The SECTIONS model assesses the quality of technology being implemented in a given learning environment. Prior to implementing any technologies, the model’s guidelines will help answer many questions, for example: what is the most effective and appropriate technology to use for the students? How can students be evaluated with the use of technology? Many of these questions are answered with the following process:
- Students: Who are the designated learners and do they have all the necessary tools to access these technologies?
- Ease of use: How difficult is it to use these technologies? What level of technical literacy does a learner need for these technologies?
- Costs: How affordable is it to adopt and maintain these technologies? Is there a long-term plan in place?
- Teaching functions: What form of technologies will delivery the best learning outcomes to students? Additionally, what form of content on these technologies will be most beneficial to students?
- Interaction: How much interaction is going on between the technology, student, and teacher? How will more or less interaction affect the student and their learnings?
- Organizational issues: What are the organizational rules that are needed to be followed? How is the adopted technologies maintained?
- Networking: Who can access these technologies? Only students? Can expanding the network of users benefit the learners?
- Security and privacy: How secure are these technologies in terms of data? How can it ensure data cannot be manipulated by a third party program?
The whole SECTIONS model broken down into acronyms can be seen above where it outlines a number of questions prior to adopting new technologies into the classroom. In my opinion, security and privacy becomes highly important and difficult to solve. This is also because of the fast growing development of modern technologies where you must always be up to date. There are always ongoing issues with privacy and security where there is no best solution yet. And this is because as the development of modern technologies continue, the development of security and privacy breaches also improve.
Leave a Reply
You must be logged in to post a comment.