Management Strategies in The Educational Setting: Teaching With Technology In Nursing Education

In Nursing Education Management Strategies in The Educational Setting: Teaching With Technology In Nursing Education involves utilizing various strategies like collaborative learning, active learning techniques, and bridging theory with practice through simulations and virtual labs, all while promoting lifelong learning and self-guided learning.

Teaching With Technology In Nursing Education: Management Strategies in The Educational Setting

Teaching With Technology

Using technology to facilitate learning is the ultimate goal. The time spent learning new programs and applications becomes worthwhile when students learn new concepts as a result. Incorporating new forms of technology into instructional practices expands what we can teach. Technology also helps us reach learners with a variety of learning styles (Fuszard, 1995).

Uploading learning objects within learning management platforms and to Web pages gives students greater access to the objects we’ve created.

Using Technology to Produce Your Own Learning Assets

Learning just a few simple programs can greatly expand your repertoire of learning objects. There are many programs, PowerPoint for example, that give faculty members more options in teaching. You can create a narrated streaming media presentation simply by using a PowerPoint presentation you’ve already created by using Camtasia. You can upload the video presentation to a Web page by learning management system such as Blackboard.

Other multimedia authoring tools include Microsoft’s Producer and Movie Maker, which are available at no additional charge from Microsoft. Macromedia also makes a number of entry level and advanced authoring tools. Many nursing educators are taking the time to learn to use the higher level tools produced by Macromedia because they are becoming the production standard. Campus support services are often invaluable in assisting students and faculty.

Games: Crosswords and Other Word Puzzles, Question and Answer

Students love online games of all types. Question and answer, all types of word puzzles, and jig-saws can be created for use in the classroom or online. In fact, many of the applications to create these puzzles are free. The use of games is supported by both adult (Knowles, Holton, & Swanson, 1998) learning principles and best practices. Web-based games can increase an instructor’s repertoire of skills and provide more creative ways of disseminating and reinforcing content.

Word games are especially helpful in building vocabulary for English as second language students. Examples of these free games and their intended support of learning comprehension level . Examples of game programs for purchase are listed along with their complexity for use. Online games can support learning in relation to Bloom’s taxonomy and many of the word games cited can easily be created and implemented within an hour.

Knowledge and comprehension can be supported by using crossword puzzles, word search, and other word-based games as well as jigsaw puzzles. Application and analysis skills are enhanced by games using question and answer, and simulations (Blenner, 1991). Synthesis and evaluation can be enhanced by more complex decision-making and critical thinking games implementing any of these word games requires design and planning.

Best Practices and Tips of Computer Users

The following offers tips for more effective and productive use of technology.

Managing Files and Folders

The first thing people who use computers notice is that a large number of files and folders are created in a short time. As files are used and edited, the challenge to find the folders and files for any project becomes difficult. Developing a strategy for naming folders and files is crucial to being an effective computer user. In order to manage folders and files, be sure to use a disciplined approach to creating and saving documents.

Always spell names of files and folders correctly, so that you can effectively use search tools to find them. Furthermore, think about all the types of files you will be collecting before you have a large number. You may want to put all similar documents in the same folder. It doesn’t matter what you call the folders as long as you can remember the names.

Naming Files

It takes a disciplined approach to naming files to be able to find them. It is best to use a descriptive term when you name a file. This will make it much easier to find later. It is also important to avoid special characters such as \ / : * ?” | In file names as the file may not open properly in learning management systems. The letters before the “.” Are the filename and the letters after the “.” are the extension (ie, doc or PowerPoint).

Do not change the extension unless you must for some compelling reason. File names can be a couple of hundred characters long but it is rarely necessary to have the names longer than a few letters. Remember that the longer the file name, the more you have to type. The longer the file name, the greater the chance for a typo.

Word Processing, Editing

Word processing is the most common function related to education performed on a computer. It is surprising how much a word processing program can do. As mentioned earlier, it is best to get acquainted with the help index in all programs so that you can become familiar with the thousands of functions built into a program.

Nursing instructors use some specific features of word processing programs more than others. In addition to creation of documents, you can insert comments or corrections into a student’s papers by using “track changes” or “insert comments” in Microsoft Word.

Keyboard Shortcuts

People learn to use computers and software on a “need to know” basis. As a result, many helpful features of a computer or software are never “discovered” and go unused. There are several things you can do to make sure you are always exploiting the useful features of your computer. Take time to look at the online help for the computer or software.

The technical assistance index is usually accessed through the “help” link on the application toolbar or desktop of your computer. Make it a habit to search for additional information on common functions used. For example, everyone likes to save time—put the term “shortcuts” in the search box under Help. You will find several selections related to shortcuts. Select the link for “keyboard shortcuts.”

You will find a lengthy list of keyboard shortcuts to save you time. Another important feature of Windows and Macintosh operating systems is the ability to search for files and folders from the start menu. Assuming all files were named with a correctly spelled title, and you can remember it, you can search for files from the start menu or desktop. This saves you large amounts of time when you have hundreds of files stored on your computer.

Screenshots

Screenshots are an excellent learning tool for presentations, technical assistance, and demonstrating competence in computer skills. To take a picture of the computer screen at any given time press the “PrtScn” usually found on the top right of your keyboard. Place your cursor where you want to insert the screen shot. Think of it as a graphic.

You can use screen shots to teach students how to use software; you can ask them to take screen shots of their completed online projects and place the images in PowerPoint presentations for many purposes. You can edit the size and crop sections of the image for use by right clicking the image to bring up the picture tool bar.

Templates and Macros

There are many timesaving features in most word processing and database applications. Taking the time to learn about these features is worthwhile. Templates are preformatted designs used in presentations, web pages, documents, and spreadsheets. You can usually download additional templates from the developer and third-party providers.

Some will be free, others will be available for a fee. Macros, like templates, save users a great deal of time. Macros are small automated programs that help you execute common tasks with a few keystrokes. Use the help menu in the program to learn more about these features. Practice with simple functions to get used to how they work then graduate to larger tasks.

Security and Privacy

There is no way to overemphasize the need for ensuring that your computer is secure and that all of your data files are backed up. There are many ways that you can easily back up files. The simplest and least expensive is to back up files on CD or other magnetic media. Newer forms of back up include external hard drives of all kinds.

You can choose the size of the external hard drive to buy by assessing your budget and whether you want to back up the entire contents of your computer or only the data files. Programs are available to create a mirror image of your hard drive when there is a complete crash of the system or simply files you have created. You can copy and paste the files from your desktop computer to your portable hard drive or buy any one of a variety of software programs to do it automatically.

Security Concerns

Threats to your computer’s security and to your identity are part of the downside of the Internet. If you never use the Internet you have no problem, but once you open up e-mail, buy something online, or visit Web pages, your computer is vulnerable, as you are unintentionally revealing private information about yourself. Although the threats are big, there are some low-cost ways to prevent the majority of potential attacks to you and your computer.

The most important security updates you will get are to the Microsoft Windows operating system. Be sure to set your Windows preferences to ask you automatically about installing updates. Routinely check Microsoft for security patches if you do not set the software to check for you automatically. Every piece of software you are using gets updated by the manufacturer on a regular basis. You will find it necessary to keep software updated to ensure that it works properly and you are able to get the most out of it.

It is likely that you will need to download plug-ins to view multimedia or other web content. Antivirus software is an essential tool for anyone who opens e-mail attachments and visits Web sites. There are many commercial and free software programs available. Many campuses provide these programs free or at discounted rates.

Viruses and other manmade creations that could destroy your files can also be stopped by firewall hardware, such as a router, which is relatively inexpensive and available at a local computer store. When you have a router installed, it creates a “wall” to the Internet. You can access the Internet, but Internet users cannot access your computer without your permission.

Nevertheless, you can still have creators of websites place “spyware” on your computer. Spyware includes small files that track varying degrees of your Web surfing habits. There is “anti-spyware” software that is free or low-cost. The bottom line of security and privacy is that a few ounces of prevention will save you many hours of headaches and frustration. Be sure to maintain up-to-date antivirus software, a firewall router, and anti-spyware software on your computer at all times.

Passwords and Hackers

It won’t be long before you have a collection of user names and passwords for all types of Internet resources. It is critical that you manage these passwords in a way that protects your privacy. Most of us have far more than we can remember without writing them down. Do not keep them in your Outlook or other Internet accessible database.

Hackers often do not need to have expert programming skills to gain access to computers. They use social engineering principles to get access to confidential information in order to commit fraud, to destroy networks, or participate in other criminal activities. Social engineering is defined as the art and science of getting people to comply with your wishes. Social engineering uses two primary areas of attack. First, someone posing as a student, staff, or faculty member may ask questions about passwords and access codes.

Social engineers may ask one faculty member how many digits are in a password and call someone else and ask about the syntax or structure of a password. The second type of activity is someone simply watching how you use your computer. Perhaps someone comes to your office to pose as a student and get information about the program. The would-be hacker may be watching how and what you do to gain access to your university account. Position your computer away from doors so that people cannot watch your keystrokes or other computer activity.

Searching the Internet

The Internet is the most extensive collection of information ever created. Search engines such as Google, Yahoo, and Microsoft use very sophisticated and innovative programming intended to help us find what we are looking for in as short a time as possible. Search engines make their money from advertising sponsors. Although they are technically free to use, you will be exposed to many organizations trying to sell you products and services.

The places you visit on the Internet, the length of time you stay at a site, and what you do there are all sources of valuable information to advertisers. At the time of this publication, Google is considered the premiere search engine. Google uses your “search terms” much like a library database to locate what you want. There is a very extensive collection of instructions and tips for using Google at the site http://google.com. Spending an afternoon reading through some of the basic information on searching strategies will save you hours of time.

Accessing and Securing Help

No matter how many classes you take or books you read, you will still need to get additional help from time to time. The best place to get answers to your computer-related question is your university’s help desk. Do not be discouraged if an answer is not immediately forthcoming when you ask a question. It may be that your question is the tip of a technological iceberg that is just attacking the university network.

You may also be using a unique piece of software that does not communicate well with the established software on campus. Some questions will take time to answer properly. By posing questions, help desk staff can be alerted to potential widespread problems. Always consult the online help in any software programs you have as well.

Granted, it is often a challenge to find the right search terms, but you will never get an answer if you don’t at least search the files. The next best source is posing questions in online groups. Start with users groups sponsored by the manufacturer of the product or the software developer.

Typically, the technical skills required include accessing the Internet, composing postings, managing attachments, organizing files and folders, and record keeping. Additional skills, outside of the nursing class, include searching library databases, using online plagiarism detection services, and completing other interactive online activities.

Read Also: https://nurseseducator.com/management-strategies-in-the-educational-setting-class-room-management-instructional-and-proactive-planning/

https://nurseseducator.com/management-strategies-in-the-educational-setting-behavioral-psychology-theory-of-rudolf-dreikurs-and-charles-synergetic/

https://nurseseducator.com/management-strategies-in-the-educational-setting-high-need-students-their-categories-and-teaching-responsibilities/

https://nurseseducator.com/management-strategies-in-the-educational-setting-emotional-intelligence-and-dynamics-of-effective-student-teacher-relationship/

https://nurseseducator.com/management-strategies-in-the-educational-setting-use-of-technology-in-nursing-education-according-to-learning-domains-and-its-types/

https://nurseseducator.com/management-strategies-in-the-educational-setting-class-room-management-instructional-and-proactive-planning/ 

Social Link: https://www.facebook.com/nurseseducator

Leave a Comment