Reference Hub3
Strategies for teaching students With Exceptional Needs in cyber schools

Strategies for teaching students With Exceptional Needs in cyber schools

Shellie Hipsky, Lindsay Adams
Copyright: © 2006 |Volume: 2 |Issue: 4 |Pages: 14
ISSN: 1550-1876|EISSN: 1550-1337|ISSN: 1550-1876|EISBN13: 9781615203130|EISSN: 1550-1337|DOI: 10.4018/jicte.2006100101
Cite Article Cite Article

MLA

Hipsky, Shellie, and Lindsay Adams. "Strategies for teaching students With Exceptional Needs in cyber schools." IJICTE vol.2, no.4 2006: pp.1-14. http://doi.org/10.4018/jicte.2006100101

APA

Hipsky, S. & Adams, L. (2006). Strategies for teaching students With Exceptional Needs in cyber schools. International Journal of Information and Communication Technology Education (IJICTE), 2(4), 1-14. http://doi.org/10.4018/jicte.2006100101

Chicago

Hipsky, Shellie, and Lindsay Adams. "Strategies for teaching students With Exceptional Needs in cyber schools," International Journal of Information and Communication Technology Education (IJICTE) 2, no.4: 1-14. http://doi.org/10.4018/jicte.2006100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cyber schools for K-12 students are growing in number. It is vital that appropriate strategies are devised in order to meet the needs of students with exceptionalities. The PA Cyber Charter School serves 353 students who have Individualized Education Plans. Parent surveys were thematically analyzed and revealed six predominant themes, including communication, interests, focus, less-stigma from the special education label, education differences in comparison to other methods, and cyber school shortcomings. The study also utilized the action research model to determine and present the techniques and strategies that are working in the PA Cyber Charter School for their students with special needs. Teacher-tested documents included in the Appendix were based on the study, and a model for special needs strategies in the cyber learning environment has been established through this article.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.