Previous by Date | Next by Date | Date Index
Previous by Thread | Next by Thread
| Thread Index
| LM_NET
Archive
| |
Here is the Hit on the responses I received concerning how to track computer usage and manage student use of computers using student Ids. I am doing it in Two parts as there were a lot of details in some of the responses. Very interesting responses - Thanks to all , I am compiling them in a report I am making to my principal as we are going to re-do all the computers ( AGAIN!) and install an NT server. I want to be able to have students have individual log-ons and I have to track usage because of a 5-year Technology Improvement Study we are doing. ----------------- Our system is very imperfect. Each computer in the library (65) that we monitor has a card. The students, when they sign up for computer, must sign the card with their name, date, and time. Many times the kids plop down without signing in and then we have to go talk to them. I would be interested in the responses you get. We're slated to get a new online catalog system next year, and I'm wondering if there is a way that we can enter the computer IDs, just like a book or magazine, and then when the student signs up, we would sign the ID. If the system can archive the information then we would have a name, date, and time. Interesting. Susan ------------------------- At my jhs we check out the computers to students using their id cards. Each computer has an assigned bar code and we have a sheet with the barcode numbers of all the computers on it. We just wand the student, then the computer. You can run statistics for the computers just like you would for circ. stats for books. Also, that way we can put blocking messages up if a student has been denied computer usage for an infraction of the AUP. When an entire class is using computers, rather than check them out individually, we have the students put their id card on the monitor clip so that we can see that they have permission (the id cards have a unique hole punch indicating parental permission) and the computers are checked out to the teacher. ----------------------- At Sevenoaks (www.sevenoaks.wa.edu.au) all courses are online and students have open access to the Internet and email facilities. The network is a single domain using Windows 2000. Students log into any computer in the college using their ID number - this is also their curriculum council number and is used as a single identifier for each student across all systems in the college, including the student information system. When they write the software so all the systems can talk to each other this will make life very easy! Student email is open to the network technician, as is their personal workspace. All Internet traffic is monitored and sites deemed inappropriate are flagged - whoever is using the computer is logged as well by their ID. The technician can trace/track what each individual student has done by following their ID - makes life easier as students move around the college to access different computers to complete their work. Saves you time with login sheets. All students sign an agreement, to lose their computer privileges means they have great difficulty completing tasks as most teachers use email and the online courses to run classes. The students find the old technology of pen and paper and relying on a buddy to print and download annoying to say the least. It isn't seamless by any means - yet - but is getting that way! ---------------------- We use Novell, not NT, but your network administrator should be able to institute some tracking software on the network level to keep track of things. Each student will have a username and password to login to the network. There are a number of conventions that are used to create user names. We happen to use the first four letter of the last name, followed by the first three letters of the first name (thus I am oelkann). Other conventions are first initial and last name (aoelke) or first & middle initial (acoelke) and various such combinations. ---------------------- What circulation system do you use? We use e-term which comes through our DAsite. This was an infohio project. We scan in student's ID and then the book ID to circulate. Our system has the capability to assign the computer a bar code (ID) and then scan it to that student. Debbie McNally Vinton County High School ---------------------- I am Jr. High librarian. We have had a network for 7 years where students have had to log-on with a user name and a password. For most of those years, the user name and password were the same because no one would thought there were any problems. But our user name is the students ID number, when run pretty consecutively within a grade. Not real secure when you are dealing with 7th and 8th graders. So 2 years ago I took it upon myself to set up individual passwords with every student...very time consuming even with just 240 students. We have had no problems with students getting into each others files in all that time. Some students do forget their password or change it without permission. But that percentage is small and worth the effort to teach them now about security issues. As for tracking usage...with a network I think your tech people should be able to provide statistics about how often a particular computer has been accessed. The question will be whether they are willing to do that kind of thing. Ours are not. I have never been asked for usage statistics on my computers by anyone. But I have been curious. BTW when you have suspicions about where a student has been on the computer, the tech people can also track that and determine where that student has "traveled" on the Internet. We caught several students violating computer use policy that way. I have now numbered (1-8) all of my computers and created a barcode card for each and entered them in my circ program just like any other material. I have put plastic pockets on each of the computers with that number (1-8) written on them. When students come to use the computers for anything other than using the card catalog, they must check out a computer. Process is the same as checking out a book. I or my aide scans their ID card, scans a barcode card for a computer, and hands it to the student. That student then goes to that number computer and places the barcode card in the plastic pocket on the side of the monitor. When they are finished they must return the card to the Circ desk and check it back in. I can run statistics for each computer as a material item and I know who used each machine in case there are any problems. --------------------------- Our students have always needed to use their student ID's to login to any school computer. They each choose their own passwords. In the media center we have students sign a sheet which includes their name, grade level, the reason for using a computer, and the period during which they are using it. This has worked fairly well for us. --------------------- We are a networked district. Students are given a log-in when they enter school, and it stays with them 'till graduation. Almost always it's the first 4 letters of last name, first initial, last 4 digits of their student ID number (also issued upon enrollment). Passwords are erased every summer, and computer generated nonsense passwords are created by the central tech department. These are given to the students at registration. They have basically a month to be sure all the correct forms and permisiions are signed and turned in. Returning students generally have these on file already. Students change their own passwords. When they come to the library, we used to check out the computers as we would a book - and yes, they had to have their student ID card. We are still holding the line with library books - no card, no book. We have, however, gone to a sign up sheet much as you describe for computers, because we were constantly jumping up and down to check the computers in and out. In cases of misuse, the district tech people can go into student records to see where and when they used which computer, because they are signed on individually. We used to have a generic password, but no more. The computer labs, which are nowhere near the library, still require student ID cards for use. By the by, it states clearly in our student handbook, that students are to carry their ID card to school everyday. Most do, actually. Our change was caused partly by the reduced hours my assistants work these days, which was brought about by our severe budget crisis here in Oregon. (see Doonesbury) Hope this helps. The really intense work falls on the tech department aide who has to deal with new passwords, forms, permissions, forgotten pws, etc. Do not under any circumstances let anyone give your or your staff this job. It's a killer. --------------------------- Toni Koontz akoontz@cdeducation.org Media Specialist St. Charles Preparatory www.cdeducation.org Columbus Ohio Carpe Diem =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=- All LM_NET postings are protected by copyright law. To change your LM_NET status, e-mail to: listserv@listserv.syr.edu In the message write EITHER: 1) SIGNOFF LM_NET 2) SET LM_NET NOMAIL 3) SET LM_NET MAIL 4) SET LM_NET DIGEST * Allow for confirmation. LM_NET Help & Information: http://ericir.syr.edu/lm_net/ Archive: http://askeric.org/Virtual/Listserv_Archives/LM_NET.shtml LM_NET Select/EL-Announce: http://www.cuenet.com/archive/el-announce/ LM_NET Supporters: http://ericir.syr.edu/lm_net/ven.html =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-