Previous by DateNext by Date Date Index
Previous by ThreadNext by Thread Thread Index
LM_NET Archive



Here is the Hit on the responses I received concerning how to track computer
usage and manage student use of computers using student Ids. I am doing it
in Two parts as there were a lot of  details in some of the responses.  Very
interesting responses - Thanks to all , I am compiling them in a report I am
making to my principal as we are going to re-do all the computers ( AGAIN!)
and install an NT server.  I want to be able to have students have
individual log-ons and I have to track usage because of a 5-year Technology
Improvement Study we are doing.
-----------------
Our system is very imperfect.  Each computer in the library (65) that we
monitor has a card.  The students, when they sign up for computer, must sign
the card with their name, date, and time.  Many times the kids plop down
without signing in and then we have to go talk to them.  I would be
interested in the responses you get.  We're slated to get a new online
catalog system next year, and I'm wondering if there is a way that we can
enter the computer IDs, just like a book or magazine, and then when the
student signs up, we would sign the ID.  If the system can archive the
information then we would have a name, date, and time.  Interesting.  Susan

-------------------------
At my jhs we check out the computers to students using their id
cards.  Each computer has an assigned bar code and we have a sheet with the
barcode numbers of all the computers on it.  We just wand the student, then
the computer.  You can run statistics for the computers just like you would
for circ. stats for books.  Also, that way we can put blocking messages up
if a student has been denied computer usage for an infraction of the
AUP.  When an entire class is using computers, rather than check them out
individually, we have the students put their id card on the monitor clip so
that we can see that they have permission (the id cards have a unique hole
punch indicating parental permission) and the computers are checked out to
the teacher.
-----------------------
At Sevenoaks (www.sevenoaks.wa.edu.au) all courses are online and
students have open access to the Internet and email facilities. The
network is a single domain using Windows 2000. Students log into any
computer in the college using their ID number - this is also their
curriculum council number and is used as a single identifier for each
student across all systems in the college, including the student
information system. When they write the software so all the systems can
talk to each other this will make life very easy!

Student email is open to the network technician, as is their personal
workspace. All Internet traffic is monitored and sites deemed
inappropriate are flagged - whoever is using the computer is logged as
well by their ID. The technician can trace/track what each individual
student has done by following their ID - makes life easier as students
move around the college to access different computers to complete their
work. Saves you time with login sheets. All students sign an agreement,
to lose their computer privileges means they have great difficulty
completing tasks as most teachers use email and the online courses to
run classes. The students find the old technology of pen and paper and
relying on a buddy to print and download annoying to say the least. It
isn't seamless by any means - yet - but is getting that way!
----------------------
We use Novell, not NT, but your network administrator should be able to
institute some tracking software on the network level to keep track of
things.  Each student will have a username and password to login to the
network.  There are a number of conventions that are used to create user
names.  We happen to use the first four letter of the last name, followed
by the first three letters of the first name (thus I am oelkann).  Other
conventions are first initial and last name (aoelke) or first & middle
initial (acoelke) and various such combinations.
----------------------
What circulation system do you use?  We use e-term which
comes through our DAsite. This was an infohio project.  We scan
in student's ID and then the book ID to circulate.  Our system has
the capability to assign the computer a bar code (ID) and then
scan it to that student.  Debbie McNally Vinton County High School
----------------------
I am Jr. High librarian.  We have had a network for 7 years where students
have had to log-on with a user name and a password. For most of those years,
the user name and password were the same because no one would thought there
were any problems.  But our user name is the students ID number, when run
pretty consecutively within a grade.  Not real secure when you are dealing
with 7th and 8th graders.  So 2 years ago I took it upon myself to set up
individual passwords with every student...very time consuming even with just
240 students. We have had no problems with students getting into each others
files in all that time.  Some students do forget their password or change it
without permission.  But that percentage is small and worth the effort to
teach them now about security issues.

As for tracking usage...with a network I think your tech people should be
able to provide statistics about how often a particular computer has been
accessed.  The question will be whether they are willing to do that kind of
thing.  Ours are not.  I have never been asked for usage statistics on my
computers by anyone.  But I have been curious.

BTW when you have suspicions about where a student has been on the computer,
the tech people can also track that and determine where that student has
"traveled" on the Internet.  We caught several students violating computer
use policy that way.

I have now numbered (1-8) all of my computers and created a barcode card for
each and entered them in my circ program just like any other material.  I
have put plastic pockets on each of the computers with that number (1-8)
written on them.  When students come to use the computers for anything other
than using the card catalog, they must check out a computer. Process is the
same as checking out a book.  I or my aide scans their ID card, scans a
barcode card for a computer, and hands it to the student.  That student then
goes to that number computer and places the barcode card in the plastic
pocket on the side of the monitor. When they are finished they must return
the card to the Circ desk and check it back in.

I can run statistics for each computer as a material item and I know who
used each machine in case there are any problems.
---------------------------
Our students have always needed to use their student ID's to login to
any school computer.  They each choose their own passwords.  In the
media center we have students sign a sheet which includes their
name, grade level, the reason for using a computer, and the period
during which they are using it.  This has worked fairly well for us.
---------------------
We are a networked district.  Students are given a log-in when they enter
school, and it stays with them 'till graduation.  Almost always it's the
first 4 letters of last name, first initial, last 4 digits of their student
ID number (also issued upon enrollment).  Passwords are erased every summer,
and computer generated nonsense passwords are created by the central tech
department.  These are given to the students at registration.  They have
basically a month to be sure all the correct forms and permisiions are
signed and turned in.  Returning students generally have these on file
already. Students change their own passwords.  When they come to the
library, we used to check out the computers as we would a book - and yes,
they had to have their student ID card.  We are still holding the line with
library books - no card, no book.  We have, however, gone to a sign up sheet
much as you describe for computers, because we were constantly jumping up
and down to check the computers in and out. In cases of misuse, the district
tech people can go into student records to see where and when they used
which computer, because they are signed on individually.  We used to have a
generic password, but no more. The computer labs, which are nowhere near the
library, still require student ID cards for use.  By the by, it states
clearly in our student handbook, that students are to carry their ID card to
school everyday.  Most do, actually.  Our change was caused partly by the
reduced hours my assistants work these days, which was brought about by our
severe budget crisis here in Oregon.  (see Doonesbury) Hope this helps. The
really intense work falls on the tech department aide who has to deal with
new passwords, forms, permissions, forgotten pws, etc.  Do not under any
circumstances let anyone give your or your staff this job.  It's a killer.
---------------------------

Toni Koontz
akoontz@cdeducation.org
Media Specialist
St. Charles Preparatory
www.cdeducation.org
Columbus Ohio
Carpe Diem

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-
All LM_NET postings are protected by copyright law.
To change your LM_NET status, e-mail to: listserv@listserv.syr.edu
In the message write EITHER: 1) SIGNOFF LM_NET  2) SET LM_NET NOMAIL
3) SET LM_NET MAIL  4) SET LM_NET DIGEST  * Allow for confirmation.
LM_NET Help & Information: http://ericir.syr.edu/lm_net/
Archive: http://askeric.org/Virtual/Listserv_Archives/LM_NET.shtml
LM_NET Select/EL-Announce: http://www.cuenet.com/archive/el-announce/
LM_NET Supporters: http://ericir.syr.edu/lm_net/ven.html
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-

LM_NET Mailing List Home