Skip to main content

Role-Playing as Bloggers


At the NESA2012 Spring Educators Conference, teacher Pilar Quezzaire, of the American Community School in Beirut, presented a short workshop on the use of live simulations.  During the workshop, participants practiced with a brief simulation of the Syrian crisis – we randomly selected disparate roles of participants, then provided some statements and responses that would be characteristic of those roles.  Ms.Quezzaire added a modern twist to the role-playing by instructing us to act as bloggers.  Role-playing allows us to avoid personal conflicts in class, but even so it often engenders empathetic reactions.  Blogging our comments provides some emotional distance, and also allows students to research through that very medium – i.e. finding and reading weblogs of people filling each role in the society. Further, the spotlight on blogs allows students to see more directly the isolating nature of the medium, thereby encouraging them to recognize the need to seek out alternative views and converse directly with other participants in order to find solutions – analogous to the real-life situation as well.

At ISG-Jubail School's technology classes I can use the simulation and assigned role-playing as a way of introducing both the use of blogs and the importance of seeking multiple sources of information when searching the internet, of avoiding the filter-bubble (as described by researcher Eli Pariser).

Comments

Popular posts from this blog

Review: Jerusalem, Jerusalem: How the Ancient City Ignited Our Modern World

Jerusalem, Jerusalem: How the Ancient City Ignited Our Modern World by James Carroll My rating: 4 of 5 stars Fascinating comprehensive worldview, with Jesuitical logic in a broad sweep that links religion in a circular way to violence and the solution to violence. The author shows a great command of history and religion, with extensive endnotes to support or expand upon most of his claims; however, some sweeping indictments will certainly be resisted by the more fundamentalist People Of The Book (that is, the Abrahamic religions). A core symbolic thread is Abraham's near-sacrifice of Isaac on Mt.Moriah, the supposed site later called Jerusalem -- the author deftly cites that scene throughout the many centuries since the original event, demonstrating the human tendency to misinterpret that near-sacrifice in order to rationalize our own tendency to violence and scapegoating. I started the book in audio form, but found it unlistenable -- the author's c...

Kite Runner is with us again

 Six or so years ago, I taught The Kite Runner to three successive sets of tenth-graders, and marveled at the effect the novel had on me and on these adolescents.  That age is a marvelous time for a humanities teacher, as we see callous children grow out of their self-centered cocoons and flex their world-empathic feelers.  They grow into the world outside them and realize they truly have agency -- or will have agency and responsibility for human actions.  Amir, the main protagonist of Kite Runner is so identifiable with those adolescents learning to take responsibility for their callous actions.   And of course we think of Kite Runner now that Afghanistan once again plunges into Taliban rule -- we particularly worry about the fate of the Hazara (news stories already cite random executions of Hazara men).   We can only wring hands and pray that the Taliban will have to adapt and tolerate more than they did before -- but I am not optimistic. ...

Related Reviews: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race then Attack Surface

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth My rating: 5 of 5 stars And the hits just keep on coming! This excellent book details an unrelenting onslaught of cyberattacks, and outlines the author's own gradual realization of the dangers of internet warfare. It is a lengthy but worthwhile read -- actually, I lost the book for a while because I did not want to read it at bedtime, for fear of nightmares or disrupted sleep! Indeed the book is changing my stance toward online security -- multi-factor authentication, definitely! As with most of us, the author first downplayed the fear tactics promoted by sellers of security packages; but after years of research she has come to wonder that more disaster has not happened yet. She briefly but baldly calls out the recent presidentical administration for wreaking havoc on US defense, by eliminating a cybersecurity department, incensing the Iranian and Chinese gover...