Computer Information Systems in Education/Chapter 3/Section 8 -- Videoconferencing

Using videoconferencing has definitely afforded opportunities to students of this generation that have not existed before. In the past, for a student to see a foreign country they would have to travel to that country, see it on TV or in a magazine, but now with the power of technology, students do not have to leave the classroom. Everything is at their fingertips. Videoconferencing has become increasingly popular. Personally, I believe that videoconferencing is an excellent way to connect students and professionals from across the world and to take them to places that they cannot even imagine while having fun and learning at the same time.

Planning Phase

During the planning phase, the ad hoc committee (consists of: Director of Funeral Service Education, Professor of Funeral Service Education, Vice President of Institutional Advancement, Grants Coordinator, Procurement Officer, and Associate Dean of Learning Technology Services) for this project will develop a proposal and the proposal will consist of the software system that will meet the needs of the students, the source of funding, the training needs for the software and the implementation date.

Analysis Phase

In the Analysis Phase, the ad hoc committee will evaluate the results that are yielded from the planning phase of the project. During this time, it is important to make sure that this software system works with system that it will be implemented.

Design Phase

During the Design Phase, it is important for the ad hoc committee to determine to proper placement of the system to maximize its’ potential. The equipment will be installed in the Preparation Room in V Building at Piedmont Technical College.

Implementation Phase

During the implementation, the Information Technology Department of the college will oversee the installation of the videoconferencing system. Once the system is installed, the IT Department will be responsible the training of the users, the maintenance and the security of the system.