodle/mod/resource/view.php?id=69) that “If you make things too restrictive, younger employees may just pack up and go elsewhere.” This same principal may also apply to students who face too many restrictions. They may either ignore them entirely or refuse to complete the assignment. Need to balance rules with a reminder of why rules are in place, and keep rules simple.

Students need to have impressed to them that someday they will be responsible for the security of sensitive information with severe consequences applied for the distribution or security of such data. Resource for teaching students about intellectual property rights, aimed at teens, can be located at: http://www.mybytes.com/index.html
Under the “viewpoints” section, students may listen to artists’ opinions on Intellectual Property Rights and learn how and why adhering to such (word) is important. Listening to real-life artists may have a larger impact on their understanding than a lecture from their teacher.

Provide students with examples they can relate to. Teach students how commonly used applications use their personal information, for example MySpace, Flickr, Digg. As Wil Harris (http://www.bit-tech.net/columns/2006/06/03/web_2_privacy/1) suggests teens might find it interesting that these sites pour money into the sites, seemingly without making a profit. The profit comes from knowing information about you, based on your posts. Information that advertising agencies can target to you. Students need to be made aware of how their seemingly innocent actions may have longer-term consequence.

3. Privacy issues concern all users of the Internet from children sharing too much personal information and private information inappropriately used by others.

a. What controls would you put in place to safe guard your students?

I would advocate for the following safeguards and controls for students in my classroom and throughout my school.

1. A thorough Internet usage and Network policy that has been formulated by the school’s Technology team and is understood by all teaching staff. If necessary I would advocate for in-service time to educate teaching staff how to consistently implement the policies throughout the school.

2. I would advocate highly for a school’s administrators and Technology team to be forthright in impressing the importance of education as a means to prevent many potential student/staff infractions. The power of education also builds a common language and ethos in the building from which all students/staff can increasingly relate to as their technological experiences increase.

3. I would also remind staff that keeping our students safe online is everyone’s responsibility, much like we watch out for each other’s physical well being throughout the classrooms, halls, and recesses. This would include actively monitoring all student engaged in online learning. Keeping computer screens un-obscured and pointed towards common areas. Shutting doors and rooms when not in use and being mindful of suspicious activity.

4. I would advocate for personal log in requirements for each student/staff within the school. User access and privilege would then be set differently among different grade levels and user groups. For example, log-ins could be configured to allow K-3 students more elementary programs than their 4-6 grade counterparts.

5. I would advocate for a combination of antivirus software, URL filtering, application controls, Web reputation services and “safe search” tools.

6. I some known sites have proved to be particularly troublesome for some students I would advocate for blocking those sites entirely, to remove the temptation.

7. I would encourage teachers/students to use kid safe Internet search engines such as http://www.askkids.com/, http://kids.yahoo.com/, http://www.rcls.org/ksearch.htm, or http://www.ivyjoy.com/rayne/kidssearch.html.

8. With specific students or issues I might advocate for student computer contracts to be agreed upon and followed to insure greater accountability.

9. I would make sure that all wireless networks within the school are password protected to discourage unauthorized users from siphoning precious bandwidth or attempting access confidential school data.

10. I would advocate that all students receive some basic and appropriate Internet safety information that is taught in collaboration with a technology or media specialist within the school.

11. I would advocate that parent information be prepared for dissemination at a school event, in which parents were free to see and use some suggested Online resources along side a technology or media specialist within the school.

b. How do you control your personal information on the web?

I tend to be fairly brief and non-descript when describing my self on-line. I maintain a family blog site that open to the public however fairly hard to find in my opinion by the average search query. The URL is fairly obscure and I have not been able to find my own blog when doing elementary searches for it. The blog site contains little information about who exactly is maintaining the blog and where I am living. I do this intentionally as I primarily use the blog site to give updated news regarding our daughter to friends and family. I would prefer that only people I know view my blog site and periodically send invitations to view updates to friends and family.

I also recently began a Facebook.com profile in which I rather deliberately refrained from adding to much descriptive information until I grow more comfortable with the social networking concept. I like the idea that only my approved “friends” are able to access my full profile and am very judicious about who I approve as friends. If I have never met the person I refrain from adding them as friends as well and that includes friends of my friends.

I approach many of the free Web 2.0 registration and profile requests with some wariness because I know that this information is being mined and sorted in a myriad of ways in order to market and sell various products. According to Wil Harris in the article entitled Why Web 2.0 Will End Your Privacy (http://www.bit-tech.net/columns/2006/06/03/web_2_privacy/1) “Our social networks, searching habits, visual identifiers and personal preferences will be mercilessly sold to anyone who wants to get their hands on our particular demographic.” I would suppose that a digital native would view this personal data tracking/mining on the same level as other older forms of market data such as credit card statements or merchant’s that offer savings by becoming a member. I however, cannot help but be somewhat suspect that the wonderful Web 2.0 applications and toys are costing me more than their often “free” label suggests. In fact cannot help but wonder how access to my interests and consumer habits might at some point cost me something further along down the road.

4. Please critically evaluate how to utilize the Web 2.0 benefits over security, ethic and privacy concerns.

In many areas of life it is helpful to live by some basic ground rules and an overall sense of balance. This applies when using Web 2.0 technologies as well when thinking about security, ethics, and privacy concerns.

Although, the wide world of Web 2.0 technologies is ever increasing in the applications and entertainment it may provide us, we must ask ourselves if the benefits are worth the potential risks. Certainly, a list of standard ground rules would could be prudently applied to a variety of Web 2.0 resources. As Wired.com’s Parenting Online handout illustrates, many ground rules that apply in the physical world can be adapted to the virtual world as well. For example, “Don’t talk to or accept anything from strangers” can be adapted to include not trusting anyone online unless they have physically met them at some point. Another common rule such as “come straight home after school” could be translated to mean that unlimited and aimless time spent surfing online is not allowed. More examples of translatable ground rules can be found at the “Parenting Online Booklet” available at: http://www.wiredsafety.org/

An overall sense of balance is also needed when considering Web 2.0 benefits over security, ethic and privacy concerns. As Internet based scams, frauds, and even legitimate accumulation of user market data increase, a healthy dose of skepticism when dealing with some Web 2.0 resources does much in providing a safety net.

In a school setting we must consider the collective good over the interests/preferences of the individual. Since so many functions and person daily depend on a functioning school network, we must base our decisions on what allows the school to collectively provide the best learning environment possible. As networked environments increase our world becomes more connected to places and persons we would not otherwise be connected to. The questions of what it means to have private and public ethics blur as the world becomes increasingly networked. Suspect online practices such participating in peer to peer file sharing applications may be deemed safe by certain high risk users, but vehemently opposed by others such as network administrators. The NEEDS of all users must take precedent over the PREFERENCES of others if there is going to be a sustainable, safe, and protected network. In cases where user ethics seem to differ one must at times take what is recommended by field experts while continuing a dialogue if the issue remains important to students and staff.

On the other hand, privacy issues seem much more “cut and dry” and are often dictated by Federal, State, and School Board policy rather than individual choice.

Thursday, July 10, 2008

Widget Creation: Bonus Points

http://www.google.com/ig/adde?moduleurl=grazr.com/jx/widget.pl?destEQ
GoogleIGQSTviewEQsAMPthemeEQgloss_blackAMPaddbarEQonAMPfileEQgrazr.com
/data/jason.potsander/Triathlon_and_Tour_de_France_Blogs_and_Podcasts_1

I created my own “Triathlon and Tour de France Blogs and Podcast” widget using a site called http://grazr.com . I added the following feeds into my widget which can be seen on grazr.com site at the following address: http://grazr.com/config?view=o&file=http://grazr.com/data/jason.potsander/Triathlon_and_Tour_de_France_Blogs_and_Podcasts_1

http://www.velonews.com/lennard-zinn

http://podcast.tri-talk.com/feed.aspx?feedId=371

http://www2.trainingbible.com/joesblog/blog.html

http://www.martindugard.com/

http://community.active.com/blogs/frankie

http://community.active.com/blogs/tourdefrance/

I found the process of creating a widget relatively easy after clicking on the “Tour” tab and following the directions indicated on how to create and publish your widget. The “Tour” tab page can be viewed at: http://grazr.com/info/tour

Basically, my widget acts as a feed reader and Podcast collector for a few sites that I have been using to stay abreast of Triathlon and Tour de France news. My widget is relatively simple in that it deals with one subject, however one could create multiple folders each dedicated to different subjects and amass quite a collection of centralized information.

My widget creation can be viewed and published to your site at:
http://grazr.com/config?view=o&file=http://grazr.com/data/jason.potsander/Triathlon_and_Tour_de_France_Blogs_and_Podcasts_1

The sophistication that Grazr is capable of is illustrated in the “MennoWidget” that a friend of mine created. The purpose of this widget is to collect news, links, audio and video related to the Mennonite faith. It includes folders that categorize feeds into “links, news, podcasts, and video.” Since I am an alumni of the Mennonite College, Goshen College, I particularly enjoy hearing podcasts of weekly chapels and convocations that currently take place there.

The “MennoWidget” can be viewed at the Grazr site: http://grazr.com/config?theme=sateen_green&fontsize=9pt&file=http://grazr.com/data/MennoWidget/bc6cb10

Once my I entered my desired feeds into my Grazr widget I published the widget to my iGoogle page using the convenient publishing options listed on Grazr’s home page. Options to publish to many other popular services were also automatically available, such as blogspot, facebook, iPhone, twitter, and netvibes.

Integrate Web Application--Assignment

"The Fifty Nifty United States"

I found several online resources to teach the US states and capitals to fifth grade ESL students. I have taught this unit in the past and have been disappointed that the district currently blocks many of the interactive websites I have found on this subject.

I found several websites to aid in the learning of states and capitals through multi-sensory methods such as singing songs and interactive games.

http://www.sheppardsoftware.com/web_games.htm

This site contains a number of education games for engaging drill practice (reword), allowing students to progress as they learn more state capitals. For bilingual students, the task of not only learning the capitals of each state but learning the spelling and the pronunciation prove difficult. The capital activity level one restricts students to 5-6 states at a time. Students must match the capital to one of the states shown on the map. The capital is read aloud and the student sees the printed name as well as the physical location on the map, employing a variety of multi-sensory modes of learning. Games progress to matching all capitals and states without limiting the number of states. In this way the student’s learning is scaffolding from the known to the unknown.


http://www.youtube.com/watch?v=qQBvyqxeO70

http://www.teachertube.com/view_video.php?viewkey=7f16f32e7933e174c719

Both the YouTube and TeacherTube have videos along with the song “Fifty Nifty United States”, a song with the 50 states in alphabetical order.

The YouTube video is the one I would prefer, however I understand if the district would not want to allow access to YouTube, in which case the TeacherTube video would be acceptable. The YouTube video has the song with corresponding slides of each state’s stamp. The stamp briefly depicts a bit about each state, for example the type of geography, major crops, and tourism and sporting information.

I would use both resources to supplement my lesson on the 50 states. I would first model the site for students to review as a class, then as a follow-up tool for students to review the states and capitals on an individual basis, following a traditional lesson on the 50 states. Using this resource as an independent review frees up teaching time spent on review and allows me to work more individually with students while the others take a turn on the computer. It also provides a more engaging review format than the traditional paper map to try and memorize information. This would be a great resource for students to use in the general education classroom as well. Video and audio files are a way for students to engage in hands-on learning and engage students.

As a teacher, I can only do so much with paper-and-pencil drills especially for students who require a lot of repetition to learn the material. ESL students typically read below grade-level. The memorization and location of each state and capital is overwhelming enough, let alone the pronunciation and spelling of each. Both resources allow students to hear and see the name of the state capitals. The online game involves kinesthetic learning as they drag the mouse to the correct location. The use of games, songs, and movement also creates a more authentic learning experience in which the learner can be more highly motivated.

Both the game and song web sites offer a unique framework from which students can construct their learning.

I particularly appreciate how the 50 States games (located at: http://www.sheppardsoftware.com/web_games.htm) gives the students a visual-spatial framework from which to reference the states in relation to each other and not in isolation.

I particularly appreciate how the songs (located at: http://www.youtube.com/watch?v=qQBvyqxeO70 and http://www.teachertube.com/view_video.php?viewkey=7f16f32e7933e174c719) gives the students an alphabetical framework from which to recall the names of each state.

The YouTube video provides additional learning that I have not had time to address in the past through the use of each state’s postage stamp. I would first view the song a few times with my students, pausing the video to ask students to describe what they saw on the stamp and locating the state on the map. I believe it would help reinforce different attributes of our country. For example, seeing a picture of a skier on a snowy mountain in Colorado postage stamp and then locating Colorado on a US map can reinforce the fact Colorado is a state in which many people enjoy snow, mountains, and skiing.

All the resources I listed are currently blocked on the Anchorage School District’s (ASD) websites. I would like to request that the ASD IT department find a way to allow the specific resources I mentioned above with the following justification:

Justification:

Research in best practices demonstrate that students (especially language learners or ESL) learn best with a multi-sensory approach that is provided by these resources through the us of interactive games and catchy songs. Using these sites students are able to see, hear, respond, and manipulate information which will lead to greater motivation and learning.

Research in best practices demonstrates that all learners, and (especially language learners or ESL), need many exposures to specific words and concepts before they will be internalized. The use of the resources above will greatly help my student gain exposure in learning the names of the 50 States and their geographic location in a supported and meaningful context.