A MIDDLE SCHOOL TEACHER IN WESTERN NEW YORK replaces the principal’s daily morningmessage with a live student newscast. An educator in Modesto, CA, and one in Kyoto, Japan,connect their students via a virtual space and bring a new dimension to their foreign exchangeprogram. A high school teacher creates an alter ego to bring his students in touch with environmentalconcerns on the Galapagos Islands. An Alabama principal opens a new frontier for herfaculty with a program that teaches them how to use Web 2.0 tools in the classroom. Througha variety of efforts large and small, across schools, districts, and even oceans, educators are makingteaching and learning come alive through the pioneering use of technology. Together, theyare T.H.E. Journal’s class of 2007 Innovators.
Edith Pickens : Challenger Middle School (AL) :: Carol Ann McGuire : Imperial Elementary School (CA) :: Paul Larson : Alicia Cortez Elementary School (CA)
Rob Zdrojewski : Amherst Middle School (NY) :: Ronda Stonecipher : San Marcos Consolidated Independent School District (TX) :: John Concilus : Bering Strait School District (AK)
Joseph Underwood : Miami Senior High School (FL) :: Stan Trevena : Modesto City Schools (CA) and Chris Flesuras : Kyoto Gakuen High School (Japan) :: Paula White, Ray Cairnes, and Melanie Dusci : Albemarle County Public Schools (VA)
Colette Stemple, Susan O’Connor, Amy Scott, and Marion Hanks : Coral Reef Senior High School(FL) :: Mike Riley : Bellevue School District (WA) :: Cathy Barnett : Antwerp Local School District (OH)
Linda McVay, Linda DeSpain, Diane Fenly, and Becki Teague : Edmond Public Schools (OK) :: Christine Young, Stephanie Branson, and Alan David : Spalding Drive Charter Elementary School (GA) :: Brian Dawson : Christa McAuliffe Middle School (FL)
This article originally appeared in the 12/01/2007 issue of THE Journal.
Sign up for our newsletter.
Whether it’s a student trying their hand at hacking or leveraging a stolen teacher’s password, a teacher up to no good, or an external attacker leveraging stolen passwords, how are you supposed to spot inappropriate access?