Author: George Milliken

Digital Play and Technologies in The Early Years

I am currently reading my way through Digital Play Technologies in The Early Years (Stephen, C., Brooker, L., Oberhuemer, P. and Parker-Rees, R. (2020) Digital Play and Technologies in the Early Years. Paperback. Published: 30 September 2020.) and have selected a chapter to share with you. Chapter 5: Digital Play as a means to develop children’s literacy and power in the Swedish preschool.  Marklund, Leif & Dunkels, Elza. (2016). Digital play as a means to develop children’s literacy and power in the Swedish preschool. Early Years. 36. 10.1080/09575146.2016.1181608.

(PDF) Digital play as a means to develop children’s literacy and power in the Swedish preschool (researchgate.net)

Abstract.

This paper presents different angles on the subject of digital play as a means to develop children’s literacy and power, using an online ethnographical study of Swedish preschool teachers’ discussions in informal online forums. Question posts (n = 239) were analysed using the Technological Pedagogical Knowledge framework and the Caring, Nurturing and Teaching framework, with the aim of understanding how teachers intended to support children’s literacy development with tablets. Literacy development can be understood as a social practice that needs to develop along with changes in society’s demands on citizens. The results presented indicate that school subject oriented skills are predominantly present in the mind-set of these preschool teachers. When digital play is increasingly used for pedagogical purposes in preschools, that also means that preschools have expanded their opportunities to work with children’s literacy development. For preschool teachers, it is important to discuss how literacy development can be supported in a contemporary media landscape.

This study examines Swedish preschool teachers online discussions about how they use digital play to support children’s literacy development.

The paper highlights that literacy is defined as a social practice that needs to develop alongside changes in society (societies demands on literacy), therefore children should have exposure to traditional print literacy and multimodal types of literacy via digital formats.

The report recognises some educators are not yet positioning themselves and their practice alongside the changes in society and explains that media panic may be the reason preventing involvement in digital play.

Another barrier educators may face is conflict between the balance of stepping back and stepping in to support children’s learning. Children are considered as competent, requiring little adult intervention, however when technology is present educators feel a need to supervise and support.

The paper suggests that perhaps what educators perceive as a decline in play due to changes in society and increased engagement with digital technologies is in fact

“a new way of playing, aligned with contemporary society but misaligned with our current conceptions on play and learning.” (Edwards 2014)

Like many other current studies on the digital play in early childhood, this report unpicks the consumer/creator discourse and the difference between open and closed apps and most importantly the role of the adult in supporting children’s literacy development;

 “Thus, preschool teachers may help improve literacy development among children who engage in digital play, if they decide to engage in dialogues with these children, instead of treating games as the children’s own arena for actions.” (Gee 201; Lafton 2012).

  • What are your thoughts? Do you agree literacy development can be understood as a  social practice and needs to develop along with changes in society’s demands on citizens.
  • What might the “media panic” be in regards to? Children’s wellbeing; screen time, lack of physical play, internet safety and cyber security?
  • Do you know the difference between closed apps and open (ended) apps?
  • How do you use digital play to support language development and what is your role, do you step in or step back?

Feel free to share your thoughts via this Microsoft Form

Cyber 9/12 Strategy Challenge

cyber 9 12 strategy challenge

This module has primarily been developed to further enhance the skills of the learners to take part in, for example, cyber competitions and challenges including the Cyber 9/12 Strategy Challenge. 

 

Participants will explore the challenges a country may have when dealing with a national cyber security incident from a non-technical, political, economic social and legal perspective.  

Participants will also develop their public speaking and presentation skills to discuss cyber security issues at the highest decision-making levels.  

 

The module is intended for school pupils, university and college students and can be adapted to suit the level of learners. 

Lesson plans and course overview – cyber 9/12 strategy challenge overview

 

cyber 9 12 strategy challenge week 4

Cyber 9/12 Strategy Challenge WEEK 4: Bringing it all together – Cyber Resilience Policy Development 

go to 9/12 home page

 

In this final week of the Module, participants will explore how non-technical cyber security considerations form the foundation of national and international policy solutions. Cyber security and cyber resilience cannot be achieved by technical means alone. As weeks 1, 2 and 3 of this Module have shown, there are political, economic, social, legal and increasingly environmental considerations to take into account in addition to the technical (the PESTLE approach to cyber security). Effective policy must, if possible, draw together these elements as they are each important parts of wider solutions. 

 

In this unit, students will explore what makes effective policy in the cyber context when dealing with major cyber incidents targeting critical national infrastructure. Crucial to this is the ability to combine and address different thematic areas and create succinct policy recommendations that still achieve particular goals and make states resilient to cyber incidents. 

Learning outcomes

By the end of Week 4, students will have:

  1. Brought together the previous three weeks learning to develop holistic policy solutions.
  2. Understood and made aware of how technology, law and (inter)national politics interact.
  3. Analysed a major cyber incident from a holistic, non-technical perspective.
  4. Confidently provided, recommended and discussed holistic cyber resilience policy solutions which do not solely rely on technical tools.
  5. Navigated the complexities of reserved (Westminster) and devolved (Holyrood) areas of policy in relation to cyber issues

1. Watch this video

YouTube player

2. Read these
3. Group activities

In your groups, discuss how to develop holistic policy solutions incorporating, or at least acknowledging and addressing, the political, economic, social, technical, legal and environmental aspects of cyber security

 

In your groups, prepare a 10minute presentation addressing the unit’s three questions:

Provide 3 policy recommendations to help Scotland be more resilient against Stuxnet-style operations. Think about:

  1. The way Stuxnet entered the target system.
  2. The impact of the operation if successful.
  3. Explain and support your choices.
  4. Set out the cross-government (UK and Scotland) policy relationships that need to be considered?
4. Assessment

10-minute oral presentation and feedback from module leader 

cyber 9 12 strategy challenge week 3

Cyber 9/12 Strategy Challenge WEEK 3: “An attack, or not an attack: that is the question” – Cyber Incidents and international law

go to 9/12 home page

 

In this unit students will be introduced to one of the most complex areas of cyber security: its relationship with international law, specifically the International Laws of Armed Conflict and International Humanitarian Law. 

 

Many major cyber incidents, such as Stuxnet, do not explicitly, categorically or obviously breach international law. Making a case is problematic and requires careful consideration and argument. In this unit, students will receive an introduction to international law, how it can be applied to major cyber incidents, and what states can do should they experience one.  

 

In all of the above, the key skill participants will gain is arguing for and making a case for a particular view, even when there is no clear-cut right or wrong answer. The key skill is creating and presenting a particular case to decision-makers. 

 

One of the critical areas to be covered in this section is the complex relationship between reserved and devolved responsibilities when responding to cyber incidents. While these policy areas are clearly separated between the UK Government (which retains cyber security policy) and the Scottish Government (which is concerned about the impact of a cyber incident on Scotland and its people), the nature of cyber incidents is such that the distinction between devolved and reserved areas is blurred. How policy- and decision-makers navigate these complexities is increasingly important in today’s digitalized world. 

Learning outcomes

By the end of Week 3, students will have:

 

  1. Explored the Laws of Armed Conflict (LOAC) and International Humanitarian Law (IHL) and set out basic foundations for these bodies of law to increase awareness of these legal instruments.
  2. Explored the complex natured relationship cyber security and resilience has with IHL and LOAC by examining a major cyber incident (Stuxnet) the legal position.
  3. Discussed and explained with increased confidence how cyber incidents relate to international law, acknowledging the complex nature of that relationship and the fact that the students are not trained lawyers.

1. Watch this video

YouTube player

2. Read these
3. Group activities

In your groups, discuss how, or if, international law can be applied to cyber incidents.

 

In your groups, prepare a 10minute presentation addressing the unit’s four questions:

  1. In your opinion, can major cyber incidents breach International Law? Explain your answer using Stuxnet as an example.
  2. What elements of International Law are relevant to the discussion of major cyber incidents such as Stuxnet?
  3. Who or what policies and enforces the international laws relevant to your answers to Questions 1 and 2?
  4. Which policy areas that are devolved to Scotland could be impacted by a cyber incident?
4. Assessment

10-minute oral presentation and feedback from module leader 

cyber 9 12 strategy challenge week 2

Cyber 9/12 Strategy Challenge WEEK 2: Beyond the Middle East – The International Relations’ impacts of cyber incidents

go to 9/12 home page

 

In this unit, participants will explore how cyber operations and incidents can impact how states interact with one another. Major incidents such as Stuxnet have important geopolitical and geostrategic implications and can change the way states deal with one another. 

 

To understand how cyber operations fit into this complex landscape, participants will first be introduced to the foundations of the field of International Relations. Participants will explore some of the key theories of the field and what they mean, and also examine how “cyber” is changing those theories. The goal is to look beyond purely technical consequences of major cyber incidents and to explore how an incident identified in one part of the world can send political ripples all around the globe. 

 

Finally, participants will look at how private companies engage in international powerplay and what impact this has on international relations and strategy. 

Learning outcomes

By the end of Week 2, students will have:

  1. Examined the international impacts and consequences of major cyber incidents, using Stuxnet as an example.
  2. Explored the concepts and theories of the field of “international relations”.
  3. Placed cyber incidents in that international context, with the understanding that technological events can have non-technological consequences beyond their immediate vicinity.
  4. Explained and discussed the international implications of cyber incidents to a non-technical or non-IR-expert group of policy-makers.

1. Watch these videos

YouTube player

YouTube player

2. Read these
3. Watch this video

Microlecture/YouTube Video Prof Noah Zerbe

YouTube player

This video Is heavily focussed on US policy and responses, as that is the topic of the microlecture. However, the overall themes are universal – all states deal with these issues. Prof Zerbe provides an example of how a state responds

4. Group activities

In your groups, discuss how major cyber incidents such as Stuxnet have an impact on the way states interact with one another.

Then, in your groups, prepare a 10minute oral presentation explaining the impacts of major cyber incidents on international politics. Prepare answers to the unit’s three questions. 

 

  1. What was the impact on the international community of: 

a. The discovery of Stuxnet in the open Internet? 

b. The Stuxnet operation itself? 

2. Who were the primary players in this operation? What is your evidence/explanation for this? 

3. What, if any, was the impact on International Relations of a private company – and not a national security or intelligence agency – discovering and publishing the existence of Stuxnet? 

 

Be prepared for additional questions from your Module Leader. 

5. Assessment

10 minute oral presentation and feedback from module leader 

cyber 9 12 strategy challenge week 1

Cyber 9/12 Strategy Challenge WEEK 1: Explaining the Technical Challenges

go to 9/12 home page

In this unit, module participants will delve into the intricate technical dimensions of Stuxnet, an unprecedented cyber weapon, in order to be able to clearly explain technical cyber issues to a non-technical audience of decisionmakers. Exploring its architecture, students will dissect Stuxnet’s code, uncovering advanced techniques like code injection and zero-day exploits.  

 

Through videos and real-life technical analyses of a major cyber incident, learners will grasp the malware’s propagation methods and its tailored attack on industrial systems, particularly Iran’s nuclear facilities. Discussions should revolve around Stuxnet’s implications for global cybersecurity, emphasizing the significance of understanding such sophisticated threats. By immersing themselves in Stuxnet’s technical intricacies, students will gain insights into the evolving landscape of cyber warfare and the importance of robust defense strategies, while also gaining and practicing key discussion skills. 

Learning outcomes

By the end of Week 1, learners will have:- 

  1. Examined the technical aspects of a major cyber security incident with international consequences. Stuxnet is the example being analysed.
  2. Learned about the technical elements of Stuxnet.
  3. Learned about and understood how stuxnet was deployed and the implications of this for national infrastructure.
  4. Practised describing and explaining these technical elements to a non-technical audience of decision-makers.

1. Watch this video

YouTube player

2. Read these
3. Watch this video

YouTube player

4. Group activities

In your teams, examine how Stuxnet operates and its technical impact  

In your groups, prepare a 10minute presentation addressing the unit’s three questions: 

  1. What was the primary attack vector for Stuxnet deployment? What is the significance of this? 
  2. Which vulnerabilities did Stuxnet exploit? 
  3. How can a country like Scotland guard against this particular kind of deployment? 

 

5. Assessment

10-minute oral presentation and feedback from module leader 

cyber resilience lessons

Cyber Resilience and Internet Safety Lessons

These resources have been created in collaboration with teachers from Barrhead High School and Bearsden Academy. They are designed to be easy to use, with clear definitions and concise language.

The lessons are designed to introduce and reinforce that learners need to:

  • understand risks and potential harms
  • develop skills and strategies to reduce risk
  • have strategies in place to manage or report potential harms

This approach is based on the work of this literature review by the University of Glasgow (2024) – access the literature review with this link

Use this link to access the OneDrive folder:

Education Scotland digilearn cyber resilience BGE lessons

You must be logged in to Glow to access the resources. 

PowerPoint files cannot be edited but you should be able to make a copy in your own OneDrive and edit that.

recommended reading on screentime and social media

‘Screentime’ – recommended reading

This page contains links to articles and papers exploring the risks of ‘screentime’ and social media and the lack of data and evidence supporting its purported impact on mental health, particularly children and young people:

The great rewiring: is social media really behind an epidemic of teenage mental illness? (nature.com)

OII | Study finds screen time – even before bed – has little impact on teen well-being (ox.ac.uk)

Do smartphones really cause mental illness among adolescents? Ten problems with Jonathan Haidt’s book – Parenting for a Digital Future (lse.ac.uk)

Focus on teen social media use obscuring this key cause of depression (sfchronicle.com)

Systematic literature review of digital risk

A systematic review of digital risk and mitigations in children aged 8 to 12 – Challenges and Opportunities by Hana Butorova, Yvonne Skipper, and Christopher Hand, School of Education, University of Glasgow

The University of Glasgow have undertaken this systematic review of literature on the subject of cyber resilience on behalf of Education Scotland.

A systematic review of digital risk and mitigations in children aged 8 to 12