The Merge of Social Network Sites and Professional Development: a Case Study Of

Total Page:16

File Type:pdf, Size:1020Kb

The Merge of Social Network Sites and Professional Development: a Case Study Of St. Cloud State University theRepository at St. Cloud State Culminating Projects in Education Administration Department of Educational Leadership and Higher and Leadership Education 5-2016 The eM rge of Social Network Sites and Professional Development: A Case Study of Twitter Usage Among Minnesota K-12 Principals Nathan D. Rudolph St. Cloud State University Follow this and additional works at: https://repository.stcloudstate.edu/edad_etds Part of the Educational Leadership Commons Recommended Citation Rudolph, Nathan D., "The eM rge of Social Network Sites and Professional Development: A Case Study of Twitter Usage Among Minnesota K-12 Principals" (2016). Culminating Projects in Education Administration and Leadership. 16. https://repository.stcloudstate.edu/edad_etds/16 This Dissertation is brought to you for free and open access by the Department of Educational Leadership and Higher Education at theRepository at St. Cloud State. It has been accepted for inclusion in Culminating Projects in Education Administration and Leadership by an authorized administrator of theRepository at St. Cloud State. For more information, please contact [email protected]. The Merge of Social Network Sites and Professional Development: A Case Study of Twitter Usage Among Minnesota K-12 Principals by Nathan Rudolph A Dissertation Submitted to the Graduate Faculty of St. Cloud State University in Partial Fulfillment of the Requirements for the Degree Doctor of Education May, 2016 Dissertation Committee: Dr. John Eller, Chairperson Dr. Roger Worner Dr. Nicholas Miller Dr. Daniel Bittman 2 Abstract Over past decades, the position of principal, like that of technology, has evolved and changed drastically. Today, the changing face of Internet technologies is merging with the changing face of educational professional development (United States Department of Education, 2010; Veletsianos, 2012). Due to rapid growth and change within the technology industry, there is limited research about the relationship of technology and professional development. Although some research can be found regarding the manner in which scholars, academics, educators, and students are using [Social Network Sites] in education, there is little research that pertains specifically to usage of this tool by school principals. Further research is needed to eXamine principals’ use of SNS to: 1) sustain a level of expertise within their role; 2) access content that is directly related to practice; 3) provide collaboration and sharing of knowledge with other practitioners; and 4) construct personalized learning. In order to gain a better understanding of how SNS are being used, specifically by active principals, for personalized professional development purposes, a qualitative case study methodology was implemented. Employing one-on-one interviews, data was coded and analyzed to provide specific perspectives on the manner in which five selected principals were using Twitter in dispensing their duties. The [following] research questions were intended to provide an expanded understanding of the manner in which principals are using Twitter for effective, personal and professional development. 1. How are selected principals using Twitter to access content that directly relates to practice and constructs personalized learning? 2. How are selected principals using SNS to collaborate with other practitioners and sustain a level of role expertise? 3. What are selected principals’ perceptions of the effectiveness of using SNS for personal, professional development purposes? Research questions were framed according to Rutherford’s (2010) review of literature, which concluded that effective professional development is practical (Borko, 2004; Darling-Hammond & Mclaughlin, 1995; Hirsh, 2004; Nord, 2004; Wei et al., 2009), participant-driven or constructivist in nature (Borko, 2004; Darling-Hammond & Mclaughlin, 1995; Wayne et al., 2008), and collaborative (Borko, 2004; Darling-Hammond & Mclaughlin, 1995; Hirsh, 2004; Nord, 2004; Warren-Little, 2006) and helps professionals sustain a level of expertise (Borko, 2004; Darling-Hammond & Mclaughlin, 1995; Wayne et al., 2008; Wei et al., 2009). Overall, principals provided ratings of “very valuable” or “eXtremely valuable” to ninety percent (18) of [Rutherford’s] four key elements that characterize effective professional development. In summary, the data collected through this qualitative case study furnished high correlations between the use of Twitter for professional purposes and the key characteristics of effective professional development, as defined by Rutherford (2010). Therefore, although this study is not generalizable, the findings support the notion that principals can use SNS for effective personal, professional development purposes. 3 Acknowledgment I’d like to begin by thanking God. His continued grace, guidance, and love sustain me. Thank you for “co-authoring” my dissertation, my educational journey, my professional journey, and my life. I would like to thank Dr. Daniel Bittman for encouraging me to take this journey, and for the unwavering support that you have given me along the way. You have taught me to persevere and dream big. It is my prayer that everyone has someone in their life that believes in them more than they believe in themself. You are that person for me. Thank you. To my entire committee, I’m grateful to be surrounded by such amazing, caring, intelligent, and supportive mentors. You have challenged me, guided me, and supported me along the way. I would not have made it without you. I owe my mom, dad, sister, brother, mother-in-law, and father-in-law a great deal as well. Although it is often behind the scenes, your love and support have allowed me this opportunity. You have taught me how to work hard, love unconditionally, and persist. I love you. Finally, I would like to eXpress my gratitude for the love, support, and sacrifices made by my wife and children in order to make this journey complete. Whether it’s in my role as an administrator, coach, or doctoral student, you are often the ones that bare the burden of my professional pursuits. I am so thankful for our family and our faith and I love each of you dearly. 4 Dedication Dedicated with love and gratitude to my best friend and amazing wife, Gina, and to my beautiful and inspiring children, Mason, Isabella, and Tylee. You are my everything! 5 Table of Contents Chapter I: INTRODUCTION ................................................................................................................................ 10 Introduction ......................................................................................................................................................................... 10 Statement of the Problem ............................................................................................................................................... 11 Purpose of the Study ......................................................................................................................................................... 12 Conceptual Framework ................................................................................................................................................... 12 Research Questions ........................................................................................................................................................... 15 Assumptions of the Study ............................................................................................................................................... 15 Delimitations ........................................................................................................................................................................ 15 Definition of the Terms .................................................................................................................................................... 16 Summary ................................................................................................................................................................................ 20 Chapter II: REVIEW OF LITERATURE ........................................................................................................... 22 Introduction ......................................................................................................................................................................... 22 The Changing Face of Internet Technology ................................................................................................ 25 History of the Internet: Web 1.0 to Web 2.0 .......................................................................................................... 26 History of Blogging ............................................................................................................................................................ 29 History of Social Network Sites .................................................................................................................................... 30 The Changing Face of Professional Development ................................................................................... 32 The Merge of Technology and Development ......................................................................................................... 32 Types of Professional Learning ...................................................................................................................................
Recommended publications
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
    CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations.
    [Show full text]
  • From Your President . . . Brett Fuller Spring Is in the Air and Summer Is Right Around the Corner! Time Continues to Fly
    www.whpe.us Our mission … is to provide members with professional development opportunities and be advocates for our profession. WISCONSIN HEALTH AND PHYSICAL EDUCATION VOLUME 45, ISSUE 2 NEWSLETTER SUMMER 2016 From your President . Brett Fuller Spring is in the air and summer is right around the corner! Time continues to fly. Every year I hear Buil nature of bullying behavior. Bullying behavior is largely about e’re t To people say how much faster the school W M the perception of power. In a physical education class, the o year seems. By the time you get this v most athletically gifted students are generally perceived to the SHAPE America National Convention e have the power. In bullying, the bully repeatedly exercises will be done and it will be May. Soon, the Proms start, their power over the victim. So in a dodgeball game, the end of year picnic’s happen, and then summer vacation. “athletes” have the power and will gang up on the weaker This makes me think of how we spend our summers. We players. Those players end up not feeling safe and worse, need to recharge the batteries. For some of us, that means may end up being turned off to physical education class. But vacations, spending time with family and friends AND not what if those students with the perceived power are NOT trying thinking about school until August. For other’s it is summer to bully? They are playing the game within the rules AND that school, other part-time jobs, or planning for the next school year.
    [Show full text]
  • The Economic and Societal Value of Rich Interaction Applications in India
    WIK•Report THE ECONOMIC AND SOCIETAL VALUE OF RICH INTERACTION APPLICATIONS IN INDIA Bad Honnef, November 2017 Authors: Dr. René Arnold, Christian Hildebrandt, Peter Kroon, Serpil Taş 2 / November 2017 The Economic and Societal Value of Rich Interaction Applications in India TABLE OF CONTENTS Acknowledgement ..........................................................................................................................................4 Executive Summary ........................................................................................................................................5 1 Introduction ................................................................................................................................................6 1.1 Summary of the global study on RIAs .....................................................................................6 1.2 Brief literature review of economic impact studies ...........................................................9 1.3 Structure of the study ................................................................................................................ 10 2 Economic Impact of RIAs in India .................................................................................................. 11 2.1 Accelerating digitization in India ........................................................................................... 11 2.2 RIA functions create consumer surplus ............................................................................... 13 2.3 Impact of
    [Show full text]
  • Release Notes
    1 Juniper Networks Deep Packet Inspection-Decoder (Application Signature) Release Notes August 04, 2020 Contents Recent Release History | 2 Overview | 2 New Features and Enhancements | 3 New Software Features and Enhancements Introduced in JDPI-Decoder Release 3313 | 3 New Applications | 3 Updated Applications | 30 Custom Applications | 38 New or Modified Application Groups | 38 Obsolete Applications | 40 Resolved Issues | 46 Requesting Technical Support | 47 Self-Help Online Tools and Resources | 47 Creating a Service Request with JTAC | 48 Revision History | 49 2 Recent Release History Table 1 on page 2 summarizes the features and resolved issues in recent releases. You can use this table to help you decide to update the JDPI-Decoder version in your deployment. Table 1: JDPI-Decoder Features and Resolved Issues by Release Release Signature JDPI Decoder Engine Engine Date Pack Version Version Version 4 Version 5 Features and Resolved Issues Aughst The relevant 1.460.2-43 4.20.0-111 5.3.0-61 This JDPI-Decoder version is 04, 2020 signature supported only on the Junos OS package 12.3X48-D80 and later releases, version is 3313. 15.1X49-D140 and later releases, and Junos OS 17.4R1 and later releases on all supported SRX Series platforms. Starting in Junos OS release 20.1R1, enhancements to custom applications are included in the JDPI-Decoder release. Overview The JDPI-Decoder is a dynamically loadable module that mainly provides application classification functionality and associated protocol attributes. It is hosted on an external server and can be downloaded as a package and installed on the device. The package also includes XML files that contain additional details of the list of applications and groups.
    [Show full text]
  • Case 1:20-Cv-03590-JEB Document 75-1 Filed 08/19/21 Page 1 of 80
    Case 1:20-cv-03590-JEB Document 75-1 Filed 08/19/21 Page 1 of 80 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA FEDERAL TRADE COMMISSION 600 Pennsylvania Avenue, N.W. Washington, DC 20580 Plaintiff, Case No.: 1:20-cv-03590-JEB v. FACEBOOK, INC. PUBLIC REDACTED VERSION OF 1601 Willow Road DOCUMENT FILED UNDER SEAL Menlo Park, CA 94025 Defendant. FIRST AMENDED COMPLAINT FOR INJUNCTIVE AND OTHER EQUITABLE RELIEF Plaintiff, the Federal Trade Commission (“FTC”), by its designated attorneys, petitions this Court pursuant to Section 13(b) of the Federal Trade Commission Act (“FTC Act”), 15 U.S.C. § 53(b), for a permanent injunction and other equitable relief against Defendant Facebook, Inc. (“Facebook”), to remedy and prevent its anticompetitive conduct and unfair methods of competition in or affecting commerce in violation of Section 5(a) of the FTC Act, 15 U.S.C. § 45(a). I. NATURE OF THE CASE 1. Facebook is the world’s dominant online social network, with a purported three billion-plus regular users. Facebook has maintained its monopoly position in significant part by pursuing Chief Executive Officer (“CEO”) Mark Zuckerberg’s strategy, expressed in 2008: “it is better to buy than compete.” True to that maxim, Facebook has systematically tracked potential rivals and acquired companies that it viewed as serious competitive threats. Facebook 1 Case 1:20-cv-03590-JEB Document 75-1 Filed 08/19/21 Page 2 of 80 supplemented this anticompetitive acquisition strategy with anticompetitive conditional dealing policies, designed to erect or maintain entry barriers and to neutralize perceived competitive threats.
    [Show full text]
  • Amusement Parks
    South Park Slid... Industry White Paper for Amusement Parks Every year, 300 million people visit amusement parks - that’s the size of the population of the United States. And this number doesn’t even include the millions more who attend local fairs, events, and roadshows. These are large scale operations that require around the clock communication to ensure that things run smoothly, and great communication can play a major role in the success of an amusement-based business. ! ! ! How does Voxer Business help amusement parks? ‣ Every message is live and recorded - Hear things as they come in and play them back later, it’s perfect for when employees are busy !with guests or other conversations ‣ Create team contacts - Make it easy for groups to communicate among different functional teams in parks (e.g. Security, Guest ! Services, Maintenance) ‣ Eliminate dead zones - Being out of range matters less because ! messages are immediately sent when your connection is restored ‣ Multitask with multiple conversations - Easily manage any number of ! chats with co-workers using one application ‣ Multimedia messaging - Address issues more quickly by sending a !picture of problems or suspicious activity ‣ Desktop functionality - Managers can monitor ongoing employee conversations from a computer browser with Voxer for Web 1 ! There are many factors that could make or break the guest experience. Being able to quickly relay information about groups visiting attractions, closing rides, weather forecasts, employee schedule updates, supplies, security alerts or suspicious activity, maintenance needs, and VIPs are all incredibly important to ensure the very best guest experience. Two-way! radios and push-to-talk services provided by wireless carriers are the communication tools typically used among amusement workers, but purchasing 2-way radios (especially for seasonal employees) can be an incredibly expensive proposition.
    [Show full text]
  • A Worldwide Survey of Encryption Products
    A Worldwide Survey of Encryption Products Bruce Schneier Kathleen Seidel Saranya Vijayakumar Berkman Center for Internet Independent Researcher Harvard College and Society [email protected] [email protected] Harvard University [email protected] February 11, 2016 Version 1.0 Introduction Data security is a worldwide problem, and there is a wide world of encryption solutions available to help solve this problem. Most of these products are developed and sold by for-profit entities, although some are created as free open-source projects. They are available, either for sale or free download, all over the world. In 1999, a group of researchers from George Washington University attempted to survey the worldwide market for encryption products [HB+99]. The impetus for their survey was the ongoing debate about US encryption export controls. By collecting information about 805 hardware and software encryption products from 35 countries outside the US, the researchers showed that restricting the export of encryption products did nothing to reduce their availability around the world, while at the same time putting US companies at a competitive disadvantage in the information security market. Seventeen years later, we have tried to replicate this survey. Findings We collected information on as many encryption products as we could find anywhere in the world. This is a summary of our findings: We have identified 865 hardware or software products incorporating encryption from 55 different countries. This includes 546 encryption products from outside the US, representing two-thirds of the total. Table 1 summarizes the number of products from each country. The most common non-US country for encryption products is Germany, with 112 products.
    [Show full text]
  • The Economic and Societal Value of Rich Interaction Applications (Rias) Final Report
    WIK Report Study for CCIA The Economic and Societal Value of Rich Interaction Applications (RIAs) Final Report Authors: Dr. René Arnold Christian Hildebrandt Peter Kroon Serpil Taş WIK Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste GmbH Rhöndorfer Str. 68 53604 Bad Honnef Germany Bad Honnef, May 2017 Imprint WIK Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste GmbH Rhöndorfer Str. 68 53604 Bad Honnef Germany Phone: +49 2224 9225-0 Fax: +49 2224 9225-63 eMail: info(at)wik.org www.wik.org Person authorised to sign on behalf of the organisation General Manager and Director Dr. Iris Henseler-Unger Director Head of Department Postal Services and Logistics Alex Kalevi Dieke Authorized Signatory Head of Department Networks and Costs Dr. Thomas Plückebaum Authorized Signatory Head of Administration Karl-Hubert Strüver Chairman of the Supervisory Board Winfried Ulmen Registered at Amtsgericht Siegburg, HRB 7225 Tax No. 222/5751/0722 VAT-ID DE 123 383 795 Copyright belongs to Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste GmbH – CC-BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode) The Economic and Societal Value of Rich Interaction Applications (RIAs) I Executive summary Applications such as iMessage, economic benefits of basic KakaoTalk, LINE, Signal, Skype, telecommunications services across a Snapchat, Threema, Viber, WhatsApp panel of 164 countries in the period 2000 and WeChat have become increasingly to 2015. popular with consumers around the world. The applications facilitate rich This is a conservative estimate of interaction such as chat, photo/video RIAs’ economic impact, given that only sharing, location and payment between part of the impact from these services is individuals, groups and enterprises.
    [Show full text]
  • Mobile APT Surveillance Campaigns Targeting Uyghurs
    SECURITY RESEARCH REPORT Mobile APT Surveillance Campaigns Targeting Uyghurs A collection of long-running Android tooling connected to a Chinese mAPT actor June 2020 Contents Executive Summary 3 GoldenEagle 29 Findings 29 Key Findings 6 Malware details 32 GoldenEagle and CarbonSteal convergence 33 C2 infrastructure and connections with other malware 34 SilkBean 7 Findings 7 About Lookout 37 Targeting 8 Malware details 9 Command and control infrastructure and possible 11 Acknowledgements 37 distribution mechanisms Connections to other Uyghur-targeted 12 surveillanceware Appendix A: Targeted countries 38 DoubleAgent 18 Appendix B: Indicators of compromise 40 Findings 18 Malware details 19 DoubleAgent connection to other malware families 22 CarbonSteal 23 Findings 23 Malware details 24 CarbonSteal C2 infrastructure and APT 15 links 26 SECURITY RESEARCH REPORT Executive Summary The Lookout Threat Intelligence team has discovered four Titles and in-app functionality suggest targets speak a Android surveillanceware tools, which are used to target the variety of languages including: Uyghur (in all its four scripts: Uyghur ethnic minority group. Our research indicates that Arabic, Russian, Uyghur Cyrillic and Chinese), English, Arabic, these four interconnected malware tools are elements of Chinese, Turkish, Pashto, Persian, Malay, Indonesian, Uzbek much larger mAPT (mobile advanced persistent threat) and Urdu/Hindi. campaigns that have been active for years. Although there is evidence that the campaigns have been active since at The development timeline and targeting of these families least 2013, Lookout researchers have been monitoring also appear to align with Chinese national security directives the surveillanceware families — SilkBean, DoubleAgent, and “counter-terrorism” efforts as defined by the Chinese CarbonSteal and GoldenEagle — as far back as 2015.
    [Show full text]
  • Case 5:20-Cv-08570-LHK Document 86 Filed 04/22/21 Page 1 of 132
    Case 5:20-cv-08570-LHK Document 86 Filed 04/22/21 Page 1 of 132 BATHAEE DUNNE LLP SCOTT + SCOTT ATTORNEYS AT LAW LLP 1 Yavar Bathaee (CA 282388) Kristen M. Anderson (CA 246108) 2 [email protected] [email protected] Edward M. Grauman (p.h.v. forthcoming) 230 Park Avenue, 17th Floor 3 [email protected] New York, NY 10169 Andrew C. Wolinsky (p.h.v. forthcoming) Tel.: (212) 223-6444 4 [email protected] 445 Park Avenue, 9th Floor Christopher M. Burke (CA 214799) 5 New York, NY 10022 [email protected] 6 Tel.: (332) 205-7668 David H. Goldberger (CA 225869) [email protected] 7 Brian J. Dunne (CA 275689) Kate Lv (CA 302704) [email protected] [email protected] 8 633 West Fifth Street, 26th Floor 600 W. Broadway, Suite 3300 Los Angeles, CA 90071 San Diego, CA 92101 9 Tel.: (213) 462-2772 Tel.: (619) 233-4565 10 Interim Co-Lead Counsel for the Patrick J. McGahan (p.h.v. forthcoming) 11 Advertiser Class [email protected] Michael P. Srodoski (p.h.v. forthcoming) 12 [email protected] 13 156 South Main Street, P.O. Box 192 Colchester, CT 06415 14 Tel.: (860) 537-5537 15 (Additional counsel on signature page) 16 UNITED STATES DISTRICT COURT 17 NORTHERN DISTRICT OF CALIFORNIA 18 SAN JOSE DIVISION 19 MAXIMILIAN KLEIN, et al., on behalf of themselves Case No. 20-CV-08570-LHK 20 and all others similarly situated, The Hon. Lucy H. Koh 21 Plaintiffs, CONSOLIDATED ADVERTISER CLASS 22 v.
    [Show full text]